f15hb0wn commited on
Commit
7cf4fd1
·
verified ·
1 Parent(s): 5c39462

Upload per-incident GraphML sharded batch 13/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/7/7826c430-090f-11ee-8afe-6d26bac63fb3.graphml +77 -0
  2. graph/incidents_graphml/7/783465a0-7092-11ee-a33b-d3994469616f.graphml +63 -0
  3. graph/incidents_graphml/7/78353240-27a6-11ed-b92c-490402bdd5e6.graphml +63 -0
  4. graph/incidents_graphml/7/78394ac0-4f2c-11ee-896d-938683508860.graphml +63 -0
  5. graph/incidents_graphml/7/784552b0-7b60-11ee-b996-61ac976b8a88.graphml +63 -0
  6. graph/incidents_graphml/7/7845e6e0-a815-11ed-8da7-05bace042fb8.graphml +63 -0
  7. graph/incidents_graphml/7/784aa4e0-4ac3-11ee-adbc-ad3007b13df0.graphml +661 -0
  8. graph/incidents_graphml/7/784b2510-4f2c-11ee-896d-938683508860.graphml +63 -0
  9. graph/incidents_graphml/7/7851a390-2d94-11ee-a72a-b3e5c322bb35.graphml +63 -0
  10. graph/incidents_graphml/7/7858dad0-7285-11ee-9478-f721b34a9cef.graphml +129 -0
  11. graph/incidents_graphml/7/7860d470-a5a6-11ee-bda8-6b49f5844970.graphml +63 -0
  12. graph/incidents_graphml/7/7862f450-26d3-11ee-ac10-e7e87ad84b9c.graphml +85 -0
  13. graph/incidents_graphml/7/786302e0-26a8-11ee-bacb-e1766d74be09.graphml +63 -0
  14. graph/incidents_graphml/7/78660c50-3a81-11ee-b55b-6596b150fac1.graphml +77 -0
  15. graph/incidents_graphml/7/78676370-8be4-11ee-9efd-252771b20c20.graphml +221 -0
  16. graph/incidents_graphml/7/786a0890-3c71-11ee-89e7-7976671c0f18.graphml +149 -0
  17. graph/incidents_graphml/7/786a6700-7285-11ee-9478-f721b34a9cef.graphml +63 -0
  18. graph/incidents_graphml/7/786e3770-7b60-11ee-b996-61ac976b8a88.graphml +63 -0
  19. graph/incidents_graphml/7/786fd800-d773-11ed-b131-97a6b3859c17.graphml +113 -0
  20. graph/incidents_graphml/7/78751fc0-a5a6-11ee-bda8-6b49f5844970.graphml +63 -0
  21. graph/incidents_graphml/7/78752b50-26a8-11ee-bacb-e1766d74be09.graphml +63 -0
  22. graph/incidents_graphml/7/787849b0-7285-11ee-9478-f721b34a9cef.graphml +63 -0
  23. graph/incidents_graphml/7/78789f30-26d3-11ee-ac10-e7e87ad84b9c.graphml +63 -0
  24. graph/incidents_graphml/7/787a7b30-125f-11ee-8a81-b1159645422c.graphml +63 -0
  25. graph/incidents_graphml/7/787e6410-7b60-11ee-b996-61ac976b8a88.graphml +63 -0
  26. graph/incidents_graphml/7/787e92c0-0858-11ef-81c9-bbab78bb4e36.graphml +185 -0
  27. graph/incidents_graphml/7/787ef520-2d94-11ee-a72a-b3e5c322bb35.graphml +63 -0
  28. graph/incidents_graphml/7/78880120-7285-11ee-9478-f721b34a9cef.graphml +63 -0
  29. graph/incidents_graphml/7/788e7420-a5a6-11ee-bda8-6b49f5844970.graphml +63 -0
  30. graph/incidents_graphml/7/7899db70-7285-11ee-9478-f721b34a9cef.graphml +63 -0
  31. graph/incidents_graphml/7/789ccc00-a5a6-11ee-bda8-6b49f5844970.graphml +63 -0
  32. graph/incidents_graphml/7/789d0b90-10e4-11ee-aac5-6731911fd461.graphml +77 -0
  33. graph/incidents_graphml/7/78a02df0-8616-11ee-aad5-255bef0b512c.graphml +63 -0
  34. graph/incidents_graphml/7/78a086e0-2d94-11ee-a72a-b3e5c322bb35.graphml +63 -0
  35. graph/incidents_graphml/7/78a30310-7b60-11ee-b996-61ac976b8a88.graphml +63 -0
  36. graph/incidents_graphml/7/78a3ae10-125f-11ee-8a81-b1159645422c.graphml +63 -0
  37. graph/incidents_graphml/7/78b18200-7b60-11ee-b996-61ac976b8a88.graphml +63 -0
  38. graph/incidents_graphml/7/78b18ec0-31d9-11ed-a735-37a95a76e51b.graphml +63 -0
  39. graph/incidents_graphml/7/78b6b240-7285-11ee-9478-f721b34a9cef.graphml +63 -0
  40. graph/incidents_graphml/7/78c0ec90-4ec4-11ee-81d4-670b4c6897d4.graphml +63 -0
  41. graph/incidents_graphml/7/78c2ccd0-31d9-11ed-a735-37a95a76e51b.graphml +63 -0
  42. graph/incidents_graphml/7/78c7fcf0-31d9-11ed-a735-37a95a76e51b.graphml +63 -0
  43. graph/incidents_graphml/7/78ca2330-0451-11ef-82af-f11a2f279dd8.graphml +63 -0
  44. graph/incidents_graphml/7/78ce18e0-368f-11ee-b546-fb0db7567997.graphml +77 -0
  45. graph/incidents_graphml/7/78d0fda0-31d9-11ed-a735-37a95a76e51b.graphml +63 -0
  46. graph/incidents_graphml/7/78d18e60-4ec4-11ee-81d4-670b4c6897d4.graphml +63 -0
  47. graph/incidents_graphml/7/78d22a70-0508-11ed-8762-011b41c4e26e.graphml +617 -0
  48. graph/incidents_graphml/7/78d654d0-31d9-11ed-a735-37a95a76e51b.graphml +63 -0
  49. graph/incidents_graphml/7/78d6ade0-f51b-11ec-9c76-edb488c77bbc.graphml +77 -0
  50. graph/incidents_graphml/7/78dd8420-0451-11ef-82af-f11a2f279dd8.graphml +63 -0
graph/incidents_graphml/7/7826c430-090f-11ee-8afe-6d26bac63fb3.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4d453224-0643-11ee-a1c0-af40b19a49a7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">192.168.47.65</data>
35
+ <data key="n_hostname">192.168.47.65</data>
36
+ <data key="n_set_roles">[]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="3b0e38a3-0642-11ee-93f4-159fa6734fa9">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.0.196</data>
43
+ <data key="n_hostname">100.64.0.196</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="4d453224-0643-11ee-a1c0-af40b19a49a7" target="HOST-14628">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686567254</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">7826c430-090f-11ee-8afe-6d26bac63fb3</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-14628" target="4d453224-0643-11ee-a1c0-af40b19a49a7">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1686567254</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7890625</data>
67
+ <data key="e_suspicion_score">0.7890625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">7826c430-090f-11ee-8afe-6d26bac63fb3</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/7/783465a0-7092-11ee-a33b-d3994469616f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8022f183-3a5c-11ee-8d36-095c523cc26f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.51.100</data>
35
+ <data key="n_hostname">100.64.51.100</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.38.152</data>
43
+ <data key="n_hostname">172.18.38.152</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="8022f183-3a5c-11ee-8d36-095c523cc26f" target="HOST-2844">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697948488</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">783465a0-7092-11ee-a33b-d3994469616f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78353240-27a6-11ed-b92c-490402bdd5e6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3bec2bf0-f848-11ec-b20e-6b5a7e8b36aa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.72.80</data>
35
+ <data key="n_hostname">100.64.72.80</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="3bec2bf0-f848-11ec-b20e-6b5a7e8b36aa" target="HOST-12604">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1661783145</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">78353240-27a6-11ed-b92c-490402bdd5e6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78394ac0-4f2c-11ee-896d-938683508860.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="794224c2-4714-11ee-972f-e16ad738af16">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.43.98</data>
35
+ <data key="n_hostname">100.64.43.98</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f4-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.135.251.191</data>
43
+ <data key="n_hostname">10.135.251.191</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="794224c2-4714-11ee-972f-e16ad738af16" target="HOST-2751">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694276291</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">78394ac0-4f2c-11ee-896d-938683508860</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/784552b0-7b60-11ee-b996-61ac976b8a88.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="6fd4b820-4733-11ee-a264-3930de1ff725">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.35.202</data>
43
+ <data key="n_hostname">100.64.35.202</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2748" target="HOST-6632">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699136476</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">784552b0-7b60-11ee-b996-61ac976b8a88</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/7845e6e0-a815-11ed-8da7-05bace042fb8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8bf95607-9d88-11ed-a0d9-bbd531499cbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.33.154</data>
35
+ <data key="n_hostname">100.64.33.154</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c2bb4de0-9e2f-11ed-9f74-736119d17d35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.74.211.215</data>
43
+ <data key="n_hostname">HOST-16914</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="8bf95607-9d88-11ed-a0d9-bbd531499cbc" target="c2bb4de0-9e2f-11ed-9f74-736119d17d35">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1675904568</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">7845e6e0-a815-11ed-8da7-05bace042fb8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/784aa4e0-4ac3-11ee-adbc-ad3007b13df0.graphml ADDED
@@ -0,0 +1,661 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7d9bdc30-2489-11ee-8073-495bda61df65">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.20.208</data>
35
+ <data key="n_hostname">100.64.20.208</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.54.66</data>
43
+ <data key="n_hostname">172.24.54.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.9208984375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="f68aa9e0-0635-11ee-9d6d-657b75ea87a3">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.12.54</data>
51
+ <data key="n_hostname">100.64.12.54</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.18.38.152</data>
59
+ <data key="n_hostname">172.18.38.152</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="e9984c91-49fd-11ee-8283-5349dc86e3fc">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.20.209</data>
67
+ <data key="n_hostname">100.64.20.209</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="0d834b20-062c-11ee-adbd-cdf5aeb5810e">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.3.9</data>
75
+ <data key="n_hostname">100.64.3.9</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.4375</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="c2e32da1-062c-11ee-85b9-c1d3d8d0c43c">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.20.210</data>
83
+ <data key="n_hostname">100.64.20.210</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="61d05073-0626-11ee-87d2-5909d78e9e20">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.10.47</data>
91
+ <data key="n_hostname">100.64.10.47</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.71875</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="6f26c600-0626-11ee-b19f-ed665a42340f">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.4.187</data>
99
+ <data key="n_hostname">100.64.4.187</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="613b8a86-0626-11ee-b173-c9921719c2f8">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.20.211</data>
107
+ <data key="n_hostname">100.64.20.211</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.7890625</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="54a57d01-3dc4-11ee-a311-3d315a5cd8bb">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.20.212</data>
115
+ <data key="n_hostname">100.64.20.212</data>
116
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.7890625</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="5d286900-3a78-11ee-b008-ddac65ad9071">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.11.170</data>
123
+ <data key="n_hostname">100.64.11.170</data>
124
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
125
+ <data key="n_suspicion_score">0.7890625</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="813ae7e1-39b1-11ee-866e-cf8cfe737db9">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.20.213</data>
131
+ <data key="n_hostname">100.64.20.213</data>
132
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
133
+ <data key="n_suspicion_score">0.71875</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="d032d9c2-2075-11ee-aa93-bf2321873453">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.20.214</data>
139
+ <data key="n_hostname">100.64.20.214</data>
140
+ <data key="n_set_roles">["Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.578125</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <node id="cdcbc194-23a6-11ee-8838-e1dfb35cbff9">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.20.215</data>
147
+ <data key="n_hostname">100.64.20.215</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.4375</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="33606bf2-0796-11ee-ab91-19679f4386c1">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.20.216</data>
155
+ <data key="n_hostname">100.64.20.216</data>
156
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
157
+ <data key="n_suspicion_score">0.71875</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="d03dd283-0798-11ee-bec9-bd41090a2a4e">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.20.217</data>
163
+ <data key="n_hostname">100.64.20.217</data>
164
+ <data key="n_set_roles">["Exploiting Host"]</data>
165
+ <data key="n_suspicion_score">0.578125</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <node id="faea2e78-39b1-11ee-9580-89f3eedd0824">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">100.64.15.65</data>
171
+ <data key="n_hostname">100.64.15.65</data>
172
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
173
+ <data key="n_suspicion_score">0.7890625</data>
174
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
175
+ </node>
176
+ <node id="8c22c4e0-4abc-11ee-8fb7-05dbe72469d4">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">100.64.19.132</data>
179
+ <data key="n_hostname">100.64.19.132</data>
180
+ <data key="n_set_roles">["Exploiting Host"]</data>
181
+ <data key="n_suspicion_score">0.4375</data>
182
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
183
+ </node>
184
+ <edge id="e1" source="7d9bdc30-2489-11ee-8073-495bda61df65" target="HOST-2745">
185
+ <data key="e_type">INCIDENT_LINK</data>
186
+ <data key="e_timestamp">1693791389</data>
187
+ <data key="e_label_binary">malicious</data>
188
+ <data key="e_label_confidence">0.9208984375</data>
189
+ <data key="e_suspicion_score">0.9208984375</data>
190
+ <data key="e_mo_name">Data Theft</data>
191
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
192
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
193
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
194
+ <data key="e_lifecycle_stage">complete-mission</data>
195
+ <data key="e_disposition">Disrupted</data>
196
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
197
+ </edge>
198
+ <edge id="e2" source="HOST-3392" target="HOST-2844">
199
+ <data key="e_type">INCIDENT_LINK</data>
200
+ <data key="e_timestamp">1693791389</data>
201
+ <data key="e_label_binary">malicious</data>
202
+ <data key="e_label_confidence">0.9208984375</data>
203
+ <data key="e_suspicion_score">0.9208984375</data>
204
+ <data key="e_mo_name">Data Theft</data>
205
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
206
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
207
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
208
+ <data key="e_lifecycle_stage">complete-mission</data>
209
+ <data key="e_disposition">Disrupted</data>
210
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
211
+ </edge>
212
+ <edge id="e3" source="e9984c91-49fd-11ee-8283-5349dc86e3fc" target="HOST-2745">
213
+ <data key="e_type">INCIDENT_LINK</data>
214
+ <data key="e_timestamp">1693791389</data>
215
+ <data key="e_label_binary">malicious</data>
216
+ <data key="e_label_confidence">0.9208984375</data>
217
+ <data key="e_suspicion_score">0.9208984375</data>
218
+ <data key="e_mo_name">Data Theft</data>
219
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
220
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
221
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
222
+ <data key="e_lifecycle_stage">complete-mission</data>
223
+ <data key="e_disposition">Disrupted</data>
224
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
225
+ </edge>
226
+ <edge id="e4" source="HOST-2745" target="e9984c91-49fd-11ee-8283-5349dc86e3fc">
227
+ <data key="e_type">INCIDENT_LINK</data>
228
+ <data key="e_timestamp">1693791389</data>
229
+ <data key="e_label_binary">malicious</data>
230
+ <data key="e_label_confidence">0.9208984375</data>
231
+ <data key="e_suspicion_score">0.9208984375</data>
232
+ <data key="e_mo_name">Data Theft</data>
233
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
234
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
235
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
236
+ <data key="e_lifecycle_stage">complete-mission</data>
237
+ <data key="e_disposition">Disrupted</data>
238
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
239
+ </edge>
240
+ <edge id="e5" source="0d834b20-062c-11ee-adbd-cdf5aeb5810e" target="HOST-2745">
241
+ <data key="e_type">INCIDENT_LINK</data>
242
+ <data key="e_timestamp">1693791389</data>
243
+ <data key="e_label_binary">malicious</data>
244
+ <data key="e_label_confidence">0.9208984375</data>
245
+ <data key="e_suspicion_score">0.9208984375</data>
246
+ <data key="e_mo_name">Data Theft</data>
247
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
248
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
249
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
250
+ <data key="e_lifecycle_stage">complete-mission</data>
251
+ <data key="e_disposition">Disrupted</data>
252
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
253
+ </edge>
254
+ <edge id="e6" source="HOST-2745" target="0d834b20-062c-11ee-adbd-cdf5aeb5810e">
255
+ <data key="e_type">INCIDENT_LINK</data>
256
+ <data key="e_timestamp">1693791389</data>
257
+ <data key="e_label_binary">malicious</data>
258
+ <data key="e_label_confidence">0.9208984375</data>
259
+ <data key="e_suspicion_score">0.9208984375</data>
260
+ <data key="e_mo_name">Data Theft</data>
261
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
262
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
263
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
264
+ <data key="e_lifecycle_stage">complete-mission</data>
265
+ <data key="e_disposition">Disrupted</data>
266
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
267
+ </edge>
268
+ <edge id="e7" source="c2e32da1-062c-11ee-85b9-c1d3d8d0c43c" target="HOST-2745">
269
+ <data key="e_type">INCIDENT_LINK</data>
270
+ <data key="e_timestamp">1693791389</data>
271
+ <data key="e_label_binary">malicious</data>
272
+ <data key="e_label_confidence">0.9208984375</data>
273
+ <data key="e_suspicion_score">0.9208984375</data>
274
+ <data key="e_mo_name">Data Theft</data>
275
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
276
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
277
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
278
+ <data key="e_lifecycle_stage">complete-mission</data>
279
+ <data key="e_disposition">Disrupted</data>
280
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
281
+ </edge>
282
+ <edge id="e8" source="HOST-2745" target="c2e32da1-062c-11ee-85b9-c1d3d8d0c43c">
283
+ <data key="e_type">INCIDENT_LINK</data>
284
+ <data key="e_timestamp">1693791389</data>
285
+ <data key="e_label_binary">malicious</data>
286
+ <data key="e_label_confidence">0.9208984375</data>
287
+ <data key="e_suspicion_score">0.9208984375</data>
288
+ <data key="e_mo_name">Data Theft</data>
289
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
290
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
291
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
292
+ <data key="e_lifecycle_stage">complete-mission</data>
293
+ <data key="e_disposition">Disrupted</data>
294
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
295
+ </edge>
296
+ <edge id="e9" source="HOST-2745" target="HOST-3135">
297
+ <data key="e_type">INCIDENT_LINK</data>
298
+ <data key="e_timestamp">1693791389</data>
299
+ <data key="e_label_binary">malicious</data>
300
+ <data key="e_label_confidence">0.9208984375</data>
301
+ <data key="e_suspicion_score">0.9208984375</data>
302
+ <data key="e_mo_name">Data Theft</data>
303
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
304
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
305
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
306
+ <data key="e_lifecycle_stage">complete-mission</data>
307
+ <data key="e_disposition">Disrupted</data>
308
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
309
+ </edge>
310
+ <edge id="e10" source="6f26c600-0626-11ee-b19f-ed665a42340f" target="HOST-2745">
311
+ <data key="e_type">INCIDENT_LINK</data>
312
+ <data key="e_timestamp">1693791389</data>
313
+ <data key="e_label_binary">malicious</data>
314
+ <data key="e_label_confidence">0.9208984375</data>
315
+ <data key="e_suspicion_score">0.9208984375</data>
316
+ <data key="e_mo_name">Data Theft</data>
317
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
318
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
319
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
320
+ <data key="e_lifecycle_stage">complete-mission</data>
321
+ <data key="e_disposition">Disrupted</data>
322
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
323
+ </edge>
324
+ <edge id="e11" source="HOST-2745" target="6f26c600-0626-11ee-b19f-ed665a42340f">
325
+ <data key="e_type">INCIDENT_LINK</data>
326
+ <data key="e_timestamp">1693791389</data>
327
+ <data key="e_label_binary">malicious</data>
328
+ <data key="e_label_confidence">0.9208984375</data>
329
+ <data key="e_suspicion_score">0.9208984375</data>
330
+ <data key="e_mo_name">Data Theft</data>
331
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
332
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
333
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
334
+ <data key="e_lifecycle_stage">complete-mission</data>
335
+ <data key="e_disposition">Disrupted</data>
336
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
337
+ </edge>
338
+ <edge id="e12" source="HOST-2745" target="7d9bdc30-2489-11ee-8073-495bda61df65">
339
+ <data key="e_type">INCIDENT_LINK</data>
340
+ <data key="e_timestamp">1693791389</data>
341
+ <data key="e_label_binary">malicious</data>
342
+ <data key="e_label_confidence">0.9208984375</data>
343
+ <data key="e_suspicion_score">0.9208984375</data>
344
+ <data key="e_mo_name">Data Theft</data>
345
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
346
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
347
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
348
+ <data key="e_lifecycle_stage">complete-mission</data>
349
+ <data key="e_disposition">Disrupted</data>
350
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
351
+ </edge>
352
+ <edge id="e13" source="613b8a86-0626-11ee-b173-c9921719c2f8" target="HOST-2745">
353
+ <data key="e_type">INCIDENT_LINK</data>
354
+ <data key="e_timestamp">1693791389</data>
355
+ <data key="e_label_binary">malicious</data>
356
+ <data key="e_label_confidence">0.9208984375</data>
357
+ <data key="e_suspicion_score">0.9208984375</data>
358
+ <data key="e_mo_name">Data Theft</data>
359
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
360
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
361
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
362
+ <data key="e_lifecycle_stage">complete-mission</data>
363
+ <data key="e_disposition">Disrupted</data>
364
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
365
+ </edge>
366
+ <edge id="e14" source="HOST-2745" target="613b8a86-0626-11ee-b173-c9921719c2f8">
367
+ <data key="e_type">INCIDENT_LINK</data>
368
+ <data key="e_timestamp">1693791389</data>
369
+ <data key="e_label_binary">malicious</data>
370
+ <data key="e_label_confidence">0.9208984375</data>
371
+ <data key="e_suspicion_score">0.9208984375</data>
372
+ <data key="e_mo_name">Data Theft</data>
373
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
374
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
375
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
376
+ <data key="e_lifecycle_stage">complete-mission</data>
377
+ <data key="e_disposition">Disrupted</data>
378
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
379
+ </edge>
380
+ <edge id="e15" source="54a57d01-3dc4-11ee-a311-3d315a5cd8bb" target="HOST-2745">
381
+ <data key="e_type">INCIDENT_LINK</data>
382
+ <data key="e_timestamp">1693791389</data>
383
+ <data key="e_label_binary">malicious</data>
384
+ <data key="e_label_confidence">0.9208984375</data>
385
+ <data key="e_suspicion_score">0.9208984375</data>
386
+ <data key="e_mo_name">Data Theft</data>
387
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
388
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
389
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
390
+ <data key="e_lifecycle_stage">complete-mission</data>
391
+ <data key="e_disposition">Disrupted</data>
392
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
393
+ </edge>
394
+ <edge id="e16" source="HOST-2745" target="54a57d01-3dc4-11ee-a311-3d315a5cd8bb">
395
+ <data key="e_type">INCIDENT_LINK</data>
396
+ <data key="e_timestamp">1693791389</data>
397
+ <data key="e_label_binary">malicious</data>
398
+ <data key="e_label_confidence">0.9208984375</data>
399
+ <data key="e_suspicion_score">0.9208984375</data>
400
+ <data key="e_mo_name">Data Theft</data>
401
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
402
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
403
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
404
+ <data key="e_lifecycle_stage">complete-mission</data>
405
+ <data key="e_disposition">Disrupted</data>
406
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
407
+ </edge>
408
+ <edge id="e17" source="HOST-3322" target="HOST-2745">
409
+ <data key="e_type">INCIDENT_LINK</data>
410
+ <data key="e_timestamp">1693791389</data>
411
+ <data key="e_label_binary">malicious</data>
412
+ <data key="e_label_confidence">0.9208984375</data>
413
+ <data key="e_suspicion_score">0.9208984375</data>
414
+ <data key="e_mo_name">Data Theft</data>
415
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
416
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
417
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
418
+ <data key="e_lifecycle_stage">complete-mission</data>
419
+ <data key="e_disposition">Disrupted</data>
420
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
421
+ </edge>
422
+ <edge id="e18" source="HOST-2745" target="HOST-3322">
423
+ <data key="e_type">INCIDENT_LINK</data>
424
+ <data key="e_timestamp">1693791389</data>
425
+ <data key="e_label_binary">malicious</data>
426
+ <data key="e_label_confidence">0.9208984375</data>
427
+ <data key="e_suspicion_score">0.9208984375</data>
428
+ <data key="e_mo_name">Data Theft</data>
429
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
430
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
431
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
432
+ <data key="e_lifecycle_stage">complete-mission</data>
433
+ <data key="e_disposition">Disrupted</data>
434
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
435
+ </edge>
436
+ <edge id="e19" source="813ae7e1-39b1-11ee-866e-cf8cfe737db9" target="HOST-2745">
437
+ <data key="e_type">INCIDENT_LINK</data>
438
+ <data key="e_timestamp">1693791389</data>
439
+ <data key="e_label_binary">malicious</data>
440
+ <data key="e_label_confidence">0.9208984375</data>
441
+ <data key="e_suspicion_score">0.9208984375</data>
442
+ <data key="e_mo_name">Data Theft</data>
443
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
444
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
445
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
446
+ <data key="e_lifecycle_stage">complete-mission</data>
447
+ <data key="e_disposition">Disrupted</data>
448
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
449
+ </edge>
450
+ <edge id="e20" source="HOST-2745" target="813ae7e1-39b1-11ee-866e-cf8cfe737db9">
451
+ <data key="e_type">INCIDENT_LINK</data>
452
+ <data key="e_timestamp">1693791389</data>
453
+ <data key="e_label_binary">malicious</data>
454
+ <data key="e_label_confidence">0.9208984375</data>
455
+ <data key="e_suspicion_score">0.9208984375</data>
456
+ <data key="e_mo_name">Data Theft</data>
457
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
458
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
459
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
460
+ <data key="e_lifecycle_stage">complete-mission</data>
461
+ <data key="e_disposition">Disrupted</data>
462
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
463
+ </edge>
464
+ <edge id="e21" source="d032d9c2-2075-11ee-aa93-bf2321873453" target="HOST-2745">
465
+ <data key="e_type">INCIDENT_LINK</data>
466
+ <data key="e_timestamp">1693791389</data>
467
+ <data key="e_label_binary">malicious</data>
468
+ <data key="e_label_confidence">0.9208984375</data>
469
+ <data key="e_suspicion_score">0.9208984375</data>
470
+ <data key="e_mo_name">Data Theft</data>
471
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
472
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
473
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
474
+ <data key="e_lifecycle_stage">complete-mission</data>
475
+ <data key="e_disposition">Disrupted</data>
476
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
477
+ </edge>
478
+ <edge id="e22" source="HOST-2745" target="d032d9c2-2075-11ee-aa93-bf2321873453">
479
+ <data key="e_type">INCIDENT_LINK</data>
480
+ <data key="e_timestamp">1693791389</data>
481
+ <data key="e_label_binary">malicious</data>
482
+ <data key="e_label_confidence">0.9208984375</data>
483
+ <data key="e_suspicion_score">0.9208984375</data>
484
+ <data key="e_mo_name">Data Theft</data>
485
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
486
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
487
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
488
+ <data key="e_lifecycle_stage">complete-mission</data>
489
+ <data key="e_disposition">Disrupted</data>
490
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
491
+ </edge>
492
+ <edge id="e23" source="HOST-2745" target="cdcbc194-23a6-11ee-8838-e1dfb35cbff9">
493
+ <data key="e_type">INCIDENT_LINK</data>
494
+ <data key="e_timestamp">1693791389</data>
495
+ <data key="e_label_binary">malicious</data>
496
+ <data key="e_label_confidence">0.9208984375</data>
497
+ <data key="e_suspicion_score">0.9208984375</data>
498
+ <data key="e_mo_name">Data Theft</data>
499
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
500
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
501
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
502
+ <data key="e_lifecycle_stage">complete-mission</data>
503
+ <data key="e_disposition">Disrupted</data>
504
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
505
+ </edge>
506
+ <edge id="e24" source="33606bf2-0796-11ee-ab91-19679f4386c1" target="HOST-2745">
507
+ <data key="e_type">INCIDENT_LINK</data>
508
+ <data key="e_timestamp">1693791389</data>
509
+ <data key="e_label_binary">malicious</data>
510
+ <data key="e_label_confidence">0.9208984375</data>
511
+ <data key="e_suspicion_score">0.9208984375</data>
512
+ <data key="e_mo_name">Data Theft</data>
513
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
514
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
515
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
516
+ <data key="e_lifecycle_stage">complete-mission</data>
517
+ <data key="e_disposition">Disrupted</data>
518
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
519
+ </edge>
520
+ <edge id="e25" source="HOST-2745" target="33606bf2-0796-11ee-ab91-19679f4386c1">
521
+ <data key="e_type">INCIDENT_LINK</data>
522
+ <data key="e_timestamp">1693791389</data>
523
+ <data key="e_label_binary">malicious</data>
524
+ <data key="e_label_confidence">0.9208984375</data>
525
+ <data key="e_suspicion_score">0.9208984375</data>
526
+ <data key="e_mo_name">Data Theft</data>
527
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
528
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
529
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
530
+ <data key="e_lifecycle_stage">complete-mission</data>
531
+ <data key="e_disposition">Disrupted</data>
532
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
533
+ </edge>
534
+ <edge id="e26" source="HOST-2745" target="d03dd283-0798-11ee-bec9-bd41090a2a4e">
535
+ <data key="e_type">INCIDENT_LINK</data>
536
+ <data key="e_timestamp">1693791389</data>
537
+ <data key="e_label_binary">malicious</data>
538
+ <data key="e_label_confidence">0.9208984375</data>
539
+ <data key="e_suspicion_score">0.9208984375</data>
540
+ <data key="e_mo_name">Data Theft</data>
541
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
542
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
543
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
544
+ <data key="e_lifecycle_stage">complete-mission</data>
545
+ <data key="e_disposition">Disrupted</data>
546
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
547
+ </edge>
548
+ <edge id="e27" source="HOST-3392" target="HOST-2745">
549
+ <data key="e_type">INCIDENT_LINK</data>
550
+ <data key="e_timestamp">1693791389</data>
551
+ <data key="e_label_binary">malicious</data>
552
+ <data key="e_label_confidence">0.9208984375</data>
553
+ <data key="e_suspicion_score">0.9208984375</data>
554
+ <data key="e_mo_name">Data Theft</data>
555
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
556
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
557
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
558
+ <data key="e_lifecycle_stage">complete-mission</data>
559
+ <data key="e_disposition">Disrupted</data>
560
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
561
+ </edge>
562
+ <edge id="e28" source="HOST-2745" target="HOST-3392">
563
+ <data key="e_type">INCIDENT_LINK</data>
564
+ <data key="e_timestamp">1693791389</data>
565
+ <data key="e_label_binary">malicious</data>
566
+ <data key="e_label_confidence">0.9208984375</data>
567
+ <data key="e_suspicion_score">0.9208984375</data>
568
+ <data key="e_mo_name">Data Theft</data>
569
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
570
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
571
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
572
+ <data key="e_lifecycle_stage">complete-mission</data>
573
+ <data key="e_disposition">Disrupted</data>
574
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
575
+ </edge>
576
+ <edge id="e29" source="faea2e78-39b1-11ee-9580-89f3eedd0824" target="HOST-2745">
577
+ <data key="e_type">INCIDENT_LINK</data>
578
+ <data key="e_timestamp">1693791389</data>
579
+ <data key="e_label_binary">malicious</data>
580
+ <data key="e_label_confidence">0.9208984375</data>
581
+ <data key="e_suspicion_score">0.9208984375</data>
582
+ <data key="e_mo_name">Data Theft</data>
583
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
584
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
585
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
586
+ <data key="e_lifecycle_stage">complete-mission</data>
587
+ <data key="e_disposition">Disrupted</data>
588
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
589
+ </edge>
590
+ <edge id="e30" source="HOST-2745" target="faea2e78-39b1-11ee-9580-89f3eedd0824">
591
+ <data key="e_type">INCIDENT_LINK</data>
592
+ <data key="e_timestamp">1693791389</data>
593
+ <data key="e_label_binary">malicious</data>
594
+ <data key="e_label_confidence">0.9208984375</data>
595
+ <data key="e_suspicion_score">0.9208984375</data>
596
+ <data key="e_mo_name">Data Theft</data>
597
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
598
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
599
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
600
+ <data key="e_lifecycle_stage">complete-mission</data>
601
+ <data key="e_disposition">Disrupted</data>
602
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
603
+ </edge>
604
+ <edge id="e31" source="HOST-4398" target="HOST-2745">
605
+ <data key="e_type">INCIDENT_LINK</data>
606
+ <data key="e_timestamp">1693791389</data>
607
+ <data key="e_label_binary">malicious</data>
608
+ <data key="e_label_confidence">0.9208984375</data>
609
+ <data key="e_suspicion_score">0.9208984375</data>
610
+ <data key="e_mo_name">Data Theft</data>
611
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
612
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
613
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
614
+ <data key="e_lifecycle_stage">complete-mission</data>
615
+ <data key="e_disposition">Disrupted</data>
616
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
617
+ </edge>
618
+ <edge id="e32" source="HOST-2745" target="HOST-4398">
619
+ <data key="e_type">INCIDENT_LINK</data>
620
+ <data key="e_timestamp">1693791389</data>
621
+ <data key="e_label_binary">malicious</data>
622
+ <data key="e_label_confidence">0.9208984375</data>
623
+ <data key="e_suspicion_score">0.9208984375</data>
624
+ <data key="e_mo_name">Data Theft</data>
625
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
626
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
627
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
628
+ <data key="e_lifecycle_stage">complete-mission</data>
629
+ <data key="e_disposition">Disrupted</data>
630
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
631
+ </edge>
632
+ <edge id="e33" source="33606bf2-0796-11ee-ab91-19679f4386c1" target="HOST-2745">
633
+ <data key="e_type">INCIDENT_LINK</data>
634
+ <data key="e_timestamp">1693791389</data>
635
+ <data key="e_label_binary">malicious</data>
636
+ <data key="e_label_confidence">0.9208984375</data>
637
+ <data key="e_suspicion_score">0.9208984375</data>
638
+ <data key="e_mo_name">Data Theft</data>
639
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
640
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
641
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
642
+ <data key="e_lifecycle_stage">complete-mission</data>
643
+ <data key="e_disposition">Disrupted</data>
644
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
645
+ </edge>
646
+ <edge id="e34" source="HOST-2745" target="33606bf2-0796-11ee-ab91-19679f4386c1">
647
+ <data key="e_type">INCIDENT_LINK</data>
648
+ <data key="e_timestamp">1693791389</data>
649
+ <data key="e_label_binary">malicious</data>
650
+ <data key="e_label_confidence">0.9208984375</data>
651
+ <data key="e_suspicion_score">0.9208984375</data>
652
+ <data key="e_mo_name">Data Theft</data>
653
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
654
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
655
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
656
+ <data key="e_lifecycle_stage">complete-mission</data>
657
+ <data key="e_disposition">Disrupted</data>
658
+ <data key="e_incident_id">784aa4e0-4ac3-11ee-adbc-ad3007b13df0</data>
659
+ </edge>
660
+ </graph>
661
+ </graphml>
graph/incidents_graphml/7/784b2510-4f2c-11ee-896d-938683508860.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f4-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.135.251.191</data>
35
+ <data key="n_hostname">10.135.251.191</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="794224c2-4714-11ee-972f-e16ad738af16">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.43.98</data>
43
+ <data key="n_hostname">100.64.43.98</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2751" target="HOST-7708">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694276291</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">784b2510-4f2c-11ee-896d-938683508860</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/7851a390-2d94-11ee-a72a-b3e5c322bb35.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.86.34</data>
35
+ <data key="n_hostname">172.23.86.34</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="528fc8b5-0627-11ee-b144-2b760827f5b0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.6.247</data>
43
+ <data key="n_hostname">100.64.6.247</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2717" target="HOST-4692">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690582619</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">7851a390-2d94-11ee-a72a-b3e5c322bb35</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/7858dad0-7285-11ee-9478-f721b34a9cef.graphml ADDED
@@ -0,0 +1,129 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ba4a05b6-489e-11ee-92b3-ef01eaab3dc6">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.30.30</data>
35
+ <data key="n_hostname">100.64.30.30</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.168.229</data>
43
+ <data key="n_hostname">172.23.168.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.30.214.148</data>
51
+ <data key="n_hostname">172.30.214.148</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.23.86.34</data>
59
+ <data key="n_hostname">172.23.86.34</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">172.26.23.117</data>
67
+ <data key="n_hostname">172.26.23.117</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <edge id="e1" source="HOST-5895" target="HOST-2865">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1698162807</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.7</data>
77
+ <data key="e_suspicion_score">0.25</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Unprocessed</data>
84
+ <data key="e_incident_id">7858dad0-7285-11ee-9478-f721b34a9cef</data>
85
+ </edge>
86
+ <edge id="e2" source="HOST-5895" target="HOST-2720">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1698162807</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.7</data>
91
+ <data key="e_suspicion_score">0.25</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Unprocessed</data>
98
+ <data key="e_incident_id">7858dad0-7285-11ee-9478-f721b34a9cef</data>
99
+ </edge>
100
+ <edge id="e3" source="HOST-5895" target="HOST-2717">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1698162807</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.7</data>
105
+ <data key="e_suspicion_score">0.25</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Unprocessed</data>
112
+ <data key="e_incident_id">7858dad0-7285-11ee-9478-f721b34a9cef</data>
113
+ </edge>
114
+ <edge id="e4" source="HOST-5895" target="HOST-2824">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1698162807</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.7</data>
119
+ <data key="e_suspicion_score">0.25</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Unprocessed</data>
126
+ <data key="e_incident_id">7858dad0-7285-11ee-9478-f721b34a9cef</data>
127
+ </edge>
128
+ </graph>
129
+ </graphml>
graph/incidents_graphml/7/7860d470-a5a6-11ee-bda8-6b49f5844970.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="050b7f14-6e07-11ee-b207-f15e767ad299">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.29.135</data>
35
+ <data key="n_hostname">100.64.29.135</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="063b24c3-0625-11ee-a31e-2bbd16ce2d59">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.38</data>
43
+ <data key="n_hostname">100.64.68.38</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11435" target="HOST-11412">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703784489</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">7860d470-a5a6-11ee-bda8-6b49f5844970</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/7862f450-26d3-11ee-ac10-e7e87ad84b9c.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f092e6b2-09af-11ee-b6ef-9b21c1e77b5b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.49.194</data>
35
+ <data key="n_hostname">100.64.49.194</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.191.229</data>
43
+ <data key="n_hostname">172.24.191.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.26.73.92</data>
51
+ <data key="n_hostname">172.26.73.92</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-8671" target="HOST-2839">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1689840019</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7890625</data>
61
+ <data key="e_suspicion_score">0.7890625</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">7862f450-26d3-11ee-ac10-e7e87ad84b9c</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-8671" target="HOST-2724">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1689840019</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7890625</data>
75
+ <data key="e_suspicion_score">0.7890625</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">7862f450-26d3-11ee-ac10-e7e87ad84b9c</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/7/786302e0-26a8-11ee-bacb-e1766d74be09.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="884b1888-062a-11ee-b144-2b760827f5b0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.36.122</data>
35
+ <data key="n_hostname">100.64.36.122</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.208.219</data>
43
+ <data key="n_hostname">172.30.208.219</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-6729" target="HOST-2823">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689821551</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">786302e0-26a8-11ee-bacb-e1766d74be09</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78660c50-3a81-11ee-b55b-6596b150fac1.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ac7f1d73-3558-11ee-b7a8-5d5db7cd8ffb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.85</data>
35
+ <data key="n_hostname">100.64.68.85</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.49375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="56cc99f4-0625-11ee-ae19-679f8bc2c45f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.28</data>
43
+ <data key="n_hostname">100.64.68.28</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="ac7f1d73-3558-11ee-b7a8-5d5db7cd8ffb" target="HOST-11400">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692003824</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.6625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78660c50-3a81-11ee-b55b-6596b150fac1</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-11400" target="ac7f1d73-3558-11ee-b7a8-5d5db7cd8ffb">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1692003824</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.6625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">78660c50-3a81-11ee-b55b-6596b150fac1</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/7/78676370-8be4-11ee-9efd-252771b20c20.graphml ADDED
@@ -0,0 +1,221 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="024fe9a4-8be4-11ee-b490-d792661ab5ab">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.33.237</data>
35
+ <data key="n_hostname">100.64.33.237</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.25.222.10</data>
43
+ <data key="n_hostname">172.25.222.10</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="8bbe9ac2-8a08-11ee-a737-d35d6de933b4">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.22.18</data>
51
+ <data key="n_hostname">100.64.22.18</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="686c2895-0c80-11ee-82af-770750eab5cb">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.33.238</data>
59
+ <data key="n_hostname">100.64.33.238</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="ab15ff50-062b-11ee-ad86-09da549eee09">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.4.220</data>
67
+ <data key="n_hostname">100.64.4.220</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.71875</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="c964f949-752d-11ee-ae25-c5a221cb9e03">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.33.138</data>
75
+ <data key="n_hostname">100.64.33.138</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.4375</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <edge id="e1" source="024fe9a4-8be4-11ee-b490-d792661ab5ab" target="HOST-2768">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1700952388</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.7890625</data>
85
+ <data key="e_suspicion_score">0.7890625</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Disrupted</data>
92
+ <data key="e_incident_id">78676370-8be4-11ee-9efd-252771b20c20</data>
93
+ </edge>
94
+ <edge id="e2" source="HOST-2768" target="024fe9a4-8be4-11ee-b490-d792661ab5ab">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1700952388</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.7890625</data>
99
+ <data key="e_suspicion_score">0.7890625</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Disrupted</data>
106
+ <data key="e_incident_id">78676370-8be4-11ee-9efd-252771b20c20</data>
107
+ </edge>
108
+ <edge id="e3" source="HOST-4752" target="HOST-2768">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1700952388</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.7890625</data>
113
+ <data key="e_suspicion_score">0.7890625</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Disrupted</data>
120
+ <data key="e_incident_id">78676370-8be4-11ee-9efd-252771b20c20</data>
121
+ </edge>
122
+ <edge id="e4" source="HOST-2768" target="HOST-4752">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1700952388</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.7890625</data>
127
+ <data key="e_suspicion_score">0.7890625</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Disrupted</data>
134
+ <data key="e_incident_id">78676370-8be4-11ee-9efd-252771b20c20</data>
135
+ </edge>
136
+ <edge id="e5" source="686c2895-0c80-11ee-82af-770750eab5cb" target="HOST-2768">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1700952388</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.7890625</data>
141
+ <data key="e_suspicion_score">0.7890625</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Disrupted</data>
148
+ <data key="e_incident_id">78676370-8be4-11ee-9efd-252771b20c20</data>
149
+ </edge>
150
+ <edge id="e6" source="HOST-2768" target="686c2895-0c80-11ee-82af-770750eab5cb">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1700952388</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.7890625</data>
155
+ <data key="e_suspicion_score">0.7890625</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Disrupted</data>
162
+ <data key="e_incident_id">78676370-8be4-11ee-9efd-252771b20c20</data>
163
+ </edge>
164
+ <edge id="e7" source="HOST-4405" target="HOST-2768">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1700952388</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.7890625</data>
169
+ <data key="e_suspicion_score">0.7890625</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Disrupted</data>
176
+ <data key="e_incident_id">78676370-8be4-11ee-9efd-252771b20c20</data>
177
+ </edge>
178
+ <edge id="e8" source="HOST-2768" target="HOST-4405">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1700952388</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.7890625</data>
183
+ <data key="e_suspicion_score">0.7890625</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Disrupted</data>
190
+ <data key="e_incident_id">78676370-8be4-11ee-9efd-252771b20c20</data>
191
+ </edge>
192
+ <edge id="e9" source="HOST-6350" target="HOST-2768">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1700952388</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.7890625</data>
197
+ <data key="e_suspicion_score">0.7890625</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">78676370-8be4-11ee-9efd-252771b20c20</data>
205
+ </edge>
206
+ <edge id="e10" source="HOST-2768" target="HOST-6350">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1700952388</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.7890625</data>
211
+ <data key="e_suspicion_score">0.7890625</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">78676370-8be4-11ee-9efd-252771b20c20</data>
219
+ </edge>
220
+ </graph>
221
+ </graphml>
graph/incidents_graphml/7/786a0890-3c71-11ee-89e7-7976671c0f18.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4f067051-0626-11ee-bfa9-17d528efc62f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.20.30</data>
35
+ <data key="n_hostname">100.64.20.30</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.325</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
39
+ </node>
40
+ <node id="094cdc22-0626-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.45</data>
43
+ <data key="n_hostname">100.64.68.45</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.746875</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <node id="a8b847f5-0625-11ee-ae19-679f8bc2c45f">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.9.156</data>
51
+ <data key="n_hostname">100.64.9.156</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.325</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="e282b065-39ba-11ee-a502-4dd20f3d6bc5">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.36.31</data>
59
+ <data key="n_hostname">100.64.36.31</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.746875</data>
62
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
63
+ </node>
64
+ <edge id="e1" source="HOST-11745" target="HOST-11424">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1692216854</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.746875</data>
69
+ <data key="e_suspicion_score">0.746875</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">786a0890-3c71-11ee-89e7-7976671c0f18</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-11424" target="HOST-11745">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1692216854</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.746875</data>
83
+ <data key="e_suspicion_score">0.746875</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">786a0890-3c71-11ee-89e7-7976671c0f18</data>
91
+ </edge>
92
+ <edge id="e3" source="HOST-12045" target="HOST-11424">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1692216854</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.746875</data>
97
+ <data key="e_suspicion_score">0.746875</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">786a0890-3c71-11ee-89e7-7976671c0f18</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-11424" target="HOST-12045">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1692216854</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.746875</data>
111
+ <data key="e_suspicion_score">0.746875</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">786a0890-3c71-11ee-89e7-7976671c0f18</data>
119
+ </edge>
120
+ <edge id="e5" source="HOST-12100" target="HOST-11424">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1692216854</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.746875</data>
125
+ <data key="e_suspicion_score">0.746875</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">786a0890-3c71-11ee-89e7-7976671c0f18</data>
133
+ </edge>
134
+ <edge id="e6" source="HOST-11424" target="HOST-12100">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1692216854</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.746875</data>
139
+ <data key="e_suspicion_score">0.746875</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">786a0890-3c71-11ee-89e7-7976671c0f18</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/7/786a6700-7285-11ee-9478-f721b34a9cef.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.168.229</data>
35
+ <data key="n_hostname">172.23.168.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ba4a05b6-489e-11ee-92b3-ef01eaab3dc6">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.30.30</data>
43
+ <data key="n_hostname">100.64.30.30</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2865" target="HOST-5895">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698162807</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">786a6700-7285-11ee-9478-f721b34a9cef</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/786e3770-7b60-11ee-b996-61ac976b8a88.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.201.119</data>
35
+ <data key="n_hostname">172.30.201.119</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="6723fb92-107a-11ee-83db-5f994e6ffbfe">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.32.161</data>
43
+ <data key="n_hostname">100.64.32.161</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2760" target="HOST-6232">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699136476</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">786e3770-7b60-11ee-b996-61ac976b8a88</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/786fd800-d773-11ed-b131-97a6b3859c17.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="77ee24e2-d773-11ed-b98d-b56dfc15f285">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.17.7</data>
35
+ <data key="n_hostname">100.64.17.7</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="027695d4-c823-11ed-b38f-718276329dbf">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.101.1</data>
43
+ <data key="n_hostname">172.31.101.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="c1684383-d773-11ed-8ab7-a122d324a951">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.17.8</data>
51
+ <data key="n_hostname">100.64.17.8</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="77ee24e2-d773-11ed-b98d-b56dfc15f285" target="HOST-3565">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1681112646</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">786fd800-d773-11ed-b131-97a6b3859c17</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-3565" target="77ee24e2-d773-11ed-b98d-b56dfc15f285">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1681112646</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">786fd800-d773-11ed-b131-97a6b3859c17</data>
83
+ </edge>
84
+ <edge id="e3" source="c1684383-d773-11ed-8ab7-a122d324a951" target="HOST-3565">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1681112646</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7</data>
89
+ <data key="e_suspicion_score">0.25</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Unprocessed</data>
96
+ <data key="e_incident_id">786fd800-d773-11ed-b131-97a6b3859c17</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-3565" target="c1684383-d773-11ed-8ab7-a122d324a951">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1681112646</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7</data>
103
+ <data key="e_suspicion_score">0.25</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Unprocessed</data>
110
+ <data key="e_incident_id">786fd800-d773-11ed-b131-97a6b3859c17</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/7/78751fc0-a5a6-11ee-bda8-6b49f5844970.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b9451787-38f5-11ee-8916-47b1169152e3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.6</data>
35
+ <data key="n_hostname">100.64.70.6</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="063b24c3-0625-11ee-a31e-2bbd16ce2d59">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.38</data>
43
+ <data key="n_hostname">100.64.68.38</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"]</data>
47
+ </node>
48
+ <edge id="e1" source="b9451787-38f5-11ee-8916-47b1169152e3" target="HOST-11412">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703784489</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">78751fc0-a5a6-11ee-bda8-6b49f5844970</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78752b50-26a8-11ee-bacb-e1766d74be09.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.208.219</data>
35
+ <data key="n_hostname">172.30.208.219</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="884b1888-062a-11ee-b144-2b760827f5b0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.36.122</data>
43
+ <data key="n_hostname">100.64.36.122</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2823" target="HOST-6729">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689821551</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78752b50-26a8-11ee-bacb-e1766d74be09</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/787849b0-7285-11ee-9478-f721b34a9cef.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a3da0c7e-6915-11ee-9219-9f96faab2032">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.48.97</data>
35
+ <data key="n_hostname">100.64.48.97</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.200.243</data>
43
+ <data key="n_hostname">172.30.200.243</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="a3da0c7e-6915-11ee-9219-9f96faab2032" target="HOST-2706">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698162807</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">787849b0-7285-11ee-9478-f721b34a9cef</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78789f30-26d3-11ee-ac10-e7e87ad84b9c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="f092e6b2-09af-11ee-b6ef-9b21c1e77b5b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.49.194</data>
43
+ <data key="n_hostname">100.64.49.194</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="HOST-8671">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689840019</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78789f30-26d3-11ee-ac10-e7e87ad84b9c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/787a7b30-125f-11ee-8a81-b1159645422c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="18fbb580-0827-11ee-9cde-69be8eab0946">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.8.150</data>
35
+ <data key="n_hostname">HOST-2906</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.191.229</data>
43
+ <data key="n_hostname">172.24.191.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2913" target="HOST-2839">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687591174</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">787a7b30-125f-11ee-8a81-b1159645422c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/787e6410-7b60-11ee-b996-61ac976b8a88.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.174.172</data>
35
+ <data key="n_hostname">172.30.174.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="6fd4b820-4733-11ee-a264-3930de1ff725">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.35.202</data>
43
+ <data key="n_hostname">100.64.35.202</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2946" target="HOST-6632">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699136476</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">787e6410-7b60-11ee-b996-61ac976b8a88</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/787e92c0-0858-11ef-81c9-bbab78bb4e36.graphml ADDED
@@ -0,0 +1,185 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5f49e4f0-062c-11ee-9b78-7f958e17b9fb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.25.216.82</data>
35
+ <data key="n_hostname">172.25.216.82</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="678b1255-0628-11ee-8d4a-c5ec7f04168e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.87.4</data>
43
+ <data key="n_hostname">100.64.87.4</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="ab870d70-0627-11ee-8d4a-c5ec7f04168e">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.92.73</data>
51
+ <data key="n_hostname">100.64.92.73</data>
52
+ <data key="n_set_roles">["Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="9cd326c4-d0f6-11ee-81fc-81d43fdb05f2">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.97.46</data>
59
+ <data key="n_hostname">100.64.97.46</data>
60
+ <data key="n_set_roles">["Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="29dcbb30-030b-11ef-8b61-477ed0e304b6">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.97.177</data>
67
+ <data key="n_hostname">100.64.97.177</data>
68
+ <data key="n_set_roles">["Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <edge id="e1" source="HOST-17294" target="HOST-17288">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1714636154</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.7</data>
77
+ <data key="e_suspicion_score">0.25</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Unprocessed</data>
84
+ <data key="e_incident_id">787e92c0-0858-11ef-81c9-bbab78bb4e36</data>
85
+ </edge>
86
+ <edge id="e2" source="HOST-17288" target="HOST-17294">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1714636154</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.7</data>
91
+ <data key="e_suspicion_score">0.25</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Unprocessed</data>
98
+ <data key="e_incident_id">787e92c0-0858-11ef-81c9-bbab78bb4e36</data>
99
+ </edge>
100
+ <edge id="e3" source="HOST-17294" target="HOST-19276">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1714636154</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.7</data>
105
+ <data key="e_suspicion_score">0.25</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Unprocessed</data>
112
+ <data key="e_incident_id">787e92c0-0858-11ef-81c9-bbab78bb4e36</data>
113
+ </edge>
114
+ <edge id="e4" source="HOST-19276" target="HOST-17294">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1714636154</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.7</data>
119
+ <data key="e_suspicion_score">0.25</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Unprocessed</data>
126
+ <data key="e_incident_id">787e92c0-0858-11ef-81c9-bbab78bb4e36</data>
127
+ </edge>
128
+ <edge id="e5" source="HOST-17294" target="9cd326c4-d0f6-11ee-81fc-81d43fdb05f2">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1714636154</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.7</data>
133
+ <data key="e_suspicion_score">0.25</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Unprocessed</data>
140
+ <data key="e_incident_id">787e92c0-0858-11ef-81c9-bbab78bb4e36</data>
141
+ </edge>
142
+ <edge id="e6" source="9cd326c4-d0f6-11ee-81fc-81d43fdb05f2" target="HOST-17294">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1714636154</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.7</data>
147
+ <data key="e_suspicion_score">0.25</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Unprocessed</data>
154
+ <data key="e_incident_id">787e92c0-0858-11ef-81c9-bbab78bb4e36</data>
155
+ </edge>
156
+ <edge id="e7" source="HOST-17294" target="29dcbb30-030b-11ef-8b61-477ed0e304b6">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1714636154</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.7</data>
161
+ <data key="e_suspicion_score">0.25</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Unprocessed</data>
168
+ <data key="e_incident_id">787e92c0-0858-11ef-81c9-bbab78bb4e36</data>
169
+ </edge>
170
+ <edge id="e8" source="29dcbb30-030b-11ef-8b61-477ed0e304b6" target="HOST-17294">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1714636154</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.7</data>
175
+ <data key="e_suspicion_score">0.25</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Unprocessed</data>
182
+ <data key="e_incident_id">787e92c0-0858-11ef-81c9-bbab78bb4e36</data>
183
+ </edge>
184
+ </graph>
185
+ </graphml>
graph/incidents_graphml/7/787ef520-2d94-11ee-a72a-b3e5c322bb35.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5533b502-0626-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.52.250</data>
35
+ <data key="n_hostname">100.64.52.250</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.23.117</data>
43
+ <data key="n_hostname">172.26.23.117</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="5533b502-0626-11ee-94f6-0d301f382bbb" target="HOST-2824">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690582619</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">787ef520-2d94-11ee-a72a-b3e5c322bb35</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78880120-7285-11ee-9478-f721b34a9cef.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.200.243</data>
35
+ <data key="n_hostname">172.30.200.243</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a3da0c7e-6915-11ee-9219-9f96faab2032">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.48.97</data>
43
+ <data key="n_hostname">100.64.48.97</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2706" target="HOST-8474">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698162807</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78880120-7285-11ee-9478-f721b34a9cef</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/788e7420-a5a6-11ee-bda8-6b49f5844970.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="11e1df48-9021-11ee-8c46-879924fa573a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.7</data>
35
+ <data key="n_hostname">100.64.70.7</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="063b24c3-0625-11ee-a31e-2bbd16ce2d59">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.38</data>
43
+ <data key="n_hostname">100.64.68.38</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"]</data>
47
+ </node>
48
+ <edge id="e1" source="11e1df48-9021-11ee-8c46-879924fa573a" target="HOST-11412">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703784490</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">788e7420-a5a6-11ee-bda8-6b49f5844970</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/7899db70-7285-11ee-9478-f721b34a9cef.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="6c06aad2-5405-11ee-968e-d70e79186099">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.22.219</data>
35
+ <data key="n_hostname">100.64.22.219</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.54.66</data>
43
+ <data key="n_hostname">172.24.54.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4855" target="HOST-2745">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698162807</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">7899db70-7285-11ee-9478-f721b34a9cef</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/789ccc00-a5a6-11ee-bda8-6b49f5844970.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bbc88644-062d-11ee-b3db-676de6ca3763">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.12.144</data>
35
+ <data key="n_hostname">100.64.12.144</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="c2d811c4-72a3-11ee-b250-3f44308bc5b2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.20</data>
43
+ <data key="n_hostname">100.64.68.20</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11516" target="HOST-11390">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703784490</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">789ccc00-a5a6-11ee-bda8-6b49f5844970</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/789d0b90-10e4-11ee-aac5-6731911fd461.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="27008880-062f-11ee-a0c5-27e8caf8506a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.4.31</data>
35
+ <data key="n_hostname">USER-0015-1838.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="cdd29b04-063c-11ee-bf36-a5053098164b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.228</data>
43
+ <data key="n_hostname">100.64.71.228</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="27008880-062f-11ee-a0c5-27e8caf8506a" target="HOST-13586">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687428395</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">789d0b90-10e4-11ee-aac5-6731911fd461</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13586" target="27008880-062f-11ee-a0c5-27e8caf8506a">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1687428395</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">789d0b90-10e4-11ee-aac5-6731911fd461</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/7/78a02df0-8616-11ee-aad5-255bef0b512c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="dab409a1-0626-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.53.86</data>
35
+ <data key="n_hostname">100.64.53.86</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.208.219</data>
43
+ <data key="n_hostname">172.30.208.219</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-9219" target="HOST-2823">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700314156</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78a02df0-8616-11ee-aad5-255bef0b512c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78a086e0-2d94-11ee-a72a-b3e5c322bb35.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.23.117</data>
35
+ <data key="n_hostname">172.26.23.117</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="5533b502-0626-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.52.250</data>
43
+ <data key="n_hostname">100.64.52.250</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2824" target="HOST-9143">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690582619</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78a086e0-2d94-11ee-a72a-b3e5c322bb35</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78a30310-7b60-11ee-b996-61ac976b8a88.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b09fa670-062a-11ee-ad3e-fda0da874cab">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.34.101</data>
35
+ <data key="n_hostname">100.64.34.101</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.23.117</data>
43
+ <data key="n_hostname">172.26.23.117</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-6444" target="HOST-2824">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699136476</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">78a30310-7b60-11ee-b996-61ac976b8a88</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78a3ae10-125f-11ee-8a81-b1159645422c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="18fbb580-0827-11ee-9cde-69be8eab0946">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.150</data>
43
+ <data key="n_hostname">HOST-2906</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="HOST-2913">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687591175</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78a3ae10-125f-11ee-8a81-b1159645422c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78b18200-7b60-11ee-b996-61ac976b8a88.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.23.117</data>
35
+ <data key="n_hostname">172.26.23.117</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b09fa670-062a-11ee-ad3e-fda0da874cab">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.34.101</data>
43
+ <data key="n_hostname">100.64.34.101</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2824" target="HOST-6444">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699136476</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78b18200-7b60-11ee-b996-61ac976b8a88</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78b18ec0-31d9-11ed-a735-37a95a76e51b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="74aba703-14c6-11ed-9567-51970ae4259d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.165</data>
35
+ <data key="n_hostname">100.64.18.165</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="f9fc89e2-0280-11ed-92bd-078fbf061d43">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.151.220.246</data>
43
+ <data key="n_hostname">10.151.220.246</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="74aba703-14c6-11ed-9567-51970ae4259d" target="HOST-16893">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1662904562</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">78b18ec0-31d9-11ed-a735-37a95a76e51b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78b6b240-7285-11ee-9478-f721b34a9cef.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.54.66</data>
35
+ <data key="n_hostname">172.24.54.66</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="6c06aad2-5405-11ee-968e-d70e79186099">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.22.219</data>
43
+ <data key="n_hostname">100.64.22.219</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2745" target="HOST-4855">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698162807</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">78b6b240-7285-11ee-9478-f721b34a9cef</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78c0ec90-4ec4-11ee-81d4-670b4c6897d4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9d759850-4b5f-11ee-9339-ff9c145e4efa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.11.97</data>
35
+ <data key="n_hostname">100.64.11.97</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.27.202.53</data>
43
+ <data key="n_hostname">172.27.202.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="9d759850-4b5f-11ee-9339-ff9c145e4efa" target="HOST-2703">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694231624</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">78c0ec90-4ec4-11ee-81d4-670b4c6897d4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78c2ccd0-31d9-11ed-a735-37a95a76e51b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f9fc89e2-0280-11ed-92bd-078fbf061d43">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.151.220.246</data>
35
+ <data key="n_hostname">10.151.220.246</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="74aba703-14c6-11ed-9567-51970ae4259d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.165</data>
43
+ <data key="n_hostname">100.64.18.165</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16893" target="HOST-18048">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1662904562</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78c2ccd0-31d9-11ed-a735-37a95a76e51b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78c7fcf0-31d9-11ed-a735-37a95a76e51b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f2162432-1eb3-11ed-be33-31f34f6bca6e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.91.25</data>
35
+ <data key="n_hostname">100.64.91.25</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ab8980b3-02a8-11ed-bb89-45c059e92558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="f2162432-1eb3-11ed-be33-31f34f6bca6e" target="HOST-16881">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1662904562</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">78c7fcf0-31d9-11ed-a735-37a95a76e51b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78ca2330-0451-11ef-82af-f11a2f279dd8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b59ae280-0624-11ee-8794-6bae0a4a6dd8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.4.31</data>
35
+ <data key="n_hostname">100.64.4.31</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9554-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.11.166</data>
43
+ <data key="n_hostname">172.31.11.166</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="b59ae280-0624-11ee-8794-6bae0a4a6dd8" target="HOST-2711">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714193343</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">78ca2330-0451-11ef-82af-f11a2f279dd8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78ce18e0-368f-11ee-b546-fb0db7567997.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0fe130d6-0c99-11ee-8d00-c9b0fc8b74d1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.65.239</data>
35
+ <data key="n_hostname">100.64.65.239</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0a1bef20-062a-11ee-a360-0d0424c09388">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.43.10.92</data>
43
+ <data key="n_hostname">10.43.10.92</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="0fe130d6-0c99-11ee-8d00-c9b0fc8b74d1" target="0a1bef20-062a-11ee-a360-0d0424c09388">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691570033</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78ce18e0-368f-11ee-b546-fb0db7567997</data>
61
+ </edge>
62
+ <edge id="e2" source="0a1bef20-062a-11ee-a360-0d0424c09388" target="0fe130d6-0c99-11ee-8d00-c9b0fc8b74d1">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1691570033</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">78ce18e0-368f-11ee-b546-fb0db7567997</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/7/78d0fda0-31d9-11ed-a735-37a95a76e51b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ab8980b3-02a8-11ed-bb89-45c059e92558">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="f2162432-1eb3-11ed-be33-31f34f6bca6e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.91.25</data>
43
+ <data key="n_hostname">100.64.91.25</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16881" target="HOST-18049">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1662904562</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78d0fda0-31d9-11ed-a735-37a95a76e51b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78d18e60-4ec4-11ee-81d4-670b4c6897d4.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.27.202.53</data>
35
+ <data key="n_hostname">172.27.202.53</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9d759850-4b5f-11ee-9339-ff9c145e4efa">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.11.97</data>
43
+ <data key="n_hostname">100.64.11.97</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2703" target="HOST-3290">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694231624</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78d18e60-4ec4-11ee-81d4-670b4c6897d4</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78d22a70-0508-11ed-8762-011b41c4e26e.graphml ADDED
@@ -0,0 +1,617 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3d05fc50-ea92-11ec-abf7-619673fe2558">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.83.31</data>
35
+ <data key="n_hostname">100.64.83.31</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="decd3270-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.228</data>
43
+ <data key="n_hostname">100.64.71.228</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="13ab92f0-ea99-11ec-90c7-eff83c975df3">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.83.32</data>
51
+ <data key="n_hostname">USER-0015-1943.example.internal</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="f6051b10-ea91-11ec-90c7-eff83c975df3">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.80.128</data>
59
+ <data key="n_hostname">100.64.80.128</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.841796875</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="bce97712-eb2f-11ec-9b69-65754b87a002">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.25.66</data>
67
+ <data key="n_hostname">100.64.25.66</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <node id="b07575d0-eb7d-11ec-9a4e-4fe8c7ffd30f">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.4.216</data>
75
+ <data key="n_hostname">100.64.4.216</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.9634375</data>
78
+ <data key="n_products">["Precinct","Meraki"]</data>
79
+ </node>
80
+ <node id="fbe06f30-ea91-11ec-90c7-eff83c975df3">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.75.31</data>
83
+ <data key="n_hostname">100.64.75.31</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.578125</data>
86
+ <data key="n_products">["Precinct","Meraki"]</data>
87
+ </node>
88
+ <node id="261d6c30-ea92-11ec-abf7-619673fe2558">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.71.111</data>
91
+ <data key="n_hostname">100.64.71.111</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.841796875</data>
94
+ <data key="n_products">["Precinct","Meraki"]</data>
95
+ </node>
96
+ <node id="8d3f7fe0-eb76-11ec-8db2-47fbc45ad6b6">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.79.252</data>
99
+ <data key="n_hostname">100.64.79.252</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.4375</data>
102
+ <data key="n_products">["Precinct","Meraki"]</data>
103
+ </node>
104
+ <node id="2c687210-ea92-11ec-90c7-eff83c975df3">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.80.61</data>
107
+ <data key="n_hostname">100.64.80.61</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.7890625</data>
110
+ <data key="n_products">["Precinct","Meraki"]</data>
111
+ </node>
112
+ <node id="14537b30-eb27-11ec-bd8c-b1a27b18da34">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.7.252</data>
115
+ <data key="n_hostname">100.64.7.252</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.71875</data>
118
+ <data key="n_products">["Precinct","Meraki"]</data>
119
+ </node>
120
+ <node id="e68d9a40-ea91-11ec-90c7-eff83c975df3">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.1.63</data>
123
+ <data key="n_hostname">USER-0015-1731.example.internal</data>
124
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.841796875</data>
126
+ <data key="n_products">["Precinct","Meraki"]</data>
127
+ </node>
128
+ <node id="b22bc320-ea92-11ec-abf7-619673fe2558">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.83.33</data>
131
+ <data key="n_hostname">100.64.83.33</data>
132
+ <data key="n_set_roles">["Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.578125</data>
134
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
135
+ </node>
136
+ <node id="05aa62a0-ea92-11ec-abf7-619673fe2558">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.73.67</data>
139
+ <data key="n_hostname">100.64.73.67</data>
140
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.841796875</data>
142
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
143
+ </node>
144
+ <node id="1d5cbeb0-eacf-11ec-b8e8-1538cad61cfa">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.83.34</data>
147
+ <data key="n_hostname">USER-0015-1944.example.internal</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.4375</data>
150
+ <data key="n_products">["Precinct","Meraki"]</data>
151
+ </node>
152
+ <node id="b4169ef0-eb5d-11ec-94cc-21720710af57">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.83.35</data>
155
+ <data key="n_hostname">100.64.83.35</data>
156
+ <data key="n_set_roles">["Exploiting Host"]</data>
157
+ <data key="n_suspicion_score">0.7525</data>
158
+ <data key="n_products">["Precinct","Meraki"]</data>
159
+ </node>
160
+ <node id="b18d3643-ffe8-11ec-9a4f-476d17a6cc27">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.83.36</data>
163
+ <data key="n_hostname">100.64.83.36</data>
164
+ <data key="n_set_roles">["Exploiting Host"]</data>
165
+ <data key="n_suspicion_score">0.578125</data>
166
+ <data key="n_products">["Precinct","Meraki"]</data>
167
+ </node>
168
+ <edge id="e1" source="3d05fc50-ea92-11ec-abf7-619673fe2558" target="HOST-13972">
169
+ <data key="e_type">INCIDENT_LINK</data>
170
+ <data key="e_timestamp">1657976946</data>
171
+ <data key="e_label_binary">malicious</data>
172
+ <data key="e_label_confidence">0.9634375</data>
173
+ <data key="e_suspicion_score">0.9634375</data>
174
+ <data key="e_mo_name">Data Theft</data>
175
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
176
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
177
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
178
+ <data key="e_lifecycle_stage">complete-mission</data>
179
+ <data key="e_disposition">Disrupted</data>
180
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
181
+ </edge>
182
+ <edge id="e2" source="HOST-13972" target="3d05fc50-ea92-11ec-abf7-619673fe2558">
183
+ <data key="e_type">INCIDENT_LINK</data>
184
+ <data key="e_timestamp">1657976946</data>
185
+ <data key="e_label_binary">malicious</data>
186
+ <data key="e_label_confidence">0.9634375</data>
187
+ <data key="e_suspicion_score">0.9634375</data>
188
+ <data key="e_mo_name">Data Theft</data>
189
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
190
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
191
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
192
+ <data key="e_lifecycle_stage">complete-mission</data>
193
+ <data key="e_disposition">Disrupted</data>
194
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
195
+ </edge>
196
+ <edge id="e3" source="13ab92f0-ea99-11ec-90c7-eff83c975df3" target="f6051b10-ea91-11ec-90c7-eff83c975df3">
197
+ <data key="e_type">INCIDENT_LINK</data>
198
+ <data key="e_timestamp">1657976946</data>
199
+ <data key="e_label_binary">malicious</data>
200
+ <data key="e_label_confidence">0.9634375</data>
201
+ <data key="e_suspicion_score">0.9634375</data>
202
+ <data key="e_mo_name">Data Theft</data>
203
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
204
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
205
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
206
+ <data key="e_lifecycle_stage">complete-mission</data>
207
+ <data key="e_disposition">Disrupted</data>
208
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
209
+ </edge>
210
+ <edge id="e4" source="f6051b10-ea91-11ec-90c7-eff83c975df3" target="13ab92f0-ea99-11ec-90c7-eff83c975df3">
211
+ <data key="e_type">INCIDENT_LINK</data>
212
+ <data key="e_timestamp">1657976946</data>
213
+ <data key="e_label_binary">malicious</data>
214
+ <data key="e_label_confidence">0.9634375</data>
215
+ <data key="e_suspicion_score">0.9634375</data>
216
+ <data key="e_mo_name">Data Theft</data>
217
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
218
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
219
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
220
+ <data key="e_lifecycle_stage">complete-mission</data>
221
+ <data key="e_disposition">Disrupted</data>
222
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
223
+ </edge>
224
+ <edge id="e5" source="bce97712-eb2f-11ec-9b69-65754b87a002" target="f6051b10-ea91-11ec-90c7-eff83c975df3">
225
+ <data key="e_type">INCIDENT_LINK</data>
226
+ <data key="e_timestamp">1657976946</data>
227
+ <data key="e_label_binary">malicious</data>
228
+ <data key="e_label_confidence">0.9634375</data>
229
+ <data key="e_suspicion_score">0.9634375</data>
230
+ <data key="e_mo_name">Data Theft</data>
231
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
232
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
233
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
234
+ <data key="e_lifecycle_stage">complete-mission</data>
235
+ <data key="e_disposition">Disrupted</data>
236
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
237
+ </edge>
238
+ <edge id="e6" source="f6051b10-ea91-11ec-90c7-eff83c975df3" target="bce97712-eb2f-11ec-9b69-65754b87a002">
239
+ <data key="e_type">INCIDENT_LINK</data>
240
+ <data key="e_timestamp">1657976946</data>
241
+ <data key="e_label_binary">malicious</data>
242
+ <data key="e_label_confidence">0.9634375</data>
243
+ <data key="e_suspicion_score">0.9634375</data>
244
+ <data key="e_mo_name">Data Theft</data>
245
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
246
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
247
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
248
+ <data key="e_lifecycle_stage">complete-mission</data>
249
+ <data key="e_disposition">Disrupted</data>
250
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
251
+ </edge>
252
+ <edge id="e7" source="3d05fc50-ea92-11ec-abf7-619673fe2558" target="f6051b10-ea91-11ec-90c7-eff83c975df3">
253
+ <data key="e_type">INCIDENT_LINK</data>
254
+ <data key="e_timestamp">1657976946</data>
255
+ <data key="e_label_binary">malicious</data>
256
+ <data key="e_label_confidence">0.9634375</data>
257
+ <data key="e_suspicion_score">0.9634375</data>
258
+ <data key="e_mo_name">Data Theft</data>
259
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
260
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
261
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
262
+ <data key="e_lifecycle_stage">complete-mission</data>
263
+ <data key="e_disposition">Disrupted</data>
264
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
265
+ </edge>
266
+ <edge id="e8" source="f6051b10-ea91-11ec-90c7-eff83c975df3" target="3d05fc50-ea92-11ec-abf7-619673fe2558">
267
+ <data key="e_type">INCIDENT_LINK</data>
268
+ <data key="e_timestamp">1657976946</data>
269
+ <data key="e_label_binary">malicious</data>
270
+ <data key="e_label_confidence">0.9634375</data>
271
+ <data key="e_suspicion_score">0.9634375</data>
272
+ <data key="e_mo_name">Data Theft</data>
273
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
274
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
275
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
276
+ <data key="e_lifecycle_stage">complete-mission</data>
277
+ <data key="e_disposition">Disrupted</data>
278
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
279
+ </edge>
280
+ <edge id="e9" source="b07575d0-eb7d-11ec-9a4e-4fe8c7ffd30f" target="f6051b10-ea91-11ec-90c7-eff83c975df3">
281
+ <data key="e_type">INCIDENT_LINK</data>
282
+ <data key="e_timestamp">1657976946</data>
283
+ <data key="e_label_binary">malicious</data>
284
+ <data key="e_label_confidence">0.9634375</data>
285
+ <data key="e_suspicion_score">0.9634375</data>
286
+ <data key="e_mo_name">Data Theft</data>
287
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
288
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
289
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
290
+ <data key="e_lifecycle_stage">complete-mission</data>
291
+ <data key="e_disposition">Disrupted</data>
292
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
293
+ </edge>
294
+ <edge id="e10" source="f6051b10-ea91-11ec-90c7-eff83c975df3" target="b07575d0-eb7d-11ec-9a4e-4fe8c7ffd30f">
295
+ <data key="e_type">INCIDENT_LINK</data>
296
+ <data key="e_timestamp">1657976946</data>
297
+ <data key="e_label_binary">malicious</data>
298
+ <data key="e_label_confidence">0.9634375</data>
299
+ <data key="e_suspicion_score">0.9634375</data>
300
+ <data key="e_mo_name">Data Theft</data>
301
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
302
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
303
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
304
+ <data key="e_lifecycle_stage">complete-mission</data>
305
+ <data key="e_disposition">Disrupted</data>
306
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
307
+ </edge>
308
+ <edge id="e11" source="HOST-13694" target="HOST-12678">
309
+ <data key="e_type">INCIDENT_LINK</data>
310
+ <data key="e_timestamp">1657976946</data>
311
+ <data key="e_label_binary">malicious</data>
312
+ <data key="e_label_confidence">0.9634375</data>
313
+ <data key="e_suspicion_score">0.9634375</data>
314
+ <data key="e_mo_name">Data Theft</data>
315
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
316
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
317
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
318
+ <data key="e_lifecycle_stage">complete-mission</data>
319
+ <data key="e_disposition">Disrupted</data>
320
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
321
+ </edge>
322
+ <edge id="e12" source="HOST-12678" target="HOST-13694">
323
+ <data key="e_type">INCIDENT_LINK</data>
324
+ <data key="e_timestamp">1657976946</data>
325
+ <data key="e_label_binary">malicious</data>
326
+ <data key="e_label_confidence">0.9634375</data>
327
+ <data key="e_suspicion_score">0.9634375</data>
328
+ <data key="e_mo_name">Data Theft</data>
329
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
330
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
331
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
332
+ <data key="e_lifecycle_stage">complete-mission</data>
333
+ <data key="e_disposition">Disrupted</data>
334
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
335
+ </edge>
336
+ <edge id="e13" source="8d3f7fe0-eb76-11ec-8db2-47fbc45ad6b6" target="HOST-12678">
337
+ <data key="e_type">INCIDENT_LINK</data>
338
+ <data key="e_timestamp">1657976946</data>
339
+ <data key="e_label_binary">malicious</data>
340
+ <data key="e_label_confidence">0.9634375</data>
341
+ <data key="e_suspicion_score">0.9634375</data>
342
+ <data key="e_mo_name">Data Theft</data>
343
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
344
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
345
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
346
+ <data key="e_lifecycle_stage">complete-mission</data>
347
+ <data key="e_disposition">Disrupted</data>
348
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
349
+ </edge>
350
+ <edge id="e14" source="HOST-12678" target="8d3f7fe0-eb76-11ec-8db2-47fbc45ad6b6">
351
+ <data key="e_type">INCIDENT_LINK</data>
352
+ <data key="e_timestamp">1657976946</data>
353
+ <data key="e_label_binary">malicious</data>
354
+ <data key="e_label_confidence">0.9634375</data>
355
+ <data key="e_suspicion_score">0.9634375</data>
356
+ <data key="e_mo_name">Data Theft</data>
357
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
358
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
359
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
360
+ <data key="e_lifecycle_stage">complete-mission</data>
361
+ <data key="e_disposition">Disrupted</data>
362
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
363
+ </edge>
364
+ <edge id="e15" source="HOST-15506" target="HOST-12678">
365
+ <data key="e_type">INCIDENT_LINK</data>
366
+ <data key="e_timestamp">1657976946</data>
367
+ <data key="e_label_binary">malicious</data>
368
+ <data key="e_label_confidence">0.9634375</data>
369
+ <data key="e_suspicion_score">0.9634375</data>
370
+ <data key="e_mo_name">Data Theft</data>
371
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
372
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
373
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
374
+ <data key="e_lifecycle_stage">complete-mission</data>
375
+ <data key="e_disposition">Disrupted</data>
376
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
377
+ </edge>
378
+ <edge id="e16" source="HOST-12678" target="HOST-15506">
379
+ <data key="e_type">INCIDENT_LINK</data>
380
+ <data key="e_timestamp">1657976946</data>
381
+ <data key="e_label_binary">malicious</data>
382
+ <data key="e_label_confidence">0.9634375</data>
383
+ <data key="e_suspicion_score">0.9634375</data>
384
+ <data key="e_mo_name">Data Theft</data>
385
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
386
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
387
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
388
+ <data key="e_lifecycle_stage">complete-mission</data>
389
+ <data key="e_disposition">Disrupted</data>
390
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
391
+ </edge>
392
+ <edge id="e17" source="14537b30-eb27-11ec-bd8c-b1a27b18da34" target="HOST-14042">
393
+ <data key="e_type">INCIDENT_LINK</data>
394
+ <data key="e_timestamp">1657976946</data>
395
+ <data key="e_label_binary">malicious</data>
396
+ <data key="e_label_confidence">0.9634375</data>
397
+ <data key="e_suspicion_score">0.9634375</data>
398
+ <data key="e_mo_name">Data Theft</data>
399
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
400
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
401
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
402
+ <data key="e_lifecycle_stage">complete-mission</data>
403
+ <data key="e_disposition">Disrupted</data>
404
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
405
+ </edge>
406
+ <edge id="e18" source="HOST-14042" target="14537b30-eb27-11ec-bd8c-b1a27b18da34">
407
+ <data key="e_type">INCIDENT_LINK</data>
408
+ <data key="e_timestamp">1657976946</data>
409
+ <data key="e_label_binary">malicious</data>
410
+ <data key="e_label_confidence">0.9634375</data>
411
+ <data key="e_suspicion_score">0.9634375</data>
412
+ <data key="e_mo_name">Data Theft</data>
413
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
414
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
415
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
416
+ <data key="e_lifecycle_stage">complete-mission</data>
417
+ <data key="e_disposition">Disrupted</data>
418
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
419
+ </edge>
420
+ <edge id="e19" source="HOST-13694" target="HOST-14042">
421
+ <data key="e_type">INCIDENT_LINK</data>
422
+ <data key="e_timestamp">1657976946</data>
423
+ <data key="e_label_binary">malicious</data>
424
+ <data key="e_label_confidence">0.9634375</data>
425
+ <data key="e_suspicion_score">0.9634375</data>
426
+ <data key="e_mo_name">Data Theft</data>
427
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
428
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
429
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
430
+ <data key="e_lifecycle_stage">complete-mission</data>
431
+ <data key="e_disposition">Disrupted</data>
432
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
433
+ </edge>
434
+ <edge id="e20" source="HOST-14042" target="HOST-13694">
435
+ <data key="e_type">INCIDENT_LINK</data>
436
+ <data key="e_timestamp">1657976946</data>
437
+ <data key="e_label_binary">malicious</data>
438
+ <data key="e_label_confidence">0.9634375</data>
439
+ <data key="e_suspicion_score">0.9634375</data>
440
+ <data key="e_mo_name">Data Theft</data>
441
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
442
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
443
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
444
+ <data key="e_lifecycle_stage">complete-mission</data>
445
+ <data key="e_disposition">Disrupted</data>
446
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
447
+ </edge>
448
+ <edge id="e21" source="b22bc320-ea92-11ec-abf7-619673fe2558" target="HOST-13238">
449
+ <data key="e_type">INCIDENT_LINK</data>
450
+ <data key="e_timestamp">1657976946</data>
451
+ <data key="e_label_binary">malicious</data>
452
+ <data key="e_label_confidence">0.9634375</data>
453
+ <data key="e_suspicion_score">0.9634375</data>
454
+ <data key="e_mo_name">Data Theft</data>
455
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
456
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
457
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
458
+ <data key="e_lifecycle_stage">complete-mission</data>
459
+ <data key="e_disposition">Disrupted</data>
460
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
461
+ </edge>
462
+ <edge id="e22" source="HOST-13238" target="b22bc320-ea92-11ec-abf7-619673fe2558">
463
+ <data key="e_type">INCIDENT_LINK</data>
464
+ <data key="e_timestamp">1657976946</data>
465
+ <data key="e_label_binary">malicious</data>
466
+ <data key="e_label_confidence">0.9634375</data>
467
+ <data key="e_suspicion_score">0.9634375</data>
468
+ <data key="e_mo_name">Data Theft</data>
469
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
470
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
471
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
472
+ <data key="e_lifecycle_stage">complete-mission</data>
473
+ <data key="e_disposition">Disrupted</data>
474
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
475
+ </edge>
476
+ <edge id="e23" source="8d3f7fe0-eb76-11ec-8db2-47fbc45ad6b6" target="HOST-13238">
477
+ <data key="e_type">INCIDENT_LINK</data>
478
+ <data key="e_timestamp">1657976946</data>
479
+ <data key="e_label_binary">malicious</data>
480
+ <data key="e_label_confidence">0.9634375</data>
481
+ <data key="e_suspicion_score">0.9634375</data>
482
+ <data key="e_mo_name">Data Theft</data>
483
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
484
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
485
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
486
+ <data key="e_lifecycle_stage">complete-mission</data>
487
+ <data key="e_disposition">Disrupted</data>
488
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
489
+ </edge>
490
+ <edge id="e24" source="HOST-13238" target="8d3f7fe0-eb76-11ec-8db2-47fbc45ad6b6">
491
+ <data key="e_type">INCIDENT_LINK</data>
492
+ <data key="e_timestamp">1657976946</data>
493
+ <data key="e_label_binary">malicious</data>
494
+ <data key="e_label_confidence">0.9634375</data>
495
+ <data key="e_suspicion_score">0.9634375</data>
496
+ <data key="e_mo_name">Data Theft</data>
497
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
498
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
499
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
500
+ <data key="e_lifecycle_stage">complete-mission</data>
501
+ <data key="e_disposition">Disrupted</data>
502
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
503
+ </edge>
504
+ <edge id="e25" source="1d5cbeb0-eacf-11ec-b8e8-1538cad61cfa" target="HOST-14042">
505
+ <data key="e_type">INCIDENT_LINK</data>
506
+ <data key="e_timestamp">1657976946</data>
507
+ <data key="e_label_binary">malicious</data>
508
+ <data key="e_label_confidence">0.9634375</data>
509
+ <data key="e_suspicion_score">0.9634375</data>
510
+ <data key="e_mo_name">Data Theft</data>
511
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
512
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
513
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
514
+ <data key="e_lifecycle_stage">complete-mission</data>
515
+ <data key="e_disposition">Disrupted</data>
516
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
517
+ </edge>
518
+ <edge id="e26" source="HOST-14042" target="1d5cbeb0-eacf-11ec-b8e8-1538cad61cfa">
519
+ <data key="e_type">INCIDENT_LINK</data>
520
+ <data key="e_timestamp">1657976946</data>
521
+ <data key="e_label_binary">malicious</data>
522
+ <data key="e_label_confidence">0.9634375</data>
523
+ <data key="e_suspicion_score">0.9634375</data>
524
+ <data key="e_mo_name">Data Theft</data>
525
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
526
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
527
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
528
+ <data key="e_lifecycle_stage">complete-mission</data>
529
+ <data key="e_disposition">Disrupted</data>
530
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
531
+ </edge>
532
+ <edge id="e27" source="bce97712-eb2f-11ec-9b69-65754b87a002" target="HOST-13238">
533
+ <data key="e_type">INCIDENT_LINK</data>
534
+ <data key="e_timestamp">1657976946</data>
535
+ <data key="e_label_binary">malicious</data>
536
+ <data key="e_label_confidence">0.9634375</data>
537
+ <data key="e_suspicion_score">0.9634375</data>
538
+ <data key="e_mo_name">Data Theft</data>
539
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
540
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
541
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
542
+ <data key="e_lifecycle_stage">complete-mission</data>
543
+ <data key="e_disposition">Disrupted</data>
544
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
545
+ </edge>
546
+ <edge id="e28" source="HOST-13238" target="bce97712-eb2f-11ec-9b69-65754b87a002">
547
+ <data key="e_type">INCIDENT_LINK</data>
548
+ <data key="e_timestamp">1657976946</data>
549
+ <data key="e_label_binary">malicious</data>
550
+ <data key="e_label_confidence">0.9634375</data>
551
+ <data key="e_suspicion_score">0.9634375</data>
552
+ <data key="e_mo_name">Data Theft</data>
553
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
554
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
555
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
556
+ <data key="e_lifecycle_stage">complete-mission</data>
557
+ <data key="e_disposition">Disrupted</data>
558
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
559
+ </edge>
560
+ <edge id="e29" source="b4169ef0-eb5d-11ec-94cc-21720710af57" target="f6051b10-ea91-11ec-90c7-eff83c975df3">
561
+ <data key="e_type">INCIDENT_LINK</data>
562
+ <data key="e_timestamp">1657976946</data>
563
+ <data key="e_label_binary">malicious</data>
564
+ <data key="e_label_confidence">0.9634375</data>
565
+ <data key="e_suspicion_score">0.9634375</data>
566
+ <data key="e_mo_name">Data Theft</data>
567
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
568
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
569
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
570
+ <data key="e_lifecycle_stage">complete-mission</data>
571
+ <data key="e_disposition">Disrupted</data>
572
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
573
+ </edge>
574
+ <edge id="e30" source="f6051b10-ea91-11ec-90c7-eff83c975df3" target="b4169ef0-eb5d-11ec-94cc-21720710af57">
575
+ <data key="e_type">INCIDENT_LINK</data>
576
+ <data key="e_timestamp">1657976946</data>
577
+ <data key="e_label_binary">malicious</data>
578
+ <data key="e_label_confidence">0.9634375</data>
579
+ <data key="e_suspicion_score">0.9634375</data>
580
+ <data key="e_mo_name">Data Theft</data>
581
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
582
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
583
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
584
+ <data key="e_lifecycle_stage">complete-mission</data>
585
+ <data key="e_disposition">Disrupted</data>
586
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
587
+ </edge>
588
+ <edge id="e31" source="b18d3643-ffe8-11ec-9a4f-476d17a6cc27" target="HOST-13238">
589
+ <data key="e_type">INCIDENT_LINK</data>
590
+ <data key="e_timestamp">1657976946</data>
591
+ <data key="e_label_binary">malicious</data>
592
+ <data key="e_label_confidence">0.9634375</data>
593
+ <data key="e_suspicion_score">0.9634375</data>
594
+ <data key="e_mo_name">Data Theft</data>
595
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
596
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
597
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
598
+ <data key="e_lifecycle_stage">complete-mission</data>
599
+ <data key="e_disposition">Disrupted</data>
600
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
601
+ </edge>
602
+ <edge id="e32" source="HOST-13238" target="b18d3643-ffe8-11ec-9a4f-476d17a6cc27">
603
+ <data key="e_type">INCIDENT_LINK</data>
604
+ <data key="e_timestamp">1657976946</data>
605
+ <data key="e_label_binary">malicious</data>
606
+ <data key="e_label_confidence">0.9634375</data>
607
+ <data key="e_suspicion_score">0.9634375</data>
608
+ <data key="e_mo_name">Data Theft</data>
609
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
610
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
611
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
612
+ <data key="e_lifecycle_stage">complete-mission</data>
613
+ <data key="e_disposition">Disrupted</data>
614
+ <data key="e_incident_id">78d22a70-0508-11ed-8762-011b41c4e26e</data>
615
+ </edge>
616
+ </graph>
617
+ </graphml>
graph/incidents_graphml/7/78d654d0-31d9-11ed-a735-37a95a76e51b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="748face2-2032-11ed-8ef6-6bd695f4d43f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.34.5</data>
35
+ <data key="n_hostname">100.64.34.5</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="61e63814-1273-11ed-abbd-adc387e5d873">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.184.211.180</data>
43
+ <data key="n_hostname">10.184.211.180</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
47
+ </node>
48
+ <edge id="e1" source="748face2-2032-11ed-8ef6-6bd695f4d43f" target="HOST-16949">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1662904562</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">78d654d0-31d9-11ed-a735-37a95a76e51b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/7/78d6ade0-f51b-11ec-9c76-edb488c77bbc.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="215c88c0-ea92-11ec-abf7-619673fe2558">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.9.103</data>
35
+ <data key="n_hostname">100.64.9.103</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="ee7d0150-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.73.185</data>
43
+ <data key="n_hostname">100.64.73.185</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12660" target="HOST-13328">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1656225888</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">78d6ade0-f51b-11ec-9c76-edb488c77bbc</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13328" target="HOST-12660">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1656225888</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">78d6ade0-f51b-11ec-9c76-edb488c77bbc</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/7/78dd8420-0451-11ef-82af-f11a2f279dd8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b9554-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.11.166</data>
35
+ <data key="n_hostname">172.31.11.166</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b59ae280-0624-11ee-8794-6bae0a4a6dd8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.4.31</data>
43
+ <data key="n_hostname">100.64.4.31</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2711" target="HOST-6625">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714193343</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">78dd8420-0451-11ef-82af-f11a2f279dd8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>