f15hb0wn commited on
Commit
7ca263f
·
verified ·
1 Parent(s): cadbf70

Upload per-incident GraphML sharded batch 27/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/f/fdb21620-2d7e-11ee-b431-c96f4a8a8f7e.graphml +63 -0
  2. graph/incidents_graphml/f/fdc38880-1657-11ee-87fd-95133fbba576.graphml +63 -0
  3. graph/incidents_graphml/f/fdc8e8c0-a2ca-11ee-9cfc-094b81d7b53b.graphml +63 -0
  4. graph/incidents_graphml/f/fdd12fe0-4153-11ee-b2c3-cd25671e6ae8.graphml +63 -0
  5. graph/incidents_graphml/f/fde42240-56b5-11ee-be44-f1fe26834d88.graphml +113 -0
  6. graph/incidents_graphml/f/fdf14f40-1657-11ee-87fd-95133fbba576.graphml +63 -0
  7. graph/incidents_graphml/f/fdf4dac0-a2ca-11ee-9cfc-094b81d7b53b.graphml +63 -0
  8. graph/incidents_graphml/f/fdf90d60-ff1f-11ed-9f06-15dc041567e3.graphml +617 -0
  9. graph/incidents_graphml/f/fe07c460-368b-11ee-b839-f5eaf8816d24.graphml +63 -0
  10. graph/incidents_graphml/f/fe07ed90-a2ca-11ee-9cfc-094b81d7b53b.graphml +63 -0
  11. graph/incidents_graphml/f/fe0cc230-4d9c-11ee-b83a-49677896a1e8.graphml +63 -0
  12. graph/incidents_graphml/f/fe117760-ff1f-11ed-9f06-15dc041567e3.graphml +157 -0
  13. graph/incidents_graphml/f/fe1503e0-1657-11ee-87fd-95133fbba576.graphml +63 -0
  14. graph/incidents_graphml/f/fe1927f0-66fb-11ee-869c-79758109a47c.graphml +63 -0
  15. graph/incidents_graphml/f/fe1aa4e0-4d9c-11ee-b83a-49677896a1e8.graphml +63 -0
  16. graph/incidents_graphml/f/fe241100-1c97-11ee-b9c1-8f183b2e0424.graphml +77 -0
  17. graph/incidents_graphml/f/fe264750-66fb-11ee-869c-79758109a47c.graphml +63 -0
  18. graph/incidents_graphml/f/fe2b6dc0-4d9c-11ee-b83a-49677896a1e8.graphml +63 -0
  19. graph/incidents_graphml/f/fe2d28d0-a2ca-11ee-9cfc-094b81d7b53b.graphml +63 -0
  20. graph/incidents_graphml/f/fe33f120-286c-11ee-a80a-874bd8e06d7d.graphml +63 -0
  21. graph/incidents_graphml/f/fe3452a0-368b-11ee-b839-f5eaf8816d24.graphml +63 -0
  22. graph/incidents_graphml/f/fe39f100-1657-11ee-87fd-95133fbba576.graphml +63 -0
  23. graph/incidents_graphml/f/fe3ce040-a2ca-11ee-9cfc-094b81d7b53b.graphml +63 -0
  24. graph/incidents_graphml/f/fe4c2280-a2ca-11ee-9cfc-094b81d7b53b.graphml +63 -0
  25. graph/incidents_graphml/f/fe559640-368b-11ee-b839-f5eaf8816d24.graphml +63 -0
  26. graph/incidents_graphml/f/fe5d5aa0-4f46-11ee-896d-938683508860.graphml +63 -0
  27. graph/incidents_graphml/f/fe65c1d0-179d-11ee-9bde-a75d9ab1122d.graphml +423 -0
  28. graph/incidents_graphml/f/fe6e9590-1657-11ee-87fd-95133fbba576.graphml +63 -0
  29. graph/incidents_graphml/f/fe6f9080-fb3b-11ed-b62e-59f6599c4691.graphml +63 -0
  30. graph/incidents_graphml/f/fe752860-4f46-11ee-896d-938683508860.graphml +63 -0
  31. graph/incidents_graphml/f/fe7a47c0-56b5-11ee-be44-f1fe26834d88.graphml +329 -0
  32. graph/incidents_graphml/f/fe7b3350-286c-11ee-a80a-874bd8e06d7d.graphml +63 -0
  33. graph/incidents_graphml/f/fe7de710-156c-11ef-aecb-e5bec61c0532.graphml +63 -0
  34. graph/incidents_graphml/f/fe840390-176e-11ee-a7dc-57e99513cc0a.graphml +85 -0
  35. graph/incidents_graphml/f/fe841c80-4f46-11ee-896d-938683508860.graphml +63 -0
  36. graph/incidents_graphml/f/fe883f00-368b-11ee-b839-f5eaf8816d24.graphml +63 -0
  37. graph/incidents_graphml/f/fe88fcd0-68d4-11ee-bfd3-8f3b77e847d5.graphml +63 -0
  38. graph/incidents_graphml/f/fe8cb620-176e-11ee-a7dc-57e99513cc0a.graphml +63 -0
  39. graph/incidents_graphml/f/fe904880-9405-11ee-ae31-0b69a6db722c.graphml +63 -0
  40. graph/incidents_graphml/f/fe907030-4f54-11ee-a8d7-55254673f433.graphml +63 -0
  41. graph/incidents_graphml/f/fe91ceb0-2df5-11ee-ad46-05b36c64c936.graphml +63 -0
  42. graph/incidents_graphml/f/fe923ec0-d347-11ee-9f4f-e3f2e08e6ef8.graphml +85 -0
  43. graph/incidents_graphml/f/fe94ac50-71e1-11ed-b9a8-2b933f6712c2.graphml +77 -0
  44. graph/incidents_graphml/f/fe95cfc0-4f46-11ee-896d-938683508860.graphml +63 -0
  45. graph/incidents_graphml/f/fe9632f0-71e1-11ed-b9a8-2b933f6712c2.graphml +77 -0
  46. graph/incidents_graphml/f/fe979280-71e1-11ed-b9a8-2b933f6712c2.graphml +77 -0
  47. graph/incidents_graphml/f/fe997790-68d4-11ee-bfd3-8f3b77e847d5.graphml +63 -0
  48. graph/incidents_graphml/f/fe9b8c90-286c-11ee-a80a-874bd8e06d7d.graphml +63 -0
  49. graph/incidents_graphml/f/fe9be2d0-4d9c-11ee-b83a-49677896a1e8.graphml +63 -0
  50. graph/incidents_graphml/f/fe9da340-572e-11ee-a77e-c7fa233c7f89.graphml +63 -0
graph/incidents_graphml/f/fdb21620-2d7e-11ee-b431-c96f4a8a8f7e.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a6383154-2d78-11ee-a814-85f4253641f7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.82.58</data>
35
+ <data key="n_hostname">100.64.82.58</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="1a316301-063d-11ee-8679-7ff0d95439f0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.237</data>
43
+ <data key="n_hostname">100.64.71.237</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16482" target="HOST-12904">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690573394</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fdb21620-2d7e-11ee-b431-c96f4a8a8f7e</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fdc38880-1657-11ee-87fd-95133fbba576.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.23.117</data>
35
+ <data key="n_hostname">172.26.23.117</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="7a1ced10-06d9-11ee-8777-8f7930d32a1b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.12.60</data>
43
+ <data key="n_hostname">100.64.12.60</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2824" target="HOST-3399">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688027767</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fdc38880-1657-11ee-87fd-95133fbba576</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fdc8e8c0-a2ca-11ee-9cfc-094b81d7b53b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9ff29330-0627-11ee-ad14-25a724519715">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="77f306b3-1939-11ee-8aca-3191fb2c0158">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.92.177</data>
43
+ <data key="n_hostname">100.64.92.177</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16999" target="77f306b3-1939-11ee-8aca-3191fb2c0158">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703470322</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fdc8e8c0-a2ca-11ee-9cfc-094b81d7b53b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fdd12fe0-4153-11ee-b2c3-cd25671e6ae8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e06a5a92-18f3-11ee-ad5c-f9e88d6f3f2c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.34.45</data>
35
+ <data key="n_hostname">100.64.34.45</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.117.12.163</data>
43
+ <data key="n_hostname">10.117.12.163</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="e06a5a92-18f3-11ee-ad5c-f9e88d6f3f2c" target="HOST-2773">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692753949</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fdd12fe0-4153-11ee-b2c3-cd25671e6ae8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fde42240-56b5-11ee-be44-f1fe26834d88.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bbc88644-062d-11ee-b3db-676de6ca3763">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.12.144</data>
35
+ <data key="n_hostname">100.64.12.144</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.746875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="56cc99f4-0625-11ee-ae19-679f8bc2c45f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.28</data>
43
+ <data key="n_hostname">100.64.68.28</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <node id="134efc11-1357-11ee-8866-316915a2ae16">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.45.239</data>
51
+ <data key="n_hostname">100.64.45.239</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.325</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-11516" target="HOST-11400">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1695105014</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.746875</data>
61
+ <data key="e_suspicion_score">0.746875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">fde42240-56b5-11ee-be44-f1fe26834d88</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-11400" target="HOST-11516">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1695105014</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.746875</data>
75
+ <data key="e_suspicion_score">0.746875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">fde42240-56b5-11ee-be44-f1fe26834d88</data>
83
+ </edge>
84
+ <edge id="e3" source="134efc11-1357-11ee-8866-316915a2ae16" target="HOST-11400">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1695105014</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.746875</data>
89
+ <data key="e_suspicion_score">0.746875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">fde42240-56b5-11ee-be44-f1fe26834d88</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-11400" target="134efc11-1357-11ee-8866-316915a2ae16">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1695105014</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.746875</data>
103
+ <data key="e_suspicion_score">0.746875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">fde42240-56b5-11ee-be44-f1fe26834d88</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/f/fdf14f40-1657-11ee-87fd-95133fbba576.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="09722780-065f-11ee-aab9-2d2fe602da2e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.23.241</data>
35
+ <data key="n_hostname">100.64.23.241</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="09722780-065f-11ee-aab9-2d2fe602da2e" target="HOST-2759">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688027767</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fdf14f40-1657-11ee-87fd-95133fbba576</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fdf4dac0-a2ca-11ee-9cfc-094b81d7b53b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5c6d17c7-1185-11ee-9633-0bc37fed8e1a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.13.113</data>
35
+ <data key="n_hostname">100.64.13.113</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9ff29330-0627-11ee-ad14-25a724519715">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
47
+ </node>
48
+ <edge id="e1" source="5c6d17c7-1185-11ee-9633-0bc37fed8e1a" target="HOST-16999">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703470322</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fdf4dac0-a2ca-11ee-9cfc-094b81d7b53b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fdf90d60-ff1f-11ed-9f06-15dc041567e3.graphml ADDED
@@ -0,0 +1,617 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="42dc99f2-fb5c-11ed-8645-ff404b6f6815">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.27.247</data>
35
+ <data key="n_hostname">100.64.27.247</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="fdedd961-c822-11ed-a57f-1bec2f3cbc08">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.208.219</data>
43
+ <data key="n_hostname">172.30.208.219</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.9208984375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
47
+ </node>
48
+ <node id="9d64c1d1-c86d-11ed-824a-cf53d069df83">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.9.156</data>
51
+ <data key="n_hostname">100.64.9.156</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="85105272-fafe-11ed-965d-c16718976742">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.25.129</data>
59
+ <data key="n_hostname">100.64.25.129</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.4375</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="e7754900-c9aa-11ed-91a6-1fe2e16ec9b5">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.27.248</data>
67
+ <data key="n_hostname">100.64.27.248</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.7890625</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="262979f2-de91-11ed-8175-71316b811df6">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.10.172</data>
75
+ <data key="n_hostname">100.64.10.172</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.4375</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="9ff09cd3-c86d-11ed-b634-5f1be824a23c">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.18.74</data>
83
+ <data key="n_hostname">100.64.18.74</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.4375</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="06676d93-e015-11ed-bc81-731d548dd521">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.27.249</data>
91
+ <data key="n_hostname">100.64.27.249</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.7890625</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="0ca2b191-fbd8-11ed-b754-fb4139fa7fed">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.27.250</data>
99
+ <data key="n_hostname">100.64.27.250</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.578125</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="6061ad16-c8a0-11ed-9d92-cb72984d0c7c">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.14.104</data>
107
+ <data key="n_hostname">100.64.14.104</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.94375</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="81a1e9b2-c8f8-11ed-8f79-bb67d65c5c86">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.8.146</data>
115
+ <data key="n_hostname">100.64.8.146</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.71875</data>
118
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
119
+ </node>
120
+ <node id="cdac3632-fa26-11ed-b708-2d723a0b7144">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.27.251</data>
123
+ <data key="n_hostname">100.64.27.251</data>
124
+ <data key="n_set_roles">["Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.578125</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="0ffafb23-e13b-11ed-a7a7-33e0bdc370e4">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.27.252</data>
131
+ <data key="n_hostname">100.64.27.252</data>
132
+ <data key="n_set_roles">["Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.578125</data>
134
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
135
+ </node>
136
+ <node id="224a5222-c823-11ed-b38f-718276329dbf">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.11.33</data>
139
+ <data key="n_hostname">100.64.11.33</data>
140
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
141
+ <data key="n_suspicion_score">0.7890625</data>
142
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
143
+ </node>
144
+ <node id="0c8752c4-fa56-11ed-942b-773a00103524">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.27.253</data>
147
+ <data key="n_hostname">100.64.27.253</data>
148
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
149
+ <data key="n_suspicion_score">0.7890625</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="cc3c98e0-eb39-11ed-84af-5754e43a0082">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.27.254</data>
155
+ <data key="n_hostname">100.64.27.254</data>
156
+ <data key="n_set_roles">["Exploiting Host"]</data>
157
+ <data key="n_suspicion_score">0.578125</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="14e4dc60-ff21-11ed-95d8-6528dd57a566">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.27.255</data>
163
+ <data key="n_hostname">100.64.27.255</data>
164
+ <data key="n_set_roles">["Exploiting Host"]</data>
165
+ <data key="n_suspicion_score">0.578125</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <edge id="e1" source="42dc99f2-fb5c-11ed-8645-ff404b6f6815" target="HOST-2739">
169
+ <data key="e_type">INCIDENT_LINK</data>
170
+ <data key="e_timestamp">1685474838</data>
171
+ <data key="e_label_binary">malicious</data>
172
+ <data key="e_label_confidence">0.94375</data>
173
+ <data key="e_suspicion_score">0.94375</data>
174
+ <data key="e_mo_name">Data Theft</data>
175
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
176
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
177
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
178
+ <data key="e_lifecycle_stage">complete-mission</data>
179
+ <data key="e_disposition">Disrupted</data>
180
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
181
+ </edge>
182
+ <edge id="e2" source="HOST-2739" target="42dc99f2-fb5c-11ed-8645-ff404b6f6815">
183
+ <data key="e_type">INCIDENT_LINK</data>
184
+ <data key="e_timestamp">1685474838</data>
185
+ <data key="e_label_binary">malicious</data>
186
+ <data key="e_label_confidence">0.94375</data>
187
+ <data key="e_suspicion_score">0.94375</data>
188
+ <data key="e_mo_name">Data Theft</data>
189
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
190
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
191
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
192
+ <data key="e_lifecycle_stage">complete-mission</data>
193
+ <data key="e_disposition">Disrupted</data>
194
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
195
+ </edge>
196
+ <edge id="e3" source="9d64c1d1-c86d-11ed-824a-cf53d069df83" target="HOST-2739">
197
+ <data key="e_type">INCIDENT_LINK</data>
198
+ <data key="e_timestamp">1685474838</data>
199
+ <data key="e_label_binary">malicious</data>
200
+ <data key="e_label_confidence">0.94375</data>
201
+ <data key="e_suspicion_score">0.94375</data>
202
+ <data key="e_mo_name">Data Theft</data>
203
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
204
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
205
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
206
+ <data key="e_lifecycle_stage">complete-mission</data>
207
+ <data key="e_disposition">Disrupted</data>
208
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
209
+ </edge>
210
+ <edge id="e4" source="HOST-2739" target="9d64c1d1-c86d-11ed-824a-cf53d069df83">
211
+ <data key="e_type">INCIDENT_LINK</data>
212
+ <data key="e_timestamp">1685474838</data>
213
+ <data key="e_label_binary">malicious</data>
214
+ <data key="e_label_confidence">0.94375</data>
215
+ <data key="e_suspicion_score">0.94375</data>
216
+ <data key="e_mo_name">Data Theft</data>
217
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
218
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
219
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
220
+ <data key="e_lifecycle_stage">complete-mission</data>
221
+ <data key="e_disposition">Disrupted</data>
222
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
223
+ </edge>
224
+ <edge id="e5" source="85105272-fafe-11ed-965d-c16718976742" target="HOST-2739">
225
+ <data key="e_type">INCIDENT_LINK</data>
226
+ <data key="e_timestamp">1685474838</data>
227
+ <data key="e_label_binary">malicious</data>
228
+ <data key="e_label_confidence">0.94375</data>
229
+ <data key="e_suspicion_score">0.94375</data>
230
+ <data key="e_mo_name">Data Theft</data>
231
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
232
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
233
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
234
+ <data key="e_lifecycle_stage">complete-mission</data>
235
+ <data key="e_disposition">Disrupted</data>
236
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
237
+ </edge>
238
+ <edge id="e6" source="HOST-2739" target="85105272-fafe-11ed-965d-c16718976742">
239
+ <data key="e_type">INCIDENT_LINK</data>
240
+ <data key="e_timestamp">1685474838</data>
241
+ <data key="e_label_binary">malicious</data>
242
+ <data key="e_label_confidence">0.94375</data>
243
+ <data key="e_suspicion_score">0.94375</data>
244
+ <data key="e_mo_name">Data Theft</data>
245
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
246
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
247
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
248
+ <data key="e_lifecycle_stage">complete-mission</data>
249
+ <data key="e_disposition">Disrupted</data>
250
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
251
+ </edge>
252
+ <edge id="e7" source="e7754900-c9aa-11ed-91a6-1fe2e16ec9b5" target="HOST-2739">
253
+ <data key="e_type">INCIDENT_LINK</data>
254
+ <data key="e_timestamp">1685474838</data>
255
+ <data key="e_label_binary">malicious</data>
256
+ <data key="e_label_confidence">0.94375</data>
257
+ <data key="e_suspicion_score">0.94375</data>
258
+ <data key="e_mo_name">Data Theft</data>
259
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
260
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
261
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
262
+ <data key="e_lifecycle_stage">complete-mission</data>
263
+ <data key="e_disposition">Disrupted</data>
264
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
265
+ </edge>
266
+ <edge id="e8" source="HOST-2739" target="e7754900-c9aa-11ed-91a6-1fe2e16ec9b5">
267
+ <data key="e_type">INCIDENT_LINK</data>
268
+ <data key="e_timestamp">1685474838</data>
269
+ <data key="e_label_binary">malicious</data>
270
+ <data key="e_label_confidence">0.94375</data>
271
+ <data key="e_suspicion_score">0.94375</data>
272
+ <data key="e_mo_name">Data Theft</data>
273
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
274
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
275
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
276
+ <data key="e_lifecycle_stage">complete-mission</data>
277
+ <data key="e_disposition">Disrupted</data>
278
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
279
+ </edge>
280
+ <edge id="e9" source="262979f2-de91-11ed-8175-71316b811df6" target="HOST-2739">
281
+ <data key="e_type">INCIDENT_LINK</data>
282
+ <data key="e_timestamp">1685474838</data>
283
+ <data key="e_label_binary">malicious</data>
284
+ <data key="e_label_confidence">0.94375</data>
285
+ <data key="e_suspicion_score">0.94375</data>
286
+ <data key="e_mo_name">Data Theft</data>
287
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
288
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
289
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
290
+ <data key="e_lifecycle_stage">complete-mission</data>
291
+ <data key="e_disposition">Disrupted</data>
292
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
293
+ </edge>
294
+ <edge id="e10" source="HOST-2739" target="262979f2-de91-11ed-8175-71316b811df6">
295
+ <data key="e_type">INCIDENT_LINK</data>
296
+ <data key="e_timestamp">1685474838</data>
297
+ <data key="e_label_binary">malicious</data>
298
+ <data key="e_label_confidence">0.94375</data>
299
+ <data key="e_suspicion_score">0.94375</data>
300
+ <data key="e_mo_name">Data Theft</data>
301
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
302
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
303
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
304
+ <data key="e_lifecycle_stage">complete-mission</data>
305
+ <data key="e_disposition">Disrupted</data>
306
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
307
+ </edge>
308
+ <edge id="e11" source="9ff09cd3-c86d-11ed-b634-5f1be824a23c" target="HOST-2739">
309
+ <data key="e_type">INCIDENT_LINK</data>
310
+ <data key="e_timestamp">1685474838</data>
311
+ <data key="e_label_binary">malicious</data>
312
+ <data key="e_label_confidence">0.94375</data>
313
+ <data key="e_suspicion_score">0.94375</data>
314
+ <data key="e_mo_name">Data Theft</data>
315
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
316
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
317
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
318
+ <data key="e_lifecycle_stage">complete-mission</data>
319
+ <data key="e_disposition">Disrupted</data>
320
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
321
+ </edge>
322
+ <edge id="e12" source="HOST-2739" target="9ff09cd3-c86d-11ed-b634-5f1be824a23c">
323
+ <data key="e_type">INCIDENT_LINK</data>
324
+ <data key="e_timestamp">1685474838</data>
325
+ <data key="e_label_binary">malicious</data>
326
+ <data key="e_label_confidence">0.94375</data>
327
+ <data key="e_suspicion_score">0.94375</data>
328
+ <data key="e_mo_name">Data Theft</data>
329
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
330
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
331
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
332
+ <data key="e_lifecycle_stage">complete-mission</data>
333
+ <data key="e_disposition">Disrupted</data>
334
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
335
+ </edge>
336
+ <edge id="e13" source="06676d93-e015-11ed-bc81-731d548dd521" target="HOST-2739">
337
+ <data key="e_type">INCIDENT_LINK</data>
338
+ <data key="e_timestamp">1685474838</data>
339
+ <data key="e_label_binary">malicious</data>
340
+ <data key="e_label_confidence">0.94375</data>
341
+ <data key="e_suspicion_score">0.94375</data>
342
+ <data key="e_mo_name">Data Theft</data>
343
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
344
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
345
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
346
+ <data key="e_lifecycle_stage">complete-mission</data>
347
+ <data key="e_disposition">Disrupted</data>
348
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
349
+ </edge>
350
+ <edge id="e14" source="HOST-2739" target="06676d93-e015-11ed-bc81-731d548dd521">
351
+ <data key="e_type">INCIDENT_LINK</data>
352
+ <data key="e_timestamp">1685474838</data>
353
+ <data key="e_label_binary">malicious</data>
354
+ <data key="e_label_confidence">0.94375</data>
355
+ <data key="e_suspicion_score">0.94375</data>
356
+ <data key="e_mo_name">Data Theft</data>
357
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
358
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
359
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
360
+ <data key="e_lifecycle_stage">complete-mission</data>
361
+ <data key="e_disposition">Disrupted</data>
362
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
363
+ </edge>
364
+ <edge id="e15" source="0ca2b191-fbd8-11ed-b754-fb4139fa7fed" target="HOST-2739">
365
+ <data key="e_type">INCIDENT_LINK</data>
366
+ <data key="e_timestamp">1685474838</data>
367
+ <data key="e_label_binary">malicious</data>
368
+ <data key="e_label_confidence">0.94375</data>
369
+ <data key="e_suspicion_score">0.94375</data>
370
+ <data key="e_mo_name">Data Theft</data>
371
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
372
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
373
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
374
+ <data key="e_lifecycle_stage">complete-mission</data>
375
+ <data key="e_disposition">Disrupted</data>
376
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
377
+ </edge>
378
+ <edge id="e16" source="HOST-2739" target="0ca2b191-fbd8-11ed-b754-fb4139fa7fed">
379
+ <data key="e_type">INCIDENT_LINK</data>
380
+ <data key="e_timestamp">1685474838</data>
381
+ <data key="e_label_binary">malicious</data>
382
+ <data key="e_label_confidence">0.94375</data>
383
+ <data key="e_suspicion_score">0.94375</data>
384
+ <data key="e_mo_name">Data Theft</data>
385
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
386
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
387
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
388
+ <data key="e_lifecycle_stage">complete-mission</data>
389
+ <data key="e_disposition">Disrupted</data>
390
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
391
+ </edge>
392
+ <edge id="e17" source="HOST-3698" target="HOST-2739">
393
+ <data key="e_type">INCIDENT_LINK</data>
394
+ <data key="e_timestamp">1685474838</data>
395
+ <data key="e_label_binary">malicious</data>
396
+ <data key="e_label_confidence">0.94375</data>
397
+ <data key="e_suspicion_score">0.94375</data>
398
+ <data key="e_mo_name">Data Theft</data>
399
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
400
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
401
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
402
+ <data key="e_lifecycle_stage">complete-mission</data>
403
+ <data key="e_disposition">Disrupted</data>
404
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
405
+ </edge>
406
+ <edge id="e18" source="HOST-2739" target="HOST-3698">
407
+ <data key="e_type">INCIDENT_LINK</data>
408
+ <data key="e_timestamp">1685474838</data>
409
+ <data key="e_label_binary">malicious</data>
410
+ <data key="e_label_confidence">0.94375</data>
411
+ <data key="e_suspicion_score">0.94375</data>
412
+ <data key="e_mo_name">Data Theft</data>
413
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
414
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
415
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
416
+ <data key="e_lifecycle_stage">complete-mission</data>
417
+ <data key="e_disposition">Disrupted</data>
418
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
419
+ </edge>
420
+ <edge id="e19" source="81a1e9b2-c8f8-11ed-8f79-bb67d65c5c86" target="HOST-2739">
421
+ <data key="e_type">INCIDENT_LINK</data>
422
+ <data key="e_timestamp">1685474838</data>
423
+ <data key="e_label_binary">malicious</data>
424
+ <data key="e_label_confidence">0.94375</data>
425
+ <data key="e_suspicion_score">0.94375</data>
426
+ <data key="e_mo_name">Data Theft</data>
427
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
428
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
429
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
430
+ <data key="e_lifecycle_stage">complete-mission</data>
431
+ <data key="e_disposition">Disrupted</data>
432
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
433
+ </edge>
434
+ <edge id="e20" source="HOST-2739" target="81a1e9b2-c8f8-11ed-8f79-bb67d65c5c86">
435
+ <data key="e_type">INCIDENT_LINK</data>
436
+ <data key="e_timestamp">1685474838</data>
437
+ <data key="e_label_binary">malicious</data>
438
+ <data key="e_label_confidence">0.94375</data>
439
+ <data key="e_suspicion_score">0.94375</data>
440
+ <data key="e_mo_name">Data Theft</data>
441
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
442
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
443
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
444
+ <data key="e_lifecycle_stage">complete-mission</data>
445
+ <data key="e_disposition">Disrupted</data>
446
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
447
+ </edge>
448
+ <edge id="e21" source="cdac3632-fa26-11ed-b708-2d723a0b7144" target="HOST-2739">
449
+ <data key="e_type">INCIDENT_LINK</data>
450
+ <data key="e_timestamp">1685474838</data>
451
+ <data key="e_label_binary">malicious</data>
452
+ <data key="e_label_confidence">0.94375</data>
453
+ <data key="e_suspicion_score">0.94375</data>
454
+ <data key="e_mo_name">Data Theft</data>
455
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
456
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
457
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
458
+ <data key="e_lifecycle_stage">complete-mission</data>
459
+ <data key="e_disposition">Disrupted</data>
460
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
461
+ </edge>
462
+ <edge id="e22" source="HOST-2739" target="cdac3632-fa26-11ed-b708-2d723a0b7144">
463
+ <data key="e_type">INCIDENT_LINK</data>
464
+ <data key="e_timestamp">1685474838</data>
465
+ <data key="e_label_binary">malicious</data>
466
+ <data key="e_label_confidence">0.94375</data>
467
+ <data key="e_suspicion_score">0.94375</data>
468
+ <data key="e_mo_name">Data Theft</data>
469
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
470
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
471
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
472
+ <data key="e_lifecycle_stage">complete-mission</data>
473
+ <data key="e_disposition">Disrupted</data>
474
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
475
+ </edge>
476
+ <edge id="e23" source="0ffafb23-e13b-11ed-a7a7-33e0bdc370e4" target="HOST-2739">
477
+ <data key="e_type">INCIDENT_LINK</data>
478
+ <data key="e_timestamp">1685474838</data>
479
+ <data key="e_label_binary">malicious</data>
480
+ <data key="e_label_confidence">0.94375</data>
481
+ <data key="e_suspicion_score">0.94375</data>
482
+ <data key="e_mo_name">Data Theft</data>
483
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
484
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
485
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
486
+ <data key="e_lifecycle_stage">complete-mission</data>
487
+ <data key="e_disposition">Disrupted</data>
488
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
489
+ </edge>
490
+ <edge id="e24" source="HOST-2739" target="0ffafb23-e13b-11ed-a7a7-33e0bdc370e4">
491
+ <data key="e_type">INCIDENT_LINK</data>
492
+ <data key="e_timestamp">1685474838</data>
493
+ <data key="e_label_binary">malicious</data>
494
+ <data key="e_label_confidence">0.94375</data>
495
+ <data key="e_suspicion_score">0.94375</data>
496
+ <data key="e_mo_name">Data Theft</data>
497
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
498
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
499
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
500
+ <data key="e_lifecycle_stage">complete-mission</data>
501
+ <data key="e_disposition">Disrupted</data>
502
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
503
+ </edge>
504
+ <edge id="e25" source="HOST-4071" target="HOST-2739">
505
+ <data key="e_type">INCIDENT_LINK</data>
506
+ <data key="e_timestamp">1685474838</data>
507
+ <data key="e_label_binary">malicious</data>
508
+ <data key="e_label_confidence">0.94375</data>
509
+ <data key="e_suspicion_score">0.94375</data>
510
+ <data key="e_mo_name">Data Theft</data>
511
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
512
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
513
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
514
+ <data key="e_lifecycle_stage">complete-mission</data>
515
+ <data key="e_disposition">Disrupted</data>
516
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
517
+ </edge>
518
+ <edge id="e26" source="HOST-2739" target="HOST-4071">
519
+ <data key="e_type">INCIDENT_LINK</data>
520
+ <data key="e_timestamp">1685474838</data>
521
+ <data key="e_label_binary">malicious</data>
522
+ <data key="e_label_confidence">0.94375</data>
523
+ <data key="e_suspicion_score">0.94375</data>
524
+ <data key="e_mo_name">Data Theft</data>
525
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
526
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
527
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
528
+ <data key="e_lifecycle_stage">complete-mission</data>
529
+ <data key="e_disposition">Disrupted</data>
530
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
531
+ </edge>
532
+ <edge id="e27" source="0c8752c4-fa56-11ed-942b-773a00103524" target="HOST-2739">
533
+ <data key="e_type">INCIDENT_LINK</data>
534
+ <data key="e_timestamp">1685474838</data>
535
+ <data key="e_label_binary">malicious</data>
536
+ <data key="e_label_confidence">0.94375</data>
537
+ <data key="e_suspicion_score">0.94375</data>
538
+ <data key="e_mo_name">Data Theft</data>
539
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
540
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
541
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
542
+ <data key="e_lifecycle_stage">complete-mission</data>
543
+ <data key="e_disposition">Disrupted</data>
544
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
545
+ </edge>
546
+ <edge id="e28" source="HOST-2739" target="0c8752c4-fa56-11ed-942b-773a00103524">
547
+ <data key="e_type">INCIDENT_LINK</data>
548
+ <data key="e_timestamp">1685474838</data>
549
+ <data key="e_label_binary">malicious</data>
550
+ <data key="e_label_confidence">0.94375</data>
551
+ <data key="e_suspicion_score">0.94375</data>
552
+ <data key="e_mo_name">Data Theft</data>
553
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
554
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
555
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
556
+ <data key="e_lifecycle_stage">complete-mission</data>
557
+ <data key="e_disposition">Disrupted</data>
558
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
559
+ </edge>
560
+ <edge id="e29" source="cc3c98e0-eb39-11ed-84af-5754e43a0082" target="HOST-2739">
561
+ <data key="e_type">INCIDENT_LINK</data>
562
+ <data key="e_timestamp">1685474838</data>
563
+ <data key="e_label_binary">malicious</data>
564
+ <data key="e_label_confidence">0.94375</data>
565
+ <data key="e_suspicion_score">0.94375</data>
566
+ <data key="e_mo_name">Data Theft</data>
567
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
568
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
569
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
570
+ <data key="e_lifecycle_stage">complete-mission</data>
571
+ <data key="e_disposition">Disrupted</data>
572
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
573
+ </edge>
574
+ <edge id="e30" source="HOST-2739" target="cc3c98e0-eb39-11ed-84af-5754e43a0082">
575
+ <data key="e_type">INCIDENT_LINK</data>
576
+ <data key="e_timestamp">1685474838</data>
577
+ <data key="e_label_binary">malicious</data>
578
+ <data key="e_label_confidence">0.94375</data>
579
+ <data key="e_suspicion_score">0.94375</data>
580
+ <data key="e_mo_name">Data Theft</data>
581
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
582
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
583
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
584
+ <data key="e_lifecycle_stage">complete-mission</data>
585
+ <data key="e_disposition">Disrupted</data>
586
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
587
+ </edge>
588
+ <edge id="e31" source="14e4dc60-ff21-11ed-95d8-6528dd57a566" target="HOST-2739">
589
+ <data key="e_type">INCIDENT_LINK</data>
590
+ <data key="e_timestamp">1685474838</data>
591
+ <data key="e_label_binary">malicious</data>
592
+ <data key="e_label_confidence">0.94375</data>
593
+ <data key="e_suspicion_score">0.94375</data>
594
+ <data key="e_mo_name">Data Theft</data>
595
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
596
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
597
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
598
+ <data key="e_lifecycle_stage">complete-mission</data>
599
+ <data key="e_disposition">Disrupted</data>
600
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
601
+ </edge>
602
+ <edge id="e32" source="HOST-2739" target="14e4dc60-ff21-11ed-95d8-6528dd57a566">
603
+ <data key="e_type">INCIDENT_LINK</data>
604
+ <data key="e_timestamp">1685474838</data>
605
+ <data key="e_label_binary">malicious</data>
606
+ <data key="e_label_confidence">0.94375</data>
607
+ <data key="e_suspicion_score">0.94375</data>
608
+ <data key="e_mo_name">Data Theft</data>
609
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
610
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
611
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
612
+ <data key="e_lifecycle_stage">complete-mission</data>
613
+ <data key="e_disposition">Disrupted</data>
614
+ <data key="e_incident_id">fdf90d60-ff1f-11ed-9f06-15dc041567e3</data>
615
+ </edge>
616
+ </graph>
617
+ </graphml>
graph/incidents_graphml/f/fe07c460-368b-11ee-b839-f5eaf8816d24.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="23393910-35cb-11ee-8b27-1d2dfd9717bd">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.29.91</data>
35
+ <data key="n_hostname">100.64.29.91</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-5797" target="HOST-2858">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691568538</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe07c460-368b-11ee-b839-f5eaf8816d24</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe07ed90-a2ca-11ee-9cfc-094b81d7b53b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9ff29330-0627-11ee-ad14-25a724519715">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="5c6d17c7-1185-11ee-9633-0bc37fed8e1a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.13.113</data>
43
+ <data key="n_hostname">100.64.13.113</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16999" target="HOST-18333">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703470322</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe07ed90-a2ca-11ee-9cfc-094b81d7b53b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe0cc230-4d9c-11ee-b83a-49677896a1e8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.22.127.96</data>
35
+ <data key="n_hostname">172.22.127.96</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="58fa32e3-0626-11ee-8860-f951c26910c1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.12.189</data>
43
+ <data key="n_hostname">100.64.12.189</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2726" target="HOST-3453">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694104716</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe0cc230-4d9c-11ee-b83a-49677896a1e8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe117760-ff1f-11ed-9f06-15dc041567e3.graphml ADDED
@@ -0,0 +1,157 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9fabb000-fd30-11ed-bd2f-0b29328ae86e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.28.11</data>
35
+ <data key="n_hostname">100.64.28.11</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="fded6436-c822-11ed-a57f-1bec2f3cbc08">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.168.229</data>
43
+ <data key="n_hostname">172.23.168.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
47
+ </node>
48
+ <node id="d15f9932-ddf6-11ed-8493-e36857d73c92">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.28.12</data>
51
+ <data key="n_hostname">100.64.28.12</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="b64ce795-c822-11ed-93e7-73b4f1774f3f">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.24.191.229</data>
59
+ <data key="n_hostname">172.24.191.229</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
63
+ </node>
64
+ <node id="a123ce00-fe15-11ed-9d7e-3b0484835b02">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.28.13</data>
67
+ <data key="n_hostname">100.64.28.13</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.7890625</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <edge id="e1" source="9fabb000-fd30-11ed-bd2f-0b29328ae86e" target="HOST-4042">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1685474839</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.7890625</data>
77
+ <data key="e_suspicion_score">0.7890625</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Disrupted</data>
84
+ <data key="e_incident_id">fe117760-ff1f-11ed-9f06-15dc041567e3</data>
85
+ </edge>
86
+ <edge id="e2" source="HOST-4042" target="9fabb000-fd30-11ed-bd2f-0b29328ae86e">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1685474839</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.7890625</data>
91
+ <data key="e_suspicion_score">0.7890625</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Disrupted</data>
98
+ <data key="e_incident_id">fe117760-ff1f-11ed-9f06-15dc041567e3</data>
99
+ </edge>
100
+ <edge id="e3" source="d15f9932-ddf6-11ed-8493-e36857d73c92" target="HOST-3655">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1685474839</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.7890625</data>
105
+ <data key="e_suspicion_score">0.7890625</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Disrupted</data>
112
+ <data key="e_incident_id">fe117760-ff1f-11ed-9f06-15dc041567e3</data>
113
+ </edge>
114
+ <edge id="e4" source="HOST-3655" target="d15f9932-ddf6-11ed-8493-e36857d73c92">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1685474839</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.7890625</data>
119
+ <data key="e_suspicion_score">0.7890625</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Disrupted</data>
126
+ <data key="e_incident_id">fe117760-ff1f-11ed-9f06-15dc041567e3</data>
127
+ </edge>
128
+ <edge id="e5" source="a123ce00-fe15-11ed-9d7e-3b0484835b02" target="HOST-3655">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1685474839</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.7890625</data>
133
+ <data key="e_suspicion_score">0.7890625</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Disrupted</data>
140
+ <data key="e_incident_id">fe117760-ff1f-11ed-9f06-15dc041567e3</data>
141
+ </edge>
142
+ <edge id="e6" source="HOST-3655" target="a123ce00-fe15-11ed-9d7e-3b0484835b02">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1685474839</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.7890625</data>
147
+ <data key="e_suspicion_score">0.7890625</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Disrupted</data>
154
+ <data key="e_incident_id">fe117760-ff1f-11ed-9f06-15dc041567e3</data>
155
+ </edge>
156
+ </graph>
157
+ </graphml>
graph/incidents_graphml/f/fe1503e0-1657-11ee-87fd-95133fbba576.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="09722780-065f-11ee-aab9-2d2fe602da2e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.23.241</data>
43
+ <data key="n_hostname">100.64.23.241</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-4999">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688027767</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe1503e0-1657-11ee-87fd-95133fbba576</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe1927f0-66fb-11ee-869c-79758109a47c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4f719990-5688-11ee-88e4-b7993156d94e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.92.65</data>
35
+ <data key="n_hostname">100.64.92.65</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="638b5b01-95e5-11ed-b28e-ad8d3bab1fa5">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.221.82.8</data>
43
+ <data key="n_hostname">10.221.82.8</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="4f719990-5688-11ee-88e4-b7993156d94e" target="HOST-17427">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696894298</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe1927f0-66fb-11ee-869c-79758109a47c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe1aa4e0-4d9c-11ee-b83a-49677896a1e8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="01a20d40-0628-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.243</data>
35
+ <data key="n_hostname">100.64.18.243</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.201.119</data>
43
+ <data key="n_hostname">172.30.201.119</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4322" target="HOST-2760">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694104716</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe1aa4e0-4d9c-11ee-b83a-49677896a1e8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe241100-1c97-11ee-b9c1-8f183b2e0424.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a0c892c2-0625-11ee-aab2-71eb81956b3c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.23.203</data>
35
+ <data key="n_hostname">100.64.23.203</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="da20d812-062b-11ee-9107-f38fe9e09310">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.176</data>
43
+ <data key="n_hostname">100.64.71.176</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13073" target="HOST-13248">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688714962</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe241100-1c97-11ee-b9c1-8f183b2e0424</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13248" target="HOST-13073">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1688714962</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">fe241100-1c97-11ee-b9c1-8f183b2e0424</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/f/fe264750-66fb-11ee-869c-79758109a47c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="638b5b01-95e5-11ed-b28e-ad8d3bab1fa5">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.221.82.8</data>
35
+ <data key="n_hostname">10.221.82.8</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="4f719990-5688-11ee-88e4-b7993156d94e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.92.65</data>
43
+ <data key="n_hostname">100.64.92.65</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17427" target="HOST-18259">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696894298</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe264750-66fb-11ee-869c-79758109a47c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe2b6dc0-4d9c-11ee-b83a-49677896a1e8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.201.119</data>
35
+ <data key="n_hostname">172.30.201.119</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="01a20d40-0628-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.243</data>
43
+ <data key="n_hostname">100.64.18.243</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2760" target="HOST-4322">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694104717</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe2b6dc0-4d9c-11ee-b83a-49677896a1e8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe2d28d0-a2ca-11ee-9cfc-094b81d7b53b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9ff29330-0627-11ee-ad14-25a724519715">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="5b5e46e1-28de-11ee-a0b1-e10b50672bd7">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.92.179</data>
43
+ <data key="n_hostname">100.64.92.179</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16999" target="5b5e46e1-28de-11ee-a0b1-e10b50672bd7">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703470322</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe2d28d0-a2ca-11ee-9cfc-094b81d7b53b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe33f120-286c-11ee-a80a-874bd8e06d7d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="e0da4ca1-062a-11ee-87d2-5909d78e9e20">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.10.95</data>
43
+ <data key="n_hostname">100.64.10.95</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2748" target="HOST-3157">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690015908</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe33f120-286c-11ee-a80a-874bd8e06d7d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe3452a0-368b-11ee-b839-f5eaf8816d24.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.158.1</data>
35
+ <data key="n_hostname">172.29.158.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="23393910-35cb-11ee-8b27-1d2dfd9717bd">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.29.91</data>
43
+ <data key="n_hostname">100.64.29.91</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2858" target="HOST-5797">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691568538</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe3452a0-368b-11ee-b839-f5eaf8816d24</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe39f100-1657-11ee-87fd-95133fbba576.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.73.92</data>
35
+ <data key="n_hostname">172.26.73.92</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="dacd20d1-062f-11ee-b4c2-03d750d08a81">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.9.153</data>
43
+ <data key="n_hostname">100.64.9.153</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2724" target="HOST-3052">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688027767</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe39f100-1657-11ee-87fd-95133fbba576</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe3ce040-a2ca-11ee-9cfc-094b81d7b53b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b35bb7b0-1619-11ee-8c96-7b89291999c9">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.92.181</data>
35
+ <data key="n_hostname">100.64.92.181</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2cf6e855-90a0-11ee-90bb-49febada74fa">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.74.211.215</data>
43
+ <data key="n_hostname">10.74.211.215</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="b35bb7b0-1619-11ee-8c96-7b89291999c9" target="HOST-17320">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703470322</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe3ce040-a2ca-11ee-9cfc-094b81d7b53b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe4c2280-a2ca-11ee-9cfc-094b81d7b53b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2cf6e855-90a0-11ee-90bb-49febada74fa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">10.74.211.215</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b35bb7b0-1619-11ee-8c96-7b89291999c9">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.92.181</data>
43
+ <data key="n_hostname">100.64.92.181</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17320" target="HOST-18335">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703470322</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe4c2280-a2ca-11ee-9cfc-094b81d7b53b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe559640-368b-11ee-b839-f5eaf8816d24.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="85205ae0-0629-11ee-a510-47d18ec77e75">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.7.183</data>
35
+ <data key="n_hostname">100.64.7.183</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.208.219</data>
43
+ <data key="n_hostname">172.30.208.219</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-8000" target="HOST-2823">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691568539</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe559640-368b-11ee-b839-f5eaf8816d24</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe5d5aa0-4f46-11ee-896d-938683508860.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1c96d6d1-0628-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.19.30</data>
35
+ <data key="n_hostname">100.64.19.30</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.191.229</data>
43
+ <data key="n_hostname">172.24.191.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4346" target="HOST-2839">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694287683</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe5d5aa0-4f46-11ee-896d-938683508860</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe65c1d0-179d-11ee-9bde-a75d9ab1122d.graphml ADDED
@@ -0,0 +1,423 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d56b21c1-0637-11ee-9292-037474792a78">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.14.132</data>
35
+ <data key="n_hostname">100.64.14.132</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="3a866270-062b-11ee-8ffb-516c3122460e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.156</data>
43
+ <data key="n_hostname">100.64.71.156</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="b53a4940-09c4-11ee-8192-c1a864090583">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.62.242</data>
51
+ <data key="n_hostname">100.64.62.242</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="10c98432-0626-11ee-aab2-71eb81956b3c">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.7.119</data>
59
+ <data key="n_hostname">100.64.7.119</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.578125</data>
62
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
63
+ </node>
64
+ <node id="1854b920-0650-11ee-8b22-e7d67221b059">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.28.17</data>
67
+ <data key="n_hostname">100.64.28.17</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <node id="8ccbb0e1-0625-11ee-98c4-03fbbffc96a5">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.72.130</data>
75
+ <data key="n_hostname">100.64.72.130</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.841796875</data>
78
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
79
+ </node>
80
+ <node id="7338ba11-064d-11ee-a4e0-b9e02b13afaf">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.80.91</data>
83
+ <data key="n_hostname">100.64.80.91</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.7890625</data>
86
+ <data key="n_products">["Precinct","Meraki"]</data>
87
+ </node>
88
+ <node id="e6fb4a62-062c-11ee-bad6-6b745eaaac20">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.36.85</data>
91
+ <data key="n_hostname">100.64.36.85</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.7890625</data>
94
+ <data key="n_products">["Precinct","Meraki"]</data>
95
+ </node>
96
+ <node id="91feb892-1382-11ee-810a-a9d1c4cec477">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.45.239</data>
99
+ <data key="n_hostname">100.64.45.239</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.4375</data>
102
+ <data key="n_products">["Precinct","Meraki"]</data>
103
+ </node>
104
+ <node id="124c7f10-0644-11ee-9488-69c5977d12da">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.39.21</data>
107
+ <data key="n_hostname">100.64.39.21</data>
108
+ <data key="n_set_roles">["Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.578125</data>
110
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
111
+ </node>
112
+ <node id="e48337c0-0627-11ee-bad6-6b745eaaac20">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.28.1</data>
115
+ <data key="n_hostname">100.64.28.1</data>
116
+ <data key="n_set_roles">["Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.578125</data>
118
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
119
+ </node>
120
+ <node id="de197df0-0635-11ee-9d07-cb1ebf50eef9">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.9.103</data>
123
+ <data key="n_hostname">100.64.9.103</data>
124
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.578125</data>
126
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
127
+ </node>
128
+ <edge id="e1" source="d56b21c1-0637-11ee-9292-037474792a78" target="HOST-13338">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1688167784</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.841796875</data>
133
+ <data key="e_suspicion_score">0.841796875</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Disrupted</data>
140
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
141
+ </edge>
142
+ <edge id="e2" source="HOST-13338" target="d56b21c1-0637-11ee-9292-037474792a78">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1688167784</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.841796875</data>
147
+ <data key="e_suspicion_score">0.841796875</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Disrupted</data>
154
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
155
+ </edge>
156
+ <edge id="e3" source="HOST-13338" target="b53a4940-09c4-11ee-8192-c1a864090583">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1688167784</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.841796875</data>
161
+ <data key="e_suspicion_score">0.841796875</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Disrupted</data>
168
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
169
+ </edge>
170
+ <edge id="e4" source="b53a4940-09c4-11ee-8192-c1a864090583" target="HOST-13338">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1688167784</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.841796875</data>
175
+ <data key="e_suspicion_score">0.841796875</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Disrupted</data>
182
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
183
+ </edge>
184
+ <edge id="e5" source="HOST-14692" target="HOST-13338">
185
+ <data key="e_type">INCIDENT_LINK</data>
186
+ <data key="e_timestamp">1688167784</data>
187
+ <data key="e_label_binary">malicious</data>
188
+ <data key="e_label_confidence">0.841796875</data>
189
+ <data key="e_suspicion_score">0.841796875</data>
190
+ <data key="e_mo_name">Data Theft</data>
191
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
192
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
193
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
194
+ <data key="e_lifecycle_stage">complete-mission</data>
195
+ <data key="e_disposition">Disrupted</data>
196
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
197
+ </edge>
198
+ <edge id="e6" source="HOST-13338" target="HOST-14692">
199
+ <data key="e_type">INCIDENT_LINK</data>
200
+ <data key="e_timestamp">1688167784</data>
201
+ <data key="e_label_binary">malicious</data>
202
+ <data key="e_label_confidence">0.841796875</data>
203
+ <data key="e_suspicion_score">0.841796875</data>
204
+ <data key="e_mo_name">Data Theft</data>
205
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
206
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
207
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
208
+ <data key="e_lifecycle_stage">complete-mission</data>
209
+ <data key="e_disposition">Disrupted</data>
210
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
211
+ </edge>
212
+ <edge id="e7" source="1854b920-0650-11ee-8b22-e7d67221b059" target="HOST-13108">
213
+ <data key="e_type">INCIDENT_LINK</data>
214
+ <data key="e_timestamp">1688167784</data>
215
+ <data key="e_label_binary">malicious</data>
216
+ <data key="e_label_confidence">0.841796875</data>
217
+ <data key="e_suspicion_score">0.841796875</data>
218
+ <data key="e_mo_name">Data Theft</data>
219
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
220
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
221
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
222
+ <data key="e_lifecycle_stage">complete-mission</data>
223
+ <data key="e_disposition">Disrupted</data>
224
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
225
+ </edge>
226
+ <edge id="e8" source="HOST-13108" target="1854b920-0650-11ee-8b22-e7d67221b059">
227
+ <data key="e_type">INCIDENT_LINK</data>
228
+ <data key="e_timestamp">1688167784</data>
229
+ <data key="e_label_binary">malicious</data>
230
+ <data key="e_label_confidence">0.841796875</data>
231
+ <data key="e_suspicion_score">0.841796875</data>
232
+ <data key="e_mo_name">Data Theft</data>
233
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
234
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
235
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
236
+ <data key="e_lifecycle_stage">complete-mission</data>
237
+ <data key="e_disposition">Disrupted</data>
238
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
239
+ </edge>
240
+ <edge id="e9" source="7338ba11-064d-11ee-a4e0-b9e02b13afaf" target="HOST-13108">
241
+ <data key="e_type">INCIDENT_LINK</data>
242
+ <data key="e_timestamp">1688167784</data>
243
+ <data key="e_label_binary">malicious</data>
244
+ <data key="e_label_confidence">0.841796875</data>
245
+ <data key="e_suspicion_score">0.841796875</data>
246
+ <data key="e_mo_name">Data Theft</data>
247
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
248
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
249
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
250
+ <data key="e_lifecycle_stage">complete-mission</data>
251
+ <data key="e_disposition">Disrupted</data>
252
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
253
+ </edge>
254
+ <edge id="e10" source="HOST-13108" target="7338ba11-064d-11ee-a4e0-b9e02b13afaf">
255
+ <data key="e_type">INCIDENT_LINK</data>
256
+ <data key="e_timestamp">1688167784</data>
257
+ <data key="e_label_binary">malicious</data>
258
+ <data key="e_label_confidence">0.841796875</data>
259
+ <data key="e_suspicion_score">0.841796875</data>
260
+ <data key="e_mo_name">Data Theft</data>
261
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
262
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
263
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
264
+ <data key="e_lifecycle_stage">complete-mission</data>
265
+ <data key="e_disposition">Disrupted</data>
266
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
267
+ </edge>
268
+ <edge id="e11" source="HOST-13108" target="HOST-15396">
269
+ <data key="e_type">INCIDENT_LINK</data>
270
+ <data key="e_timestamp">1688167784</data>
271
+ <data key="e_label_binary">malicious</data>
272
+ <data key="e_label_confidence">0.841796875</data>
273
+ <data key="e_suspicion_score">0.841796875</data>
274
+ <data key="e_mo_name">Data Theft</data>
275
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
276
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
277
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
278
+ <data key="e_lifecycle_stage">complete-mission</data>
279
+ <data key="e_disposition">Disrupted</data>
280
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
281
+ </edge>
282
+ <edge id="e12" source="HOST-15396" target="HOST-13108">
283
+ <data key="e_type">INCIDENT_LINK</data>
284
+ <data key="e_timestamp">1688167784</data>
285
+ <data key="e_label_binary">malicious</data>
286
+ <data key="e_label_confidence">0.841796875</data>
287
+ <data key="e_suspicion_score">0.841796875</data>
288
+ <data key="e_mo_name">Data Theft</data>
289
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
290
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
291
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
292
+ <data key="e_lifecycle_stage">complete-mission</data>
293
+ <data key="e_disposition">Disrupted</data>
294
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
295
+ </edge>
296
+ <edge id="e13" source="d56b21c1-0637-11ee-9292-037474792a78" target="HOST-13108">
297
+ <data key="e_type">INCIDENT_LINK</data>
298
+ <data key="e_timestamp">1688167784</data>
299
+ <data key="e_label_binary">malicious</data>
300
+ <data key="e_label_confidence">0.841796875</data>
301
+ <data key="e_suspicion_score">0.841796875</data>
302
+ <data key="e_mo_name">Data Theft</data>
303
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
304
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
305
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
306
+ <data key="e_lifecycle_stage">complete-mission</data>
307
+ <data key="e_disposition">Disrupted</data>
308
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
309
+ </edge>
310
+ <edge id="e14" source="HOST-13108" target="d56b21c1-0637-11ee-9292-037474792a78">
311
+ <data key="e_type">INCIDENT_LINK</data>
312
+ <data key="e_timestamp">1688167784</data>
313
+ <data key="e_label_binary">malicious</data>
314
+ <data key="e_label_confidence">0.841796875</data>
315
+ <data key="e_suspicion_score">0.841796875</data>
316
+ <data key="e_mo_name">Data Theft</data>
317
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
318
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
319
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
320
+ <data key="e_lifecycle_stage">complete-mission</data>
321
+ <data key="e_disposition">Disrupted</data>
322
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
323
+ </edge>
324
+ <edge id="e15" source="91feb892-1382-11ee-810a-a9d1c4cec477" target="HOST-13108">
325
+ <data key="e_type">INCIDENT_LINK</data>
326
+ <data key="e_timestamp">1688167784</data>
327
+ <data key="e_label_binary">malicious</data>
328
+ <data key="e_label_confidence">0.841796875</data>
329
+ <data key="e_suspicion_score">0.841796875</data>
330
+ <data key="e_mo_name">Data Theft</data>
331
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
332
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
333
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
334
+ <data key="e_lifecycle_stage">complete-mission</data>
335
+ <data key="e_disposition">Disrupted</data>
336
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
337
+ </edge>
338
+ <edge id="e16" source="HOST-13108" target="91feb892-1382-11ee-810a-a9d1c4cec477">
339
+ <data key="e_type">INCIDENT_LINK</data>
340
+ <data key="e_timestamp">1688167784</data>
341
+ <data key="e_label_binary">malicious</data>
342
+ <data key="e_label_confidence">0.841796875</data>
343
+ <data key="e_suspicion_score">0.841796875</data>
344
+ <data key="e_mo_name">Data Theft</data>
345
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
346
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
347
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
348
+ <data key="e_lifecycle_stage">complete-mission</data>
349
+ <data key="e_disposition">Disrupted</data>
350
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
351
+ </edge>
352
+ <edge id="e17" source="HOST-13481" target="HOST-13338">
353
+ <data key="e_type">INCIDENT_LINK</data>
354
+ <data key="e_timestamp">1688167784</data>
355
+ <data key="e_label_binary">malicious</data>
356
+ <data key="e_label_confidence">0.841796875</data>
357
+ <data key="e_suspicion_score">0.841796875</data>
358
+ <data key="e_mo_name">Data Theft</data>
359
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
360
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
361
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
362
+ <data key="e_lifecycle_stage">complete-mission</data>
363
+ <data key="e_disposition">Disrupted</data>
364
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
365
+ </edge>
366
+ <edge id="e18" source="HOST-13338" target="HOST-13481">
367
+ <data key="e_type">INCIDENT_LINK</data>
368
+ <data key="e_timestamp">1688167784</data>
369
+ <data key="e_label_binary">malicious</data>
370
+ <data key="e_label_confidence">0.841796875</data>
371
+ <data key="e_suspicion_score">0.841796875</data>
372
+ <data key="e_mo_name">Data Theft</data>
373
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
374
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
375
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
376
+ <data key="e_lifecycle_stage">complete-mission</data>
377
+ <data key="e_disposition">Disrupted</data>
378
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
379
+ </edge>
380
+ <edge id="e19" source="HOST-13108" target="HOST-13070">
381
+ <data key="e_type">INCIDENT_LINK</data>
382
+ <data key="e_timestamp">1688167784</data>
383
+ <data key="e_label_binary">malicious</data>
384
+ <data key="e_label_confidence">0.841796875</data>
385
+ <data key="e_suspicion_score">0.841796875</data>
386
+ <data key="e_mo_name">Data Theft</data>
387
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
388
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
389
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
390
+ <data key="e_lifecycle_stage">complete-mission</data>
391
+ <data key="e_disposition">Disrupted</data>
392
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
393
+ </edge>
394
+ <edge id="e20" source="HOST-13338" target="HOST-12914">
395
+ <data key="e_type">INCIDENT_LINK</data>
396
+ <data key="e_timestamp">1688167784</data>
397
+ <data key="e_label_binary">malicious</data>
398
+ <data key="e_label_confidence">0.841796875</data>
399
+ <data key="e_suspicion_score">0.841796875</data>
400
+ <data key="e_mo_name">Data Theft</data>
401
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
402
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
403
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
404
+ <data key="e_lifecycle_stage">complete-mission</data>
405
+ <data key="e_disposition">Disrupted</data>
406
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
407
+ </edge>
408
+ <edge id="e21" source="HOST-12914" target="HOST-13338">
409
+ <data key="e_type">INCIDENT_LINK</data>
410
+ <data key="e_timestamp">1688167784</data>
411
+ <data key="e_label_binary">malicious</data>
412
+ <data key="e_label_confidence">0.841796875</data>
413
+ <data key="e_suspicion_score">0.841796875</data>
414
+ <data key="e_mo_name">Data Theft</data>
415
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
416
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
417
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
418
+ <data key="e_lifecycle_stage">complete-mission</data>
419
+ <data key="e_disposition">Disrupted</data>
420
+ <data key="e_incident_id">fe65c1d0-179d-11ee-9bde-a75d9ab1122d</data>
421
+ </edge>
422
+ </graph>
423
+ </graphml>
graph/incidents_graphml/f/fe6e9590-1657-11ee-87fd-95133fbba576.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f4ba3f62-0624-11ee-8860-f951c26910c1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.23.239</data>
35
+ <data key="n_hostname">USER-0015-1245.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.23.117</data>
43
+ <data key="n_hostname">172.26.23.117</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="f4ba3f62-0624-11ee-8860-f951c26910c1" target="HOST-2824">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688027768</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe6e9590-1657-11ee-87fd-95133fbba576</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe6f9080-fb3b-11ed-b62e-59f6599c4691.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="fded8b40-c822-11ed-a57f-1bec2f3cbc08">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="8b6f5260-df5b-11ed-8765-6bde2337a11d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.27.135</data>
43
+ <data key="n_hostname">100.64.27.135</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2971" target="8b6f5260-df5b-11ed-8765-6bde2337a11d">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1685047061</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe6f9080-fb3b-11ed-b62e-59f6599c4691</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe752860-4f46-11ee-896d-938683508860.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1c96d6d1-0628-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.19.30</data>
43
+ <data key="n_hostname">100.64.19.30</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="HOST-4346">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694287683</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe752860-4f46-11ee-896d-938683508860</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe7a47c0-56b5-11ee-be44-f1fe26834d88.graphml ADDED
@@ -0,0 +1,329 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7d1affa6-3df4-11ee-b5fb-0bfdba910d64">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.23.203</data>
35
+ <data key="n_hostname">100.64.23.203</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.6203125</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="0027f7c6-0625-11ee-9290-9f7f8caf087f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.31</data>
43
+ <data key="n_hostname">100.64.68.31</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.746875</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <node id="5a4b6078-0625-11ee-86d0-ab9d4a7dffa4">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.11.152</data>
51
+ <data key="n_hostname">100.64.11.152</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.746875</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="eaad8ee7-089b-11ee-a1ed-016cb13a9e3b">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.42.97</data>
59
+ <data key="n_hostname">100.64.42.97</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.49375</data>
62
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
63
+ </node>
64
+ <node id="be6bda84-0625-11ee-9f36-61ae8743c399">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.68.22</data>
67
+ <data key="n_hostname">100.64.68.22</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.6625</data>
70
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
71
+ </node>
72
+ <node id="2665160c-1bdf-11ee-8607-492db2902e1f">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.18.117</data>
75
+ <data key="n_hostname">100.64.18.117</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.49375</data>
78
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
79
+ </node>
80
+ <node id="094cb515-0626-11ee-9f36-61ae8743c399">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.68.40</data>
83
+ <data key="n_hostname">100.64.68.40</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.6625</data>
86
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]</data>
87
+ </node>
88
+ <node id="094cdc22-0626-11ee-9f36-61ae8743c399">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.68.45</data>
91
+ <data key="n_hostname">100.64.68.45</data>
92
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.6625</data>
94
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
95
+ </node>
96
+ <node id="0281541e-51b3-11ee-9902-ad8c1f250d40">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.48.110</data>
99
+ <data key="n_hostname">100.64.48.110</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.746875</data>
102
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
103
+ </node>
104
+ <edge id="e1" source="HOST-11918" target="HOST-11404">
105
+ <data key="e_type">INCIDENT_LINK</data>
106
+ <data key="e_timestamp">1695105015</data>
107
+ <data key="e_label_binary">malicious</data>
108
+ <data key="e_label_confidence">0.746875</data>
109
+ <data key="e_suspicion_score">0.746875</data>
110
+ <data key="e_mo_name">Data Theft</data>
111
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
112
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
113
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
114
+ <data key="e_lifecycle_stage">complete-mission</data>
115
+ <data key="e_disposition">Disrupted</data>
116
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
117
+ </edge>
118
+ <edge id="e2" source="HOST-11404" target="HOST-11918">
119
+ <data key="e_type">INCIDENT_LINK</data>
120
+ <data key="e_timestamp">1695105015</data>
121
+ <data key="e_label_binary">malicious</data>
122
+ <data key="e_label_confidence">0.746875</data>
123
+ <data key="e_suspicion_score">0.746875</data>
124
+ <data key="e_mo_name">Data Theft</data>
125
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
126
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
127
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
128
+ <data key="e_lifecycle_stage">complete-mission</data>
129
+ <data key="e_disposition">Disrupted</data>
130
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
131
+ </edge>
132
+ <edge id="e3" source="HOST-11653" target="HOST-11404">
133
+ <data key="e_type">INCIDENT_LINK</data>
134
+ <data key="e_timestamp">1695105015</data>
135
+ <data key="e_label_binary">malicious</data>
136
+ <data key="e_label_confidence">0.746875</data>
137
+ <data key="e_suspicion_score">0.746875</data>
138
+ <data key="e_mo_name">Data Theft</data>
139
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
140
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
141
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
142
+ <data key="e_lifecycle_stage">complete-mission</data>
143
+ <data key="e_disposition">Disrupted</data>
144
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
145
+ </edge>
146
+ <edge id="e4" source="HOST-11404" target="HOST-11653">
147
+ <data key="e_type">INCIDENT_LINK</data>
148
+ <data key="e_timestamp">1695105015</data>
149
+ <data key="e_label_binary">malicious</data>
150
+ <data key="e_label_confidence">0.746875</data>
151
+ <data key="e_suspicion_score">0.746875</data>
152
+ <data key="e_mo_name">Data Theft</data>
153
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
154
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
155
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
156
+ <data key="e_lifecycle_stage">complete-mission</data>
157
+ <data key="e_disposition">Disrupted</data>
158
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
159
+ </edge>
160
+ <edge id="e5" source="HOST-11557" target="HOST-11392">
161
+ <data key="e_type">INCIDENT_LINK</data>
162
+ <data key="e_timestamp">1695105015</data>
163
+ <data key="e_label_binary">malicious</data>
164
+ <data key="e_label_confidence">0.746875</data>
165
+ <data key="e_suspicion_score">0.746875</data>
166
+ <data key="e_mo_name">Data Theft</data>
167
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
168
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
169
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
170
+ <data key="e_lifecycle_stage">complete-mission</data>
171
+ <data key="e_disposition">Disrupted</data>
172
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
173
+ </edge>
174
+ <edge id="e6" source="HOST-11392" target="HOST-11557">
175
+ <data key="e_type">INCIDENT_LINK</data>
176
+ <data key="e_timestamp">1695105015</data>
177
+ <data key="e_label_binary">malicious</data>
178
+ <data key="e_label_confidence">0.746875</data>
179
+ <data key="e_suspicion_score">0.746875</data>
180
+ <data key="e_mo_name">Data Theft</data>
181
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
182
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
183
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
184
+ <data key="e_lifecycle_stage">complete-mission</data>
185
+ <data key="e_disposition">Disrupted</data>
186
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
187
+ </edge>
188
+ <edge id="e7" source="HOST-11918" target="HOST-11392">
189
+ <data key="e_type">INCIDENT_LINK</data>
190
+ <data key="e_timestamp">1695105015</data>
191
+ <data key="e_label_binary">malicious</data>
192
+ <data key="e_label_confidence">0.746875</data>
193
+ <data key="e_suspicion_score">0.746875</data>
194
+ <data key="e_mo_name">Data Theft</data>
195
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
196
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
197
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
198
+ <data key="e_lifecycle_stage">complete-mission</data>
199
+ <data key="e_disposition">Disrupted</data>
200
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
201
+ </edge>
202
+ <edge id="e8" source="HOST-11392" target="HOST-11918">
203
+ <data key="e_type">INCIDENT_LINK</data>
204
+ <data key="e_timestamp">1695105015</data>
205
+ <data key="e_label_binary">malicious</data>
206
+ <data key="e_label_confidence">0.746875</data>
207
+ <data key="e_suspicion_score">0.746875</data>
208
+ <data key="e_mo_name">Data Theft</data>
209
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
210
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
211
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
212
+ <data key="e_lifecycle_stage">complete-mission</data>
213
+ <data key="e_disposition">Disrupted</data>
214
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
215
+ </edge>
216
+ <edge id="e9" source="HOST-11451" target="HOST-11404">
217
+ <data key="e_type">INCIDENT_LINK</data>
218
+ <data key="e_timestamp">1695105015</data>
219
+ <data key="e_label_binary">malicious</data>
220
+ <data key="e_label_confidence">0.746875</data>
221
+ <data key="e_suspicion_score">0.746875</data>
222
+ <data key="e_mo_name">Data Theft</data>
223
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
224
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
225
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
226
+ <data key="e_lifecycle_stage">complete-mission</data>
227
+ <data key="e_disposition">Disrupted</data>
228
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
229
+ </edge>
230
+ <edge id="e10" source="HOST-11404" target="HOST-11451">
231
+ <data key="e_type">INCIDENT_LINK</data>
232
+ <data key="e_timestamp">1695105015</data>
233
+ <data key="e_label_binary">malicious</data>
234
+ <data key="e_label_confidence">0.746875</data>
235
+ <data key="e_suspicion_score">0.746875</data>
236
+ <data key="e_mo_name">Data Theft</data>
237
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
238
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
239
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
240
+ <data key="e_lifecycle_stage">complete-mission</data>
241
+ <data key="e_disposition">Disrupted</data>
242
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
243
+ </edge>
244
+ <edge id="e11" source="HOST-11557" target="HOST-11417">
245
+ <data key="e_type">INCIDENT_LINK</data>
246
+ <data key="e_timestamp">1695105015</data>
247
+ <data key="e_label_binary">malicious</data>
248
+ <data key="e_label_confidence">0.746875</data>
249
+ <data key="e_suspicion_score">0.746875</data>
250
+ <data key="e_mo_name">Data Theft</data>
251
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
252
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
253
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
254
+ <data key="e_lifecycle_stage">complete-mission</data>
255
+ <data key="e_disposition">Disrupted</data>
256
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
257
+ </edge>
258
+ <edge id="e12" source="HOST-11417" target="HOST-11557">
259
+ <data key="e_type">INCIDENT_LINK</data>
260
+ <data key="e_timestamp">1695105015</data>
261
+ <data key="e_label_binary">malicious</data>
262
+ <data key="e_label_confidence">0.746875</data>
263
+ <data key="e_suspicion_score">0.746875</data>
264
+ <data key="e_mo_name">Data Theft</data>
265
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
266
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
267
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
268
+ <data key="e_lifecycle_stage">complete-mission</data>
269
+ <data key="e_disposition">Disrupted</data>
270
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
271
+ </edge>
272
+ <edge id="e13" source="HOST-11918" target="HOST-11424">
273
+ <data key="e_type">INCIDENT_LINK</data>
274
+ <data key="e_timestamp">1695105015</data>
275
+ <data key="e_label_binary">malicious</data>
276
+ <data key="e_label_confidence">0.746875</data>
277
+ <data key="e_suspicion_score">0.746875</data>
278
+ <data key="e_mo_name">Data Theft</data>
279
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
280
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
281
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
282
+ <data key="e_lifecycle_stage">complete-mission</data>
283
+ <data key="e_disposition">Disrupted</data>
284
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
285
+ </edge>
286
+ <edge id="e14" source="HOST-11424" target="HOST-11918">
287
+ <data key="e_type">INCIDENT_LINK</data>
288
+ <data key="e_timestamp">1695105015</data>
289
+ <data key="e_label_binary">malicious</data>
290
+ <data key="e_label_confidence">0.746875</data>
291
+ <data key="e_suspicion_score">0.746875</data>
292
+ <data key="e_mo_name">Data Theft</data>
293
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
294
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
295
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
296
+ <data key="e_lifecycle_stage">complete-mission</data>
297
+ <data key="e_disposition">Disrupted</data>
298
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
299
+ </edge>
300
+ <edge id="e15" source="HOST-11702" target="HOST-11417">
301
+ <data key="e_type">INCIDENT_LINK</data>
302
+ <data key="e_timestamp">1695105015</data>
303
+ <data key="e_label_binary">malicious</data>
304
+ <data key="e_label_confidence">0.746875</data>
305
+ <data key="e_suspicion_score">0.746875</data>
306
+ <data key="e_mo_name">Data Theft</data>
307
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
308
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
309
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
310
+ <data key="e_lifecycle_stage">complete-mission</data>
311
+ <data key="e_disposition">Disrupted</data>
312
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
313
+ </edge>
314
+ <edge id="e16" source="HOST-11417" target="HOST-11702">
315
+ <data key="e_type">INCIDENT_LINK</data>
316
+ <data key="e_timestamp">1695105015</data>
317
+ <data key="e_label_binary">malicious</data>
318
+ <data key="e_label_confidence">0.746875</data>
319
+ <data key="e_suspicion_score">0.746875</data>
320
+ <data key="e_mo_name">Data Theft</data>
321
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
322
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
323
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
324
+ <data key="e_lifecycle_stage">complete-mission</data>
325
+ <data key="e_disposition">Disrupted</data>
326
+ <data key="e_incident_id">fe7a47c0-56b5-11ee-be44-f1fe26834d88</data>
327
+ </edge>
328
+ </graph>
329
+ </graphml>
graph/incidents_graphml/f/fe7b3350-286c-11ee-a80a-874bd8e06d7d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4faff9f1-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.28</data>
35
+ <data key="n_hostname">100.64.18.28</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.232.220</data>
43
+ <data key="n_hostname">172.16.232.220</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="4faff9f1-062a-11ee-94f6-0d301f382bbb" target="HOST-2748">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690015908</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe7b3350-286c-11ee-a80a-874bd8e06d7d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe7de710-156c-11ef-aecb-e5bec61c0532.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e8c39ed8-ed8d-11ee-be57-e7ce5e3153e8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.27.41</data>
35
+ <data key="n_hostname">100.64.27.41</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-5468" target="HOST-2759">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1716074334</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe7de710-156c-11ef-aecb-e5bec61c0532</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe840390-176e-11ee-a7dc-57e99513cc0a.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bde4c5a5-0624-11ee-b3ca-a7be26d46ce3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.74</data>
35
+ <data key="n_hostname">100.64.18.74</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.6625</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
39
+ </node>
40
+ <node id="bfbd5639-0624-11ee-bb59-61e1854d46e6">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.19</data>
43
+ <data key="n_hostname">100.64.68.19</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <node id="c9c2af8d-0625-11ee-9f36-61ae8743c399">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.68.23</data>
51
+ <data key="n_hostname">100.64.68.23</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.6625</data>
54
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
55
+ </node>
56
+ <edge id="e1" source="bde4c5a5-0624-11ee-b3ca-a7be26d46ce3" target="HOST-11388">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1688147597</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.6625</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">fe840390-176e-11ee-a7dc-57e99513cc0a</data>
69
+ </edge>
70
+ <edge id="e2" source="bde4c5a5-0624-11ee-b3ca-a7be26d46ce3" target="HOST-11393">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1688147597</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.6625</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">fe840390-176e-11ee-a7dc-57e99513cc0a</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/f/fe841c80-4f46-11ee-896d-938683508860.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c83c82b0-0d8e-11ee-abc5-c33c1874af11">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.54.240</data>
35
+ <data key="n_hostname">100.64.54.240</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.27.202.53</data>
43
+ <data key="n_hostname">172.27.202.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="c83c82b0-0d8e-11ee-abc5-c33c1874af11" target="HOST-2703">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694287683</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe841c80-4f46-11ee-896d-938683508860</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe883f00-368b-11ee-b839-f5eaf8816d24.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.208.219</data>
35
+ <data key="n_hostname">172.30.208.219</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="85205ae0-0629-11ee-a510-47d18ec77e75">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.7.183</data>
43
+ <data key="n_hostname">100.64.7.183</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2823" target="HOST-8000">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691568539</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe883f00-368b-11ee-b839-f5eaf8816d24</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe88fcd0-68d4-11ee-bfd3-8f3b77e847d5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d4cad660-0674-11ee-a987-994b59950834">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.41.56</data>
35
+ <data key="n_hostname">100.64.41.56</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.101.1</data>
43
+ <data key="n_hostname">172.31.101.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="d4cad660-0674-11ee-a987-994b59950834" target="HOST-2821">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697097450</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe88fcd0-68d4-11ee-bfd3-8f3b77e847d5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe8cb620-176e-11ee-a7dc-57e99513cc0a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bfbd5639-0624-11ee-bb59-61e1854d46e6">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.19</data>
35
+ <data key="n_hostname">100.64.68.19</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
39
+ </node>
40
+ <node id="bde4c5a5-0624-11ee-b3ca-a7be26d46ce3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.74</data>
43
+ <data key="n_hostname">100.64.18.74</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11388" target="HOST-11465">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688147597</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe8cb620-176e-11ee-a7dc-57e99513cc0a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe904880-9405-11ee-ae31-0b69a6db722c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.86.34</data>
35
+ <data key="n_hostname">172.23.86.34</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="634a2900-0a75-11ee-a335-71938ac40f73">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.21.110</data>
43
+ <data key="n_hostname">100.64.21.110</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2717" target="634a2900-0a75-11ee-a335-71938ac40f73">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701846396</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe904880-9405-11ee-ae31-0b69a6db722c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe907030-4f54-11ee-a8d7-55254673f433.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="fdf122f0-4f54-11ee-9eb9-471bb31d586d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.45.207</data>
35
+ <data key="n_hostname">100.64.45.207</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.229.11</data>
43
+ <data key="n_hostname">172.30.229.11</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="fdf122f0-4f54-11ee-9eb9-471bb31d586d" target="HOST-2750">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694293696</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe907030-4f54-11ee-a8d7-55254673f433</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe91ceb0-2df5-11ee-ad46-05b36c64c936.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1403df22-08cd-11ee-a07c-5d3cbd770ec7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.54.17</data>
35
+ <data key="n_hostname">100.64.54.17</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="1403df22-08cd-11ee-a07c-5d3cbd770ec7" target="HOST-2858">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690624505</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">fe91ceb0-2df5-11ee-ad46-05b36c64c936</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe923ec0-d347-11ee-9f4f-e3f2e08e6ef8.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="70bd9911-8bb1-11ee-bfab-a3c02d99d3a0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.127</data>
35
+ <data key="n_hostname">100.64.17.127</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.174.172</data>
43
+ <data key="n_hostname">172.30.174.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.26.23.117</data>
51
+ <data key="n_hostname">172.26.23.117</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-4135" target="HOST-2946">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1708801666</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">fe923ec0-d347-11ee-9f4f-e3f2e08e6ef8</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-4135" target="HOST-2824">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1708801666</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">fe923ec0-d347-11ee-9f4f-e3f2e08e6ef8</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/f/fe94ac50-71e1-11ed-b9a8-2b933f6712c2.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="73b116c4-5e7a-11ed-9ab4-6781f8ccc7cb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.82.105</data>
35
+ <data key="n_hostname">100.64.82.105</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="27169940-ea92-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.220</data>
43
+ <data key="n_hostname">100.64.72.220</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="73b116c4-5e7a-11ed-9ab4-6781f8ccc7cb" target="HOST-13767">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1669945097</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe94ac50-71e1-11ed-b9a8-2b933f6712c2</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13767" target="73b116c4-5e7a-11ed-9ab4-6781f8ccc7cb">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1669945097</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7890625</data>
67
+ <data key="e_suspicion_score">0.7890625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">fe94ac50-71e1-11ed-b9a8-2b933f6712c2</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/f/fe95cfc0-4f46-11ee-896d-938683508860.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.27.202.53</data>
35
+ <data key="n_hostname">172.27.202.53</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c83c82b0-0d8e-11ee-abc5-c33c1874af11">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.54.240</data>
43
+ <data key="n_hostname">100.64.54.240</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2703" target="HOST-9445">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694287683</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe95cfc0-4f46-11ee-896d-938683508860</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe9632f0-71e1-11ed-b9a8-2b933f6712c2.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d87a2cf4-713e-11ed-9798-a14fc61e151e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.82.106</data>
35
+ <data key="n_hostname">100.64.82.106</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="1446f860-41a8-11ed-8309-03853e266523">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.51</data>
43
+ <data key="n_hostname">100.64.72.51</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="d87a2cf4-713e-11ed-9798-a14fc61e151e" target="HOST-13708">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1669945097</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe9632f0-71e1-11ed-b9a8-2b933f6712c2</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13708" target="d87a2cf4-713e-11ed-9798-a14fc61e151e">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1669945097</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">fe9632f0-71e1-11ed-b9a8-2b933f6712c2</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/f/fe979280-71e1-11ed-b9a8-2b933f6712c2.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="54012e51-41ab-11ed-8309-03853e266523">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.71.116</data>
35
+ <data key="n_hostname">100.64.71.116</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
39
+ </node>
40
+ <node id="05d47791-ec4d-11ec-a89f-c7e7f4365772">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.16.220</data>
43
+ <data key="n_hostname">100.64.16.220</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.983125</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12686" target="HOST-12815">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1669945097</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.983125</data>
53
+ <data key="e_suspicion_score">0.983125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe979280-71e1-11ed-b9a8-2b933f6712c2</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-12815" target="HOST-12686">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1669945097</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.983125</data>
67
+ <data key="e_suspicion_score">0.983125</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">fe979280-71e1-11ed-b9a8-2b933f6712c2</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/f/fe997790-68d4-11ee-bfd3-8f3b77e847d5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.101.1</data>
35
+ <data key="n_hostname">172.31.101.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d4cad660-0674-11ee-a987-994b59950834">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.41.56</data>
43
+ <data key="n_hostname">100.64.41.56</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2821" target="HOST-7379">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697097450</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe997790-68d4-11ee-bfd3-8f3b77e847d5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe9b8c90-286c-11ee-a80a-874bd8e06d7d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="4faff9f1-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.28</data>
43
+ <data key="n_hostname">100.64.18.28</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2748" target="HOST-4208">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690015908</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe9b8c90-286c-11ee-a80a-874bd8e06d7d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe9be2d0-4d9c-11ee-b83a-49677896a1e8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.27.202.53</data>
35
+ <data key="n_hostname">172.27.202.53</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="051486c2-15d6-11ee-ad6a-ddb6c172e543">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.46.32</data>
43
+ <data key="n_hostname">100.64.46.32</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2703" target="HOST-8126">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694104717</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe9be2d0-4d9c-11ee-b83a-49677896a1e8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/f/fe9da340-572e-11ee-a77e-c7fa233c7f89.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.168.229</data>
35
+ <data key="n_hostname">172.23.168.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a2ab6a44-062a-11ee-9792-13ac4ddb104c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.11.17</data>
43
+ <data key="n_hostname">100.64.11.17</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2865" target="HOST-3255">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695156984</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">fe9da340-572e-11ee-a77e-c7fa233c7f89</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>