diff --git a/graph/incidents_graphml/7/7826c430-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/7/7826c430-090f-11ee-8afe-6d26bac63fb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..efac8da34847cb3eb06825c9cfc7df61e87ccf21
--- /dev/null
+++ b/graph/incidents_graphml/7/7826c430-090f-11ee-8afe-6d26bac63fb3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.47.65
+ 192.168.47.65
+ []
+ 0.4375
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.0.196
+ 100.64.0.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686567254
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7826c430-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567254
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7826c430-090f-11ee-8afe-6d26bac63fb3
+
+
+
diff --git a/graph/incidents_graphml/7/783465a0-7092-11ee-a33b-d3994469616f.graphml b/graph/incidents_graphml/7/783465a0-7092-11ee-a33b-d3994469616f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3918e1fca76d795c85e63eabbe8a14ea920224a
--- /dev/null
+++ b/graph/incidents_graphml/7/783465a0-7092-11ee-a33b-d3994469616f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.100
+ 100.64.51.100
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697948488
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 783465a0-7092-11ee-a33b-d3994469616f
+
+
+
diff --git a/graph/incidents_graphml/7/78353240-27a6-11ed-b92c-490402bdd5e6.graphml b/graph/incidents_graphml/7/78353240-27a6-11ed-b92c-490402bdd5e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..064f8ae2174c9e68e9d8369169cceaffd0ec1610
--- /dev/null
+++ b/graph/incidents_graphml/7/78353240-27a6-11ed-b92c-490402bdd5e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.80
+ 100.64.72.80
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661783145
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78353240-27a6-11ed-b92c-490402bdd5e6
+
+
+
diff --git a/graph/incidents_graphml/7/78394ac0-4f2c-11ee-896d-938683508860.graphml b/graph/incidents_graphml/7/78394ac0-4f2c-11ee-896d-938683508860.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3294ae077f79b22faaa67693d0fe03404310adf5
--- /dev/null
+++ b/graph/incidents_graphml/7/78394ac0-4f2c-11ee-896d-938683508860.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.98
+ 100.64.43.98
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694276291
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78394ac0-4f2c-11ee-896d-938683508860
+
+
+
diff --git a/graph/incidents_graphml/7/784552b0-7b60-11ee-b996-61ac976b8a88.graphml b/graph/incidents_graphml/7/784552b0-7b60-11ee-b996-61ac976b8a88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cb7a1fd8405fca26861e6ea6d5b806462118041
--- /dev/null
+++ b/graph/incidents_graphml/7/784552b0-7b60-11ee-b996-61ac976b8a88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.202
+ 100.64.35.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699136476
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 784552b0-7b60-11ee-b996-61ac976b8a88
+
+
+
diff --git a/graph/incidents_graphml/7/7845e6e0-a815-11ed-8da7-05bace042fb8.graphml b/graph/incidents_graphml/7/7845e6e0-a815-11ed-8da7-05bace042fb8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0810b0545d670585d9be7f5bff3e2d193e595db0
--- /dev/null
+++ b/graph/incidents_graphml/7/7845e6e0-a815-11ed-8da7-05bace042fb8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.154
+ 100.64.33.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-16914
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675904568
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7845e6e0-a815-11ed-8da7-05bace042fb8
+
+
+
diff --git a/graph/incidents_graphml/7/784aa4e0-4ac3-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/7/784aa4e0-4ac3-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..942ac5cd5b44ec456a69bac525e8982fece2664e
--- /dev/null
+++ b/graph/incidents_graphml/7/784aa4e0-4ac3-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,661 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.208
+ 100.64.20.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.54
+ 100.64.12.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.209
+ 100.64.20.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.9
+ 100.64.3.9
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.210
+ 100.64.20.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.187
+ 100.64.4.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.211
+ 100.64.20.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.212
+ 100.64.20.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.170
+ 100.64.11.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.213
+ 100.64.20.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.214
+ 100.64.20.214
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.215
+ 100.64.20.215
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.216
+ 100.64.20.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.217
+ 100.64.20.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.65
+ 100.64.15.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.132
+ 100.64.19.132
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791389
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 784aa4e0-4ac3-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/7/784b2510-4f2c-11ee-896d-938683508860.graphml b/graph/incidents_graphml/7/784b2510-4f2c-11ee-896d-938683508860.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0239c994f80ab06a7a38bbe45e2916048c1251d3
--- /dev/null
+++ b/graph/incidents_graphml/7/784b2510-4f2c-11ee-896d-938683508860.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.98
+ 100.64.43.98
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694276291
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 784b2510-4f2c-11ee-896d-938683508860
+
+
+
diff --git a/graph/incidents_graphml/7/7851a390-2d94-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/7/7851a390-2d94-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26396bcc892f279497d2ce902f187e484510a3e6
--- /dev/null
+++ b/graph/incidents_graphml/7/7851a390-2d94-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.247
+ 100.64.6.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690582619
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7851a390-2d94-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/7/7858dad0-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/7858dad0-7285-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bdbe41e46781a279f68a68de75448d9a9ecf1ab7
--- /dev/null
+++ b/graph/incidents_graphml/7/7858dad0-7285-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,129 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.30
+ 100.64.30.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698162807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7858dad0-7285-11ee-9478-f721b34a9cef
+
+
+ INCIDENT_LINK
+ 1698162807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7858dad0-7285-11ee-9478-f721b34a9cef
+
+
+ INCIDENT_LINK
+ 1698162807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7858dad0-7285-11ee-9478-f721b34a9cef
+
+
+ INCIDENT_LINK
+ 1698162807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7858dad0-7285-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/7/7860d470-a5a6-11ee-bda8-6b49f5844970.graphml b/graph/incidents_graphml/7/7860d470-a5a6-11ee-bda8-6b49f5844970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d1a4fa66292d9936ff212e8b09bbe1419e516e2
--- /dev/null
+++ b/graph/incidents_graphml/7/7860d470-a5a6-11ee-bda8-6b49f5844970.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.135
+ 100.64.29.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1703784489
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7860d470-a5a6-11ee-bda8-6b49f5844970
+
+
+
diff --git a/graph/incidents_graphml/7/7862f450-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/7862f450-26d3-11ee-ac10-e7e87ad84b9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33d0baedba7fca4e800fdc232c7332b463345d2b
--- /dev/null
+++ b/graph/incidents_graphml/7/7862f450-26d3-11ee-ac10-e7e87ad84b9c.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.194
+ 100.64.49.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689840019
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7862f450-26d3-11ee-ac10-e7e87ad84b9c
+
+
+ INCIDENT_LINK
+ 1689840019
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7862f450-26d3-11ee-ac10-e7e87ad84b9c
+
+
+
diff --git a/graph/incidents_graphml/7/786302e0-26a8-11ee-bacb-e1766d74be09.graphml b/graph/incidents_graphml/7/786302e0-26a8-11ee-bacb-e1766d74be09.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3b127be3f820f8f81ceba8f6322b18665e851a55
--- /dev/null
+++ b/graph/incidents_graphml/7/786302e0-26a8-11ee-bacb-e1766d74be09.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.122
+ 100.64.36.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689821551
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 786302e0-26a8-11ee-bacb-e1766d74be09
+
+
+
diff --git a/graph/incidents_graphml/7/78660c50-3a81-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/7/78660c50-3a81-11ee-b55b-6596b150fac1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d971d6fff466e2425c0494b0508e26bfb96efb70
--- /dev/null
+++ b/graph/incidents_graphml/7/78660c50-3a81-11ee-b55b-6596b150fac1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.85
+ 100.64.68.85
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692003824
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78660c50-3a81-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692003824
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78660c50-3a81-11ee-b55b-6596b150fac1
+
+
+
diff --git a/graph/incidents_graphml/7/78676370-8be4-11ee-9efd-252771b20c20.graphml b/graph/incidents_graphml/7/78676370-8be4-11ee-9efd-252771b20c20.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c3d201b6a05792e8f1a88240a4aeb48e457aaea
--- /dev/null
+++ b/graph/incidents_graphml/7/78676370-8be4-11ee-9efd-252771b20c20.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.237
+ 100.64.33.237
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.18
+ 100.64.22.18
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.238
+ 100.64.33.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.220
+ 100.64.4.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.138
+ 100.64.33.138
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700952388
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78676370-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952388
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78676370-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952388
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78676370-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952388
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78676370-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952388
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78676370-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952388
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78676370-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952388
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78676370-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952388
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78676370-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952388
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78676370-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952388
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78676370-8be4-11ee-9efd-252771b20c20
+
+
+
diff --git a/graph/incidents_graphml/7/786a0890-3c71-11ee-89e7-7976671c0f18.graphml b/graph/incidents_graphml/7/786a0890-3c71-11ee-89e7-7976671c0f18.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f012f6962d34fde8e8762d909ee469813ee37c3
--- /dev/null
+++ b/graph/incidents_graphml/7/786a0890-3c71-11ee-89e7-7976671c0f18.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.30
+ 100.64.20.30
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.36.31
+ 100.64.36.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692216854
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 786a0890-3c71-11ee-89e7-7976671c0f18
+
+
+ INCIDENT_LINK
+ 1692216854
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 786a0890-3c71-11ee-89e7-7976671c0f18
+
+
+ INCIDENT_LINK
+ 1692216854
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 786a0890-3c71-11ee-89e7-7976671c0f18
+
+
+ INCIDENT_LINK
+ 1692216854
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 786a0890-3c71-11ee-89e7-7976671c0f18
+
+
+ INCIDENT_LINK
+ 1692216854
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 786a0890-3c71-11ee-89e7-7976671c0f18
+
+
+ INCIDENT_LINK
+ 1692216854
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 786a0890-3c71-11ee-89e7-7976671c0f18
+
+
+
diff --git a/graph/incidents_graphml/7/786a6700-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/786a6700-7285-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4d81ea327df1912ad477cd345da694fd1a7ba1d
--- /dev/null
+++ b/graph/incidents_graphml/7/786a6700-7285-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.30
+ 100.64.30.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698162807
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 786a6700-7285-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/7/786e3770-7b60-11ee-b996-61ac976b8a88.graphml b/graph/incidents_graphml/7/786e3770-7b60-11ee-b996-61ac976b8a88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fba3cc0ca408d807e15deae43e422c9adb57bf15
--- /dev/null
+++ b/graph/incidents_graphml/7/786e3770-7b60-11ee-b996-61ac976b8a88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.161
+ 100.64.32.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699136476
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 786e3770-7b60-11ee-b996-61ac976b8a88
+
+
+
diff --git a/graph/incidents_graphml/7/786fd800-d773-11ed-b131-97a6b3859c17.graphml b/graph/incidents_graphml/7/786fd800-d773-11ed-b131-97a6b3859c17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff2330f0d7b1f2eec6f7ca3d1b981b9d85c6b20b
--- /dev/null
+++ b/graph/incidents_graphml/7/786fd800-d773-11ed-b131-97a6b3859c17.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.7
+ 100.64.17.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.8
+ 100.64.17.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1681112646
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 786fd800-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112646
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 786fd800-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112646
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 786fd800-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112646
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 786fd800-d773-11ed-b131-97a6b3859c17
+
+
+
diff --git a/graph/incidents_graphml/7/78751fc0-a5a6-11ee-bda8-6b49f5844970.graphml b/graph/incidents_graphml/7/78751fc0-a5a6-11ee-bda8-6b49f5844970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78928b39a852da35b59480e0b344152d14bf872a
--- /dev/null
+++ b/graph/incidents_graphml/7/78751fc0-a5a6-11ee-bda8-6b49f5844970.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.6
+ 100.64.70.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1703784489
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78751fc0-a5a6-11ee-bda8-6b49f5844970
+
+
+
diff --git a/graph/incidents_graphml/7/78752b50-26a8-11ee-bacb-e1766d74be09.graphml b/graph/incidents_graphml/7/78752b50-26a8-11ee-bacb-e1766d74be09.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0358296c36c79d8c054be078359a05c09d4db74e
--- /dev/null
+++ b/graph/incidents_graphml/7/78752b50-26a8-11ee-bacb-e1766d74be09.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.122
+ 100.64.36.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689821551
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 78752b50-26a8-11ee-bacb-e1766d74be09
+
+
+
diff --git a/graph/incidents_graphml/7/787849b0-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/787849b0-7285-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb1ec96ebe503bab405cb8f517b366f3c8592f44
--- /dev/null
+++ b/graph/incidents_graphml/7/787849b0-7285-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.97
+ 100.64.48.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698162807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 787849b0-7285-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/7/78789f30-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/78789f30-26d3-11ee-ac10-e7e87ad84b9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33451444b9652318f1d790ba2f0aedfa71092b35
--- /dev/null
+++ b/graph/incidents_graphml/7/78789f30-26d3-11ee-ac10-e7e87ad84b9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.194
+ 100.64.49.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689840019
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 78789f30-26d3-11ee-ac10-e7e87ad84b9c
+
+
+
diff --git a/graph/incidents_graphml/7/787a7b30-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/787a7b30-125f-11ee-8a81-b1159645422c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..983250909e4a29b901afbf37d0c6f64f94085039
--- /dev/null
+++ b/graph/incidents_graphml/7/787a7b30-125f-11ee-8a81-b1159645422c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.150
+ HOST-2906
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687591174
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 787a7b30-125f-11ee-8a81-b1159645422c
+
+
+
diff --git a/graph/incidents_graphml/7/787e6410-7b60-11ee-b996-61ac976b8a88.graphml b/graph/incidents_graphml/7/787e6410-7b60-11ee-b996-61ac976b8a88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4d78ef8e7e842f3033b4c97dfdfeac1c361efa7
--- /dev/null
+++ b/graph/incidents_graphml/7/787e6410-7b60-11ee-b996-61ac976b8a88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.202
+ 100.64.35.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699136476
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 787e6410-7b60-11ee-b996-61ac976b8a88
+
+
+
diff --git a/graph/incidents_graphml/7/787e92c0-0858-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/7/787e92c0-0858-11ef-81c9-bbab78bb4e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a12de329eb03c08d0da84a05bc7351ed69b85905
--- /dev/null
+++ b/graph/incidents_graphml/7/787e92c0-0858-11ef-81c9-bbab78bb4e36.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.216.82
+ 172.25.216.82
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.4
+ 100.64.87.4
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.73
+ 100.64.92.73
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.46
+ 100.64.97.46
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.177
+ 100.64.97.177
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714636154
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 787e92c0-0858-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636154
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 787e92c0-0858-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636154
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 787e92c0-0858-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636154
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 787e92c0-0858-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636154
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 787e92c0-0858-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636154
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 787e92c0-0858-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636154
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 787e92c0-0858-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636154
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 787e92c0-0858-11ef-81c9-bbab78bb4e36
+
+
+
diff --git a/graph/incidents_graphml/7/787ef520-2d94-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/7/787ef520-2d94-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb976230843ee78f4a4db72e8039fd746d8d59c4
--- /dev/null
+++ b/graph/incidents_graphml/7/787ef520-2d94-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.250
+ 100.64.52.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690582619
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 787ef520-2d94-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/7/78880120-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/78880120-7285-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4b2d2f6fc8a65fc2c81ea214b8d568187411c92
--- /dev/null
+++ b/graph/incidents_graphml/7/78880120-7285-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.97
+ 100.64.48.97
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698162807
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 78880120-7285-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/7/788e7420-a5a6-11ee-bda8-6b49f5844970.graphml b/graph/incidents_graphml/7/788e7420-a5a6-11ee-bda8-6b49f5844970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4d124e67a52be32db5dba54e7cd967c376c7047
--- /dev/null
+++ b/graph/incidents_graphml/7/788e7420-a5a6-11ee-bda8-6b49f5844970.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.7
+ 100.64.70.7
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1703784490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 788e7420-a5a6-11ee-bda8-6b49f5844970
+
+
+
diff --git a/graph/incidents_graphml/7/7899db70-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/7899db70-7285-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9cb9e9bbcb1e4b2e30db1f03adec523195f6366
--- /dev/null
+++ b/graph/incidents_graphml/7/7899db70-7285-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.219
+ 100.64.22.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698162807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7899db70-7285-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/7/789ccc00-a5a6-11ee-bda8-6b49f5844970.graphml b/graph/incidents_graphml/7/789ccc00-a5a6-11ee-bda8-6b49f5844970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d4e2c69714a2692035319379e3c1e7757647cc8
--- /dev/null
+++ b/graph/incidents_graphml/7/789ccc00-a5a6-11ee-bda8-6b49f5844970.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.144
+ 100.64.12.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.20
+ 100.64.68.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1703784490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 789ccc00-a5a6-11ee-bda8-6b49f5844970
+
+
+
diff --git a/graph/incidents_graphml/7/789d0b90-10e4-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/7/789d0b90-10e4-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..526013a2bd237bcd80f6cfb2ce3e069a3618056f
--- /dev/null
+++ b/graph/incidents_graphml/7/789d0b90-10e4-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.31
+ USER-0015-1838.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.228
+ 100.64.71.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687428395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 789d0b90-10e4-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687428395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 789d0b90-10e4-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/7/78a02df0-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/78a02df0-8616-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb130f527cadb341db7f84714d25b4ab86a68cf7
--- /dev/null
+++ b/graph/incidents_graphml/7/78a02df0-8616-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.86
+ 100.64.53.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700314156
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78a02df0-8616-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/7/78a086e0-2d94-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/7/78a086e0-2d94-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abca6c4c67c11be44ed578a463cc55ed4adb7cec
--- /dev/null
+++ b/graph/incidents_graphml/7/78a086e0-2d94-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.250
+ 100.64.52.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690582619
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78a086e0-2d94-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/7/78a30310-7b60-11ee-b996-61ac976b8a88.graphml b/graph/incidents_graphml/7/78a30310-7b60-11ee-b996-61ac976b8a88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1ebe18be3d5a2b208196745ad8712913d4177dd
--- /dev/null
+++ b/graph/incidents_graphml/7/78a30310-7b60-11ee-b996-61ac976b8a88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.101
+ 100.64.34.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699136476
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78a30310-7b60-11ee-b996-61ac976b8a88
+
+
+
diff --git a/graph/incidents_graphml/7/78a3ae10-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/78a3ae10-125f-11ee-8a81-b1159645422c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ca6e53cd6af70fac1a2441bf47fac4bc185cf78
--- /dev/null
+++ b/graph/incidents_graphml/7/78a3ae10-125f-11ee-8a81-b1159645422c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ HOST-2906
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687591175
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 78a3ae10-125f-11ee-8a81-b1159645422c
+
+
+
diff --git a/graph/incidents_graphml/7/78b18200-7b60-11ee-b996-61ac976b8a88.graphml b/graph/incidents_graphml/7/78b18200-7b60-11ee-b996-61ac976b8a88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f0fe36cc07536b749289546baf0833f2a7216c65
--- /dev/null
+++ b/graph/incidents_graphml/7/78b18200-7b60-11ee-b996-61ac976b8a88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.101
+ 100.64.34.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699136476
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78b18200-7b60-11ee-b996-61ac976b8a88
+
+
+
diff --git a/graph/incidents_graphml/7/78b18ec0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78b18ec0-31d9-11ed-a735-37a95a76e51b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ef72398991b0005f54c3a066ef384e7d96116b4
--- /dev/null
+++ b/graph/incidents_graphml/7/78b18ec0-31d9-11ed-a735-37a95a76e51b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662904562
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78b18ec0-31d9-11ed-a735-37a95a76e51b
+
+
+
diff --git a/graph/incidents_graphml/7/78b6b240-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/78b6b240-7285-11ee-9478-f721b34a9cef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad00680e518aaeb30e1aa065d8295f694449ceb3
--- /dev/null
+++ b/graph/incidents_graphml/7/78b6b240-7285-11ee-9478-f721b34a9cef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.219
+ 100.64.22.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698162807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 78b6b240-7285-11ee-9478-f721b34a9cef
+
+
+
diff --git a/graph/incidents_graphml/7/78c0ec90-4ec4-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/7/78c0ec90-4ec4-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7587681e25ce9c2f13b6cf172fb8df9cac5b7f69
--- /dev/null
+++ b/graph/incidents_graphml/7/78c0ec90-4ec4-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.97
+ 100.64.11.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694231624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78c0ec90-4ec4-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/7/78c2ccd0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78c2ccd0-31d9-11ed-a735-37a95a76e51b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82a533d57de4afe72e13e70ba78a098d54a97376
--- /dev/null
+++ b/graph/incidents_graphml/7/78c2ccd0-31d9-11ed-a735-37a95a76e51b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662904562
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 78c2ccd0-31d9-11ed-a735-37a95a76e51b
+
+
+
diff --git a/graph/incidents_graphml/7/78c7fcf0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78c7fcf0-31d9-11ed-a735-37a95a76e51b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2782e87bf7a6966b4a63af26c63bfd20389cad1c
--- /dev/null
+++ b/graph/incidents_graphml/7/78c7fcf0-31d9-11ed-a735-37a95a76e51b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.25
+ 100.64.91.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662904562
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78c7fcf0-31d9-11ed-a735-37a95a76e51b
+
+
+
diff --git a/graph/incidents_graphml/7/78ca2330-0451-11ef-82af-f11a2f279dd8.graphml b/graph/incidents_graphml/7/78ca2330-0451-11ef-82af-f11a2f279dd8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb93dbf0e9cb36eddd987ca283ee86ca91467ee9
--- /dev/null
+++ b/graph/incidents_graphml/7/78ca2330-0451-11ef-82af-f11a2f279dd8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.31
+ 100.64.4.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714193343
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78ca2330-0451-11ef-82af-f11a2f279dd8
+
+
+
diff --git a/graph/incidents_graphml/7/78ce18e0-368f-11ee-b546-fb0db7567997.graphml b/graph/incidents_graphml/7/78ce18e0-368f-11ee-b546-fb0db7567997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c39181e0bb91d5fb4be24ebadadcba2dd7dda035
--- /dev/null
+++ b/graph/incidents_graphml/7/78ce18e0-368f-11ee-b546-fb0db7567997.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.239
+ 100.64.65.239
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.43.10.92
+ 10.43.10.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691570033
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78ce18e0-368f-11ee-b546-fb0db7567997
+
+
+ INCIDENT_LINK
+ 1691570033
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78ce18e0-368f-11ee-b546-fb0db7567997
+
+
+
diff --git a/graph/incidents_graphml/7/78d0fda0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78d0fda0-31d9-11ed-a735-37a95a76e51b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5984eebd6052ecd777a5e696cf3434d125e496fe
--- /dev/null
+++ b/graph/incidents_graphml/7/78d0fda0-31d9-11ed-a735-37a95a76e51b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.25
+ 100.64.91.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662904562
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 78d0fda0-31d9-11ed-a735-37a95a76e51b
+
+
+
diff --git a/graph/incidents_graphml/7/78d18e60-4ec4-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/7/78d18e60-4ec4-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..946c8e0c1b4230adc867e27fbd82efbca5a8c479
--- /dev/null
+++ b/graph/incidents_graphml/7/78d18e60-4ec4-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.97
+ 100.64.11.97
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694231624
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 78d18e60-4ec4-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/7/78d22a70-0508-11ed-8762-011b41c4e26e.graphml b/graph/incidents_graphml/7/78d22a70-0508-11ed-8762-011b41c4e26e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d9f89bbb5d8d61436808af93fd22c50fe0abc34
--- /dev/null
+++ b/graph/incidents_graphml/7/78d22a70-0508-11ed-8762-011b41c4e26e.graphml
@@ -0,0 +1,617 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.31
+ 100.64.83.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.228
+ 100.64.71.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.32
+ USER-0015-1943.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.128
+ 100.64.80.128
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.25.66
+ 100.64.25.66
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.4.216
+ 100.64.4.216
+ ["Exploiting Target","Exploiting Host"]
+ 0.9634375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.31
+ 100.64.75.31
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.111
+ 100.64.71.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.252
+ 100.64.79.252
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.61
+ 100.64.80.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.7.252
+ 100.64.7.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.63
+ USER-0015-1731.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.33
+ 100.64.83.33
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.67
+ 100.64.73.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.83.34
+ USER-0015-1944.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.35
+ 100.64.83.35
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.36
+ 100.64.83.36
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+ INCIDENT_LINK
+ 1657976946
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78d22a70-0508-11ed-8762-011b41c4e26e
+
+
+
diff --git a/graph/incidents_graphml/7/78d654d0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78d654d0-31d9-11ed-a735-37a95a76e51b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6b3e2bd344e06525ed1a08f20dcc8f9200edca0
--- /dev/null
+++ b/graph/incidents_graphml/7/78d654d0-31d9-11ed-a735-37a95a76e51b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.5
+ 100.64.34.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1662904562
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78d654d0-31d9-11ed-a735-37a95a76e51b
+
+
+
diff --git a/graph/incidents_graphml/7/78d6ade0-f51b-11ec-9c76-edb488c77bbc.graphml b/graph/incidents_graphml/7/78d6ade0-f51b-11ec-9c76-edb488c77bbc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4128699b43873a89732a9b79ee6bdbafbd772999
--- /dev/null
+++ b/graph/incidents_graphml/7/78d6ade0-f51b-11ec-9c76-edb488c77bbc.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.185
+ 100.64.73.185
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656225888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78d6ade0-f51b-11ec-9c76-edb488c77bbc
+
+
+ INCIDENT_LINK
+ 1656225888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78d6ade0-f51b-11ec-9c76-edb488c77bbc
+
+
+
diff --git a/graph/incidents_graphml/7/78dd8420-0451-11ef-82af-f11a2f279dd8.graphml b/graph/incidents_graphml/7/78dd8420-0451-11ef-82af-f11a2f279dd8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1cd544dc13f9031d939fe31637f9f2c75db802e2
--- /dev/null
+++ b/graph/incidents_graphml/7/78dd8420-0451-11ef-82af-f11a2f279dd8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.31
+ 100.64.4.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714193343
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 78dd8420-0451-11ef-82af-f11a2f279dd8
+
+
+
diff --git a/graph/incidents_graphml/7/78dfcab0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78dfcab0-31d9-11ed-a735-37a95a76e51b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23f5d772460d27c3d9556d1bc7c523fe7ff61dae
--- /dev/null
+++ b/graph/incidents_graphml/7/78dfcab0-31d9-11ed-a735-37a95a76e51b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.34.5
+ 100.64.34.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662904562
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 78dfcab0-31d9-11ed-a735-37a95a76e51b
+
+
+
diff --git a/graph/incidents_graphml/7/78e4d3c0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78e4d3c0-31d9-11ed-a735-37a95a76e51b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d41aa25896cc4cff0ca2b50d8cbcf30ff656f579
--- /dev/null
+++ b/graph/incidents_graphml/7/78e4d3c0-31d9-11ed-a735-37a95a76e51b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.160
+ 100.64.63.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662904562
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78e4d3c0-31d9-11ed-a735-37a95a76e51b
+
+
+
diff --git a/graph/incidents_graphml/7/78e7dec0-a5a6-11ee-bda8-6b49f5844970.graphml b/graph/incidents_graphml/7/78e7dec0-a5a6-11ee-bda8-6b49f5844970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b3666039a83429e27acc358aaaf332f29bf79e5
--- /dev/null
+++ b/graph/incidents_graphml/7/78e7dec0-a5a6-11ee-bda8-6b49f5844970.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"]
+
+
+ HOST
+ 100.64.11.104
+ 100.64.11.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1703784490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 78e7dec0-a5a6-11ee-bda8-6b49f5844970
+
+
+
diff --git a/graph/incidents_graphml/7/78e85100-106f-11ef-9de3-e13309ab258b.graphml b/graph/incidents_graphml/7/78e85100-106f-11ef-9de3-e13309ab258b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..300c41e212341f5b39786d39faffc48a9c354959
--- /dev/null
+++ b/graph/incidents_graphml/7/78e85100-106f-11ef-9de3-e13309ab258b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.118
+ 100.64.30.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1715525642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78e85100-106f-11ef-9de3-e13309ab258b
+
+
+
diff --git a/graph/incidents_graphml/7/78ebb190-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78ebb190-31d9-11ed-a735-37a95a76e51b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..559c1facd07655dc72a164dfae7a8bb9a59d9f5b
--- /dev/null
+++ b/graph/incidents_graphml/7/78ebb190-31d9-11ed-a735-37a95a76e51b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.63.160
+ 100.64.63.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662904562
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 78ebb190-31d9-11ed-a735-37a95a76e51b
+
+
+
diff --git a/graph/incidents_graphml/7/78ee4d00-0451-11ef-82af-f11a2f279dd8.graphml b/graph/incidents_graphml/7/78ee4d00-0451-11ef-82af-f11a2f279dd8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..365dc02334a1e66e449cea8e770883577d6881b2
--- /dev/null
+++ b/graph/incidents_graphml/7/78ee4d00-0451-11ef-82af-f11a2f279dd8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.189
+ 100.64.27.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714193344
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78ee4d00-0451-11ef-82af-f11a2f279dd8
+
+
+
diff --git a/graph/incidents_graphml/7/78eedf20-4f2c-11ee-896d-938683508860.graphml b/graph/incidents_graphml/7/78eedf20-4f2c-11ee-896d-938683508860.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25f4e36ebe0a0c2412edc3f664ea77e38c1ebb72
--- /dev/null
+++ b/graph/incidents_graphml/7/78eedf20-4f2c-11ee-896d-938683508860.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.100
+ 100.64.43.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694276292
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78eedf20-4f2c-11ee-896d-938683508860
+
+
+
diff --git a/graph/incidents_graphml/7/78eff750-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78eff750-31d9-11ed-a735-37a95a76e51b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..615d418065aa52a0809d810785ccfd311eed77b2
--- /dev/null
+++ b/graph/incidents_graphml/7/78eff750-31d9-11ed-a735-37a95a76e51b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.29
+ 100.64.91.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1662904562
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78eff750-31d9-11ed-a735-37a95a76e51b
+
+
+
diff --git a/graph/incidents_graphml/7/78f73130-6a83-11ee-8b64-8bde2abad778.graphml b/graph/incidents_graphml/7/78f73130-6a83-11ee-8b64-8bde2abad778.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95b729fda22ecb3c3a20f2e607ecd2dbc6cda3df
--- /dev/null
+++ b/graph/incidents_graphml/7/78f73130-6a83-11ee-8b64-8bde2abad778.graphml
@@ -0,0 +1,279 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.200
+ 100.64.26.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.248
+ 100.64.10.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.205
+ 100.64.43.205
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.14
+ 100.64.9.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.206
+ 100.64.43.206
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.99
+ 100.64.10.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.230
+ 100.64.7.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282339
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78f73130-6a83-11ee-8b64-8bde2abad778
+
+
+
diff --git a/graph/incidents_graphml/7/78f737d0-1e3d-11ee-b080-b1f442930522.graphml b/graph/incidents_graphml/7/78f737d0-1e3d-11ee-b080-b1f442930522.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..169d3979b6116318287de51983a8d4cee2821b89
--- /dev/null
+++ b/graph/incidents_graphml/7/78f737d0-1e3d-11ee-b080-b1f442930522.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.192
+ 100.64.21.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688895986
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78f737d0-1e3d-11ee-b080-b1f442930522
+
+
+
diff --git a/graph/incidents_graphml/7/78f77160-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78f77160-31d9-11ed-a735-37a95a76e51b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35a52e63b81107b15682173e8bf7d7101ff0bc17
--- /dev/null
+++ b/graph/incidents_graphml/7/78f77160-31d9-11ed-a735-37a95a76e51b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.91.29
+ 100.64.91.29
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662904562
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 78f77160-31d9-11ed-a735-37a95a76e51b
+
+
+
diff --git a/graph/incidents_graphml/7/78fcd360-f755-11ee-9330-cddc7b6e96b7.graphml b/graph/incidents_graphml/7/78fcd360-f755-11ee-9330-cddc7b6e96b7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db3939c3a92f6be088f6d3e181650952e17e4ae4
--- /dev/null
+++ b/graph/incidents_graphml/7/78fcd360-f755-11ee-9330-cddc7b6e96b7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.167
+ 100.64.4.167
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712765696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 78fcd360-f755-11ee-9330-cddc7b6e96b7
+
+
+
diff --git a/graph/incidents_graphml/7/78fe6080-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/7/78fe6080-216e-11ee-9e0b-8dcc0a578b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e18f46738fd638354d50e756261b6b45d72db4eb
--- /dev/null
+++ b/graph/incidents_graphml/7/78fe6080-216e-11ee-9e0b-8dcc0a578b7b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.250
+ 100.64.17.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689246885
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78fe6080-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246885
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 78fe6080-216e-11ee-9e0b-8dcc0a578b7b
+
+
+
diff --git a/graph/incidents_graphml/7/79006b50-4f2c-11ee-896d-938683508860.graphml b/graph/incidents_graphml/7/79006b50-4f2c-11ee-896d-938683508860.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a757735fba4d7e9537dc9d47d0418e0c469b0b01
--- /dev/null
+++ b/graph/incidents_graphml/7/79006b50-4f2c-11ee-896d-938683508860.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.100
+ 100.64.43.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694276292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 79006b50-4f2c-11ee-896d-938683508860
+
+
+
diff --git a/graph/incidents_graphml/7/79015fd0-0451-11ef-82af-f11a2f279dd8.graphml b/graph/incidents_graphml/7/79015fd0-0451-11ef-82af-f11a2f279dd8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71412b99b8c35fee47a4911eb6b18c51e2cc0a5f
--- /dev/null
+++ b/graph/incidents_graphml/7/79015fd0-0451-11ef-82af-f11a2f279dd8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.189
+ 100.64.27.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714193344
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 79015fd0-0451-11ef-82af-f11a2f279dd8
+
+
+
diff --git a/graph/incidents_graphml/7/7908ff10-277e-11ef-8c37-3d33f474c8fc.graphml b/graph/incidents_graphml/7/7908ff10-277e-11ef-8c37-3d33f474c8fc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2fcacd2b3f6f638d18afb401d52db3d8e360f779
--- /dev/null
+++ b/graph/incidents_graphml/7/7908ff10-277e-11ef-8c37-3d33f474c8fc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.46
+ 100.64.10.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1718060962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7908ff10-277e-11ef-8c37-3d33f474c8fc
+
+
+
diff --git a/graph/incidents_graphml/7/790c6f70-263e-11ee-8f39-83af752ea491.graphml b/graph/incidents_graphml/7/790c6f70-263e-11ee-8f39-83af752ea491.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1612499172804bc08bb02acf1806f9952a437da2
--- /dev/null
+++ b/graph/incidents_graphml/7/790c6f70-263e-11ee-8f39-83af752ea491.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.32
+ 100.64.64.32
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689776025
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 790c6f70-263e-11ee-8f39-83af752ea491
+
+
+
diff --git a/graph/incidents_graphml/7/790dd8d0-4f2c-11ee-896d-938683508860.graphml b/graph/incidents_graphml/7/790dd8d0-4f2c-11ee-896d-938683508860.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f6220ec4cf01021132a5fa348cb1a791eb1bf38
--- /dev/null
+++ b/graph/incidents_graphml/7/790dd8d0-4f2c-11ee-896d-938683508860.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.164
+ 100.64.9.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694276292
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 790dd8d0-4f2c-11ee-896d-938683508860
+
+
+
diff --git a/graph/incidents_graphml/7/790dea60-f755-11ee-9330-cddc7b6e96b7.graphml b/graph/incidents_graphml/7/790dea60-f755-11ee-9330-cddc7b6e96b7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aef11ae90086bf3b6a84b9de80810db61178714f
--- /dev/null
+++ b/graph/incidents_graphml/7/790dea60-f755-11ee-9330-cddc7b6e96b7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.167
+ 100.64.4.167
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712765697
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 790dea60-f755-11ee-9330-cddc7b6e96b7
+
+
+
diff --git a/graph/incidents_graphml/7/791afdc0-ed63-11ec-9115-b3a5268a4818.graphml b/graph/incidents_graphml/7/791afdc0-ed63-11ec-9115-b3a5268a4818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d6c286cbb8d1791cf672923c47b689708ee4b67
--- /dev/null
+++ b/graph/incidents_graphml/7/791afdc0-ed63-11ec-9115-b3a5268a4818.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.168
+ 100.64.77.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.169
+ USER-0015-1763.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655377203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 791afdc0-ed63-11ec-9115-b3a5268a4818
+
+
+ INCIDENT_LINK
+ 1655377203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 791afdc0-ed63-11ec-9115-b3a5268a4818
+
+
+
diff --git a/graph/incidents_graphml/7/79243600-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/79243600-dd81-11ee-bdd6-3b03475da548.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4dc8ec3a946954a60412ed2a27912f3fc8a013a
--- /dev/null
+++ b/graph/incidents_graphml/7/79243600-dd81-11ee-bdd6-3b03475da548.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 100.64.93.255
+ 100.64.93.255
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1709925864
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 79243600-dd81-11ee-bdd6-3b03475da548
+
+
+
diff --git a/graph/incidents_graphml/7/7925c1e0-1e3d-11ee-b080-b1f442930522.graphml b/graph/incidents_graphml/7/7925c1e0-1e3d-11ee-b080-b1f442930522.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bfda53dac8b36199f09d20b010fc1ba06ffdf0be
--- /dev/null
+++ b/graph/incidents_graphml/7/7925c1e0-1e3d-11ee-b080-b1f442930522.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.192
+ 100.64.21.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688895987
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7925c1e0-1e3d-11ee-b080-b1f442930522
+
+
+
diff --git a/graph/incidents_graphml/7/7926bfe0-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7926bfe0-2e2e-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64731c4494c28bc639c82204d92ee476ca0f40a7
--- /dev/null
+++ b/graph/incidents_graphml/7/7926bfe0-2e2e-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.235
+ 100.64.45.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690648763
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7926bfe0-2e2e-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/7/7929eb90-1889-11ed-b964-8d89086ae0ab.graphml b/graph/incidents_graphml/7/7929eb90-1889-11ed-b964-8d89086ae0ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6195804e5ada54f545f3df1e1f7205b5a9f3d8d
--- /dev/null
+++ b/graph/incidents_graphml/7/7929eb90-1889-11ed-b964-8d89086ae0ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.118
+ 100.64.84.118
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660121424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7929eb90-1889-11ed-b964-8d89086ae0ab
+
+
+
diff --git a/graph/incidents_graphml/7/792fe5d0-4462-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/7/792fe5d0-4462-11ee-853f-87a1872d184b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b3f5133ae169b309af61958ccefdb2691dd0a8a
--- /dev/null
+++ b/graph/incidents_graphml/7/792fe5d0-4462-11ee-853f-87a1872d184b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.219
+ 100.64.24.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693090022
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 792fe5d0-4462-11ee-853f-87a1872d184b
+
+
+
diff --git a/graph/incidents_graphml/7/79368cb0-263e-11ee-8f39-83af752ea491.graphml b/graph/incidents_graphml/7/79368cb0-263e-11ee-8f39-83af752ea491.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbce49ef6c49502e61944bf0a0763fc6a9788a3b
--- /dev/null
+++ b/graph/incidents_graphml/7/79368cb0-263e-11ee-8f39-83af752ea491.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.34
+ 100.64.64.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689776025
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79368cb0-263e-11ee-8f39-83af752ea491
+
+
+
diff --git a/graph/incidents_graphml/7/7941ac30-0718-11ed-b0df-8957a66f2fd5.graphml b/graph/incidents_graphml/7/7941ac30-0718-11ed-b0df-8957a66f2fd5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5264a7a64c38c5e609d6f82d831b2c3066015379
--- /dev/null
+++ b/graph/incidents_graphml/7/7941ac30-0718-11ed-b0df-8957a66f2fd5.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.207.11
+ 192.168.207.11
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 192.168.151.214
+ 192.168.151.214
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658203721
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7941ac30-0718-11ed-b0df-8957a66f2fd5
+
+
+ INCIDENT_LINK
+ 1658203721
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7941ac30-0718-11ed-b0df-8957a66f2fd5
+
+
+
diff --git a/graph/incidents_graphml/7/7946d2d0-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/7946d2d0-54c1-11ee-8051-4f06835265f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c414612a915939c6b1e8b6b8d6b879b91c6ead2
--- /dev/null
+++ b/graph/incidents_graphml/7/7946d2d0-54c1-11ee-8051-4f06835265f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.18
+ 100.64.6.18
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694890043
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7946d2d0-54c1-11ee-8051-4f06835265f6
+
+
+
diff --git a/graph/incidents_graphml/7/7948eec0-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/7948eec0-125f-11ee-8a81-b1159645422c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7874cee3b793cad9023584bb9aeee89fbc933ea
--- /dev/null
+++ b/graph/incidents_graphml/7/7948eec0-125f-11ee-8a81-b1159645422c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.188
+ 100.64.47.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687591176
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7948eec0-125f-11ee-8a81-b1159645422c
+
+
+
diff --git a/graph/incidents_graphml/7/794db700-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/794db700-dd81-11ee-bdd6-3b03475da548.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c2652049ac205c22c3696b3bbd29ee30b8309cb
--- /dev/null
+++ b/graph/incidents_graphml/7/794db700-dd81-11ee-bdd6-3b03475da548.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.1
+ 100.64.94.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709925865
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 794db700-dd81-11ee-bdd6-3b03475da548
+
+
+
diff --git a/graph/incidents_graphml/7/795215a0-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/795215a0-2e2e-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29195ead7f0d472b773ffdaed6814ac57e395335
--- /dev/null
+++ b/graph/incidents_graphml/7/795215a0-2e2e-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.235
+ 100.64.45.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690648763
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 795215a0-2e2e-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/7/7953dd60-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7953dd60-04e3-11ed-a6aa-45e3cee3f3d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0645b67ea40fc4d686457a29ce4bb31e4f76a2a
--- /dev/null
+++ b/graph/incidents_graphml/7/7953dd60-04e3-11ed-a6aa-45e3cee3f3d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.15
+ 100.64.76.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657961055
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7953dd60-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+
diff --git a/graph/incidents_graphml/7/795774a0-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/795774a0-54c1-11ee-8051-4f06835265f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8fc6a36f9b860a5348d7d3e974e812ad3f4193f7
--- /dev/null
+++ b/graph/incidents_graphml/7/795774a0-54c1-11ee-8051-4f06835265f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.18
+ 100.64.6.18
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694890043
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 795774a0-54c1-11ee-8051-4f06835265f6
+
+
+
diff --git a/graph/incidents_graphml/7/795ea6f0-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/795ea6f0-dd81-11ee-bdd6-3b03475da548.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dad8505d9e0efc784dc7c39e871f8e2ed712cd33
--- /dev/null
+++ b/graph/incidents_graphml/7/795ea6f0-dd81-11ee-bdd6-3b03475da548.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.1
+ 100.64.94.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709925865
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 795ea6f0-dd81-11ee-bdd6-3b03475da548
+
+
+
diff --git a/graph/incidents_graphml/7/79628360-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/79628360-04e3-11ed-a6aa-45e3cee3f3d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df9f688d2e5b6bd8f2f0f256fde655642b406bf6
--- /dev/null
+++ b/graph/incidents_graphml/7/79628360-04e3-11ed-a6aa-45e3cee3f3d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.15
+ 100.64.76.15
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657961055
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 79628360-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+
diff --git a/graph/incidents_graphml/7/79699540-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/79699540-2e2e-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80c75ae658280411f570a0289bc97fef1b4cf2fc
--- /dev/null
+++ b/graph/incidents_graphml/7/79699540-2e2e-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.237
+ 100.64.45.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690648763
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79699540-2e2e-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/7/796d1890-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/796d1890-125f-11ee-8a81-b1159645422c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1038c85dac8d9a3638057b3d065d66a704739a95
--- /dev/null
+++ b/graph/incidents_graphml/7/796d1890-125f-11ee-8a81-b1159645422c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.188
+ 100.64.47.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687591176
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 796d1890-125f-11ee-8a81-b1159645422c
+
+
+
diff --git a/graph/incidents_graphml/7/798eaa50-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/798eaa50-125f-11ee-8a81-b1159645422c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..359ad8bc68d535a0396a2518a7f064d8ebe91484
--- /dev/null
+++ b/graph/incidents_graphml/7/798eaa50-125f-11ee-8a81-b1159645422c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.231
+ 100.64.26.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687591176
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 798eaa50-125f-11ee-8a81-b1159645422c
+
+
+
diff --git a/graph/incidents_graphml/7/798ef790-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/798ef790-2e2e-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84e38fbdb16d5b8a0864d846588a1a316c0de134
--- /dev/null
+++ b/graph/incidents_graphml/7/798ef790-2e2e-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.237
+ 100.64.45.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690648763
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 798ef790-2e2e-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/7/79936c30-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79936c30-54c1-11ee-8051-4f06835265f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9400c9c20c6986299947038f18631b12898df177
--- /dev/null
+++ b/graph/incidents_graphml/7/79936c30-54c1-11ee-8051-4f06835265f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.26
+ 100.64.7.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694890044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79936c30-54c1-11ee-8051-4f06835265f6
+
+
+
diff --git a/graph/incidents_graphml/7/79964bd0-12a9-11ee-abf2-25c0fa3f9e2a.graphml b/graph/incidents_graphml/7/79964bd0-12a9-11ee-abf2-25c0fa3f9e2a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50960481f25ffdc55687a115e3c0d5ce958b516f
--- /dev/null
+++ b/graph/incidents_graphml/7/79964bd0-12a9-11ee-abf2-25c0fa3f9e2a.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.248
+ 100.64.19.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.204
+ 100.64.80.204
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.248
+ 100.64.81.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.7.26
+ 100.64.7.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687622959
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+ INCIDENT_LINK
+ 1687622959
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+ INCIDENT_LINK
+ 1687622959
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+ INCIDENT_LINK
+ 1687622959
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+ INCIDENT_LINK
+ 1687622959
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+ INCIDENT_LINK
+ 1687622959
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+
diff --git a/graph/incidents_graphml/7/79a18a10-043d-11ee-8693-9b63b760243c.graphml b/graph/incidents_graphml/7/79a18a10-043d-11ee-8693-9b63b760243c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae42ccff154ad7f397ef7e468edfe57bccdc3c42
--- /dev/null
+++ b/graph/incidents_graphml/7/79a18a10-043d-11ee-8693-9b63b760243c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.228
+ USER-0015-1671.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Umbrella","Meraki","Cisco Meraki Firewall","Stealthwatch","Windows Active Directory"]
+
+
+ HOST
+ 100.64.35.144
+ 100.64.35.144
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1686037257
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79a18a10-043d-11ee-8693-9b63b760243c
+
+
+ INCIDENT_LINK
+ 1686037257
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79a18a10-043d-11ee-8693-9b63b760243c
+
+
+
diff --git a/graph/incidents_graphml/7/79a398d0-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79a398d0-54c1-11ee-8051-4f06835265f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..762b94fb51b6b239184ebb5552a7893bbecbb7cd
--- /dev/null
+++ b/graph/incidents_graphml/7/79a398d0-54c1-11ee-8051-4f06835265f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.26
+ 100.64.7.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694890044
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 79a398d0-54c1-11ee-8051-4f06835265f6
+
+
+
diff --git a/graph/incidents_graphml/7/79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd1011974c7246b153c45ac01a81039b3dc352a9
--- /dev/null
+++ b/graph/incidents_graphml/7/79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6.graphml
@@ -0,0 +1,727 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.19
+ 100.64.76.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.226
+ USER-0015-1727.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.20
+ 100.64.76.20
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.173
+ 100.64.72.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.221
+ 100.64.71.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.21
+ 100.64.76.21
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.22
+ 100.64.76.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.3.85
+ 100.64.3.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.160
+ USER-0015-1654.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.30.82
+ 100.64.30.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.23
+ 100.64.76.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.220
+ 100.64.74.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.232
+ 100.64.71.232
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.24
+ 100.64.76.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.19.172
+ 100.64.19.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.151
+ 100.64.71.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.983125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.25
+ 100.64.76.25
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.26
+ 100.64.76.26
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.27
+ 100.64.76.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.114
+ 100.64.74.114
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+
diff --git a/graph/incidents_graphml/7/79ad07c0-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/79ad07c0-125f-11ee-8a81-b1159645422c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6f0a4c5d9a176d69a6b869d04ef17b202e77ccc
--- /dev/null
+++ b/graph/incidents_graphml/7/79ad07c0-125f-11ee-8a81-b1159645422c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.231
+ 100.64.26.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687591176
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 79ad07c0-125f-11ee-8a81-b1159645422c
+
+
+
diff --git a/graph/incidents_graphml/7/79b23ed0-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79b23ed0-54c1-11ee-8051-4f06835265f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..160d765d30d9d75f836cee1f49cd5428b53da1f1
--- /dev/null
+++ b/graph/incidents_graphml/7/79b23ed0-54c1-11ee-8051-4f06835265f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.232
+ 100.64.29.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694890044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79b23ed0-54c1-11ee-8051-4f06835265f6
+
+
+
diff --git a/graph/incidents_graphml/7/79b70160-038e-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/7/79b70160-038e-11ee-8785-53111c12ea35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd44675317c795d634567a880264690c98d3239c
--- /dev/null
+++ b/graph/incidents_graphml/7/79b70160-038e-11ee-8785-53111c12ea35.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.244
+ 100.64.24.244
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.73.195
+ 100.64.73.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685962095
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79b70160-038e-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685962095
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79b70160-038e-11ee-8785-53111c12ea35
+
+
+
diff --git a/graph/incidents_graphml/7/79bc3040-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/79bc3040-dd81-11ee-bdd6-3b03475da548.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1926b98e16576f2bda1f7572f19da91385c10a06
--- /dev/null
+++ b/graph/incidents_graphml/7/79bc3040-dd81-11ee-bdd6-3b03475da548.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.88
+ 100.64.46.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1709925865
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79bc3040-dd81-11ee-bdd6-3b03475da548
+
+
+
diff --git a/graph/incidents_graphml/7/79c02180-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79c02180-54c1-11ee-8051-4f06835265f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85dbe12489d2ed60c3a85dd5d4053d427b863e16
--- /dev/null
+++ b/graph/incidents_graphml/7/79c02180-54c1-11ee-8051-4f06835265f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.232
+ 100.64.29.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694890044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79c02180-54c1-11ee-8051-4f06835265f6
+
+
+
diff --git a/graph/incidents_graphml/7/79c3e120-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/79c3e120-34fb-11ee-9ec4-97bf79cb287b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ace54d56881f06d2ca077ff4b06f203b7624aa0f
--- /dev/null
+++ b/graph/incidents_graphml/7/79c3e120-34fb-11ee-9ec4-97bf79cb287b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.184
+ 100.64.46.184
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691396518
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 79c3e120-34fb-11ee-9ec4-97bf79cb287b
+
+
+
diff --git a/graph/incidents_graphml/7/79cf1c00-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/79cf1c00-dd81-11ee-bdd6-3b03475da548.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1de17927090ce06b50ca8057a8e0b765f26af43
--- /dev/null
+++ b/graph/incidents_graphml/7/79cf1c00-dd81-11ee-bdd6-3b03475da548.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 100.64.46.88
+ 100.64.46.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1709925866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 79cf1c00-dd81-11ee-bdd6-3b03475da548
+
+
+
diff --git a/graph/incidents_graphml/7/79dbffd0-106f-11ef-9de3-e13309ab258b.graphml b/graph/incidents_graphml/7/79dbffd0-106f-11ef-9de3-e13309ab258b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..31272c18f12065ff864f4aff2119259eefee4a56
--- /dev/null
+++ b/graph/incidents_graphml/7/79dbffd0-106f-11ef-9de3-e13309ab258b.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.19.156
+ 100.64.19.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1999.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 79dbffd0-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 79dbffd0-106f-11ef-9de3-e13309ab258b
+
+
+
diff --git a/graph/incidents_graphml/7/79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e6475deeca77974f0cfa0bba2789d8b88809e0f
--- /dev/null
+++ b/graph/incidents_graphml/7/79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.94
+ 100.64.59.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.2.241
+ 100.64.2.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.130
+ 100.64.71.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+
diff --git a/graph/incidents_graphml/7/79e583d0-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79e583d0-54c1-11ee-8051-4f06835265f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05d03617bc7c62131d5d7c4da3c112881722effb
--- /dev/null
+++ b/graph/incidents_graphml/7/79e583d0-54c1-11ee-8051-4f06835265f6.graphml
@@ -0,0 +1,173 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.115
+ 100.64.10.115
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694890044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79e583d0-54c1-11ee-8051-4f06835265f6
+
+
+ INCIDENT_LINK
+ 1694890044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79e583d0-54c1-11ee-8051-4f06835265f6
+
+
+ INCIDENT_LINK
+ 1694890044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79e583d0-54c1-11ee-8051-4f06835265f6
+
+
+ INCIDENT_LINK
+ 1694890044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79e583d0-54c1-11ee-8051-4f06835265f6
+
+
+ INCIDENT_LINK
+ 1694890044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79e583d0-54c1-11ee-8051-4f06835265f6
+
+
+ INCIDENT_LINK
+ 1694890044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 79e583d0-54c1-11ee-8051-4f06835265f6
+
+
+
diff --git a/graph/incidents_graphml/7/79e85bd0-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/79e85bd0-26d3-11ee-ac10-e7e87ad84b9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9dcfcae293d4cd9bd800c4e760ab18154bc49fe5
--- /dev/null
+++ b/graph/incidents_graphml/7/79e85bd0-26d3-11ee-ac10-e7e87ad84b9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.176
+ USER-0015-1413.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689840022
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79e85bd0-26d3-11ee-ac10-e7e87ad84b9c
+
+
+
diff --git a/graph/incidents_graphml/7/79eca5f0-3f5b-11ee-a7a8-a9c952ce7042.graphml b/graph/incidents_graphml/7/79eca5f0-3f5b-11ee-a7a8-a9c952ce7042.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed671d4a46ba1ce1820e5f5187725d0649981c4b
--- /dev/null
+++ b/graph/incidents_graphml/7/79eca5f0-3f5b-11ee-a7a8-a9c952ce7042.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1692537261
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79eca5f0-3f5b-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537261
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79eca5f0-3f5b-11ee-a7a8-a9c952ce7042
+
+
+
diff --git a/graph/incidents_graphml/7/79ed63e0-c054-11ed-96c1-674c48144fee.graphml b/graph/incidents_graphml/7/79ed63e0-c054-11ed-96c1-674c48144fee.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36dd6d647367e8a69ca529d37ae4661d5127a65c
--- /dev/null
+++ b/graph/incidents_graphml/7/79ed63e0-c054-11ed-96c1-674c48144fee.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.234
+ 100.64.69.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1678570457
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 79ed63e0-c054-11ed-96c1-674c48144fee
+
+
+
diff --git a/graph/incidents_graphml/7/79ee2190-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/79ee2190-04e3-11ed-a6aa-45e3cee3f3d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28cd1337112b3c8cc6f2d944829ea331479850d0
--- /dev/null
+++ b/graph/incidents_graphml/7/79ee2190-04e3-11ed-a6aa-45e3cee3f3d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.59.94
+ 100.64.59.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657961056
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 79ee2190-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+
diff --git a/graph/incidents_graphml/7/79fa6b60-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79fa6b60-54c1-11ee-8051-4f06835265f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a68dd60bdd804df02d1b7ad05ba5ed7a487c700
--- /dev/null
+++ b/graph/incidents_graphml/7/79fa6b60-54c1-11ee-8051-4f06835265f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.115
+ 100.64.10.115
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694890044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 79fa6b60-54c1-11ee-8051-4f06835265f6
+
+
+
diff --git a/graph/incidents_graphml/7/79fa8440-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/79fa8440-26d3-11ee-ac10-e7e87ad84b9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8efeb067e3a6a46238342c1a85d4efbf1f7680a
--- /dev/null
+++ b/graph/incidents_graphml/7/79fa8440-26d3-11ee-ac10-e7e87ad84b9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.176
+ USER-0015-1413.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689840022
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 79fa8440-26d3-11ee-ac10-e7e87ad84b9c
+
+
+
diff --git a/graph/incidents_graphml/7/7a00e060-4ac3-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/7/7a00e060-4ac3-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c99c582e42c2eb84cc1e6285d5db6c44bfc1944
--- /dev/null
+++ b/graph/incidents_graphml/7/7a00e060-4ac3-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.228
+ 100.64.20.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693791392
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a00e060-4ac3-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/7/7a022570-106f-11ef-9de3-e13309ab258b.graphml b/graph/incidents_graphml/7/7a022570-106f-11ef-9de3-e13309ab258b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b61cf19a00e7f8502ce434a911593337795e13f
--- /dev/null
+++ b/graph/incidents_graphml/7/7a022570-106f-11ef-9de3-e13309ab258b.graphml
@@ -0,0 +1,805 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.210
+ 100.64.65.210
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.93.97
+ 100.64.93.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.98
+ 100.64.93.98
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.100
+ 100.64.17.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.185
+ USER-0015-2101.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.99
+ 100.64.93.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.156
+ 100.64.19.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.27
+ 100.64.56.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.93.100
+ 100.64.93.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.7
+ 100.64.52.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.101
+ USER-0015-2102.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.102
+ 100.64.93.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.51
+ 100.64.7.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.31.54
+ 100.64.31.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.103
+ 100.64.93.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.241
+ 100.64.5.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.253
+ 100.64.23.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.23
+ 100.64.2.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.104
+ 100.64.93.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+ INCIDENT_LINK
+ 1715525644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a022570-106f-11ef-9de3-e13309ab258b
+
+
+
diff --git a/graph/incidents_graphml/7/7a05e090-72c6-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/7/7a05e090-72c6-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88f13e9c3301f2b1e5deb3a0b18aa12e021afa09
--- /dev/null
+++ b/graph/incidents_graphml/7/7a05e090-72c6-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.79
+ 100.64.46.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1670043229
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a05e090-72c6-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/7/7a08cf30-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/7/7a08cf30-09ab-11ef-a326-59a1bcca7fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e8525c453fc5b48c921de48b7c3f3ad0fd6309c
--- /dev/null
+++ b/graph/incidents_graphml/7/7a08cf30-09ab-11ef-a326-59a1bcca7fdf.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.28
+ 100.64.49.28
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.29
+ 100.64.49.29
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.32
+ 100.64.22.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.30
+ 100.64.49.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.214
+ 100.64.8.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.31
+ 100.64.49.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.32
+ 100.64.49.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.33
+ 100.64.49.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a08cf30-09ab-11ef-a326-59a1bcca7fdf
+
+
+
diff --git a/graph/incidents_graphml/7/7a0b37c0-72c6-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/7/7a0b37c0-72c6-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff3f9246fde734757dcfd20c70b0c353f7cd3d55
--- /dev/null
+++ b/graph/incidents_graphml/7/7a0b37c0-72c6-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.46.79
+ 100.64.46.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1670043229
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a0b37c0-72c6-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/7/7a118eb0-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/7a118eb0-26d3-11ee-ac10-e7e87ad84b9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2fa498604c8306a8490bfe914a8d557965c74b81
--- /dev/null
+++ b/graph/incidents_graphml/7/7a118eb0-26d3-11ee-ac10-e7e87ad84b9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.178
+ 100.64.55.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689840022
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a118eb0-26d3-11ee-ac10-e7e87ad84b9c
+
+
+
diff --git a/graph/incidents_graphml/7/7a11f570-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/7/7a11f570-5b2c-11ee-a5b1-e563b721d2c6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a2b69e06cdad4cf485d906f7928475b864e010e
--- /dev/null
+++ b/graph/incidents_graphml/7/7a11f570-5b2c-11ee-a5b1-e563b721d2c6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.168
+ 100.64.68.168
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1695595707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a11f570-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a11f570-5b2c-11ee-a5b1-e563b721d2c6
+
+
+
diff --git a/graph/incidents_graphml/7/7a1360b0-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/7a1360b0-34fb-11ee-9ec4-97bf79cb287b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86eadd1420de36e8a1d8b64d6701568ef3cd52fa
--- /dev/null
+++ b/graph/incidents_graphml/7/7a1360b0-34fb-11ee-9ec4-97bf79cb287b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.186
+ 100.64.46.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691396518
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a1360b0-34fb-11ee-9ec4-97bf79cb287b
+
+
+
diff --git a/graph/incidents_graphml/7/7a214620-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/7a214620-26d3-11ee-ac10-e7e87ad84b9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..502f1647e2bd27fd9c22db1fe7786f9ed73f95cc
--- /dev/null
+++ b/graph/incidents_graphml/7/7a214620-26d3-11ee-ac10-e7e87ad84b9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.178
+ 100.64.55.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689840022
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a214620-26d3-11ee-ac10-e7e87ad84b9c
+
+
+
diff --git a/graph/incidents_graphml/7/7a233130-ea3f-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/7/7a233130-ea3f-11ee-b380-23a0be8babf0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..707645ab0885f433e3a213b8201d8c6878d084e3
--- /dev/null
+++ b/graph/incidents_graphml/7/7a233130-ea3f-11ee-b380-23a0be8babf0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.139
+ 100.64.16.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711326884
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a233130-ea3f-11ee-b380-23a0be8babf0
+
+
+
diff --git a/graph/incidents_graphml/7/7a26aca0-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7a26aca0-3fff-11ef-99da-f9fbcaa4b405.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b634fd68b75b42421ce5299444509ba6cc2edcf7
--- /dev/null
+++ b/graph/incidents_graphml/7/7a26aca0-3fff-11ef-99da-f9fbcaa4b405.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.30
+ 100.64.53.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720755197
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a26aca0-3fff-11ef-99da-f9fbcaa4b405
+
+
+
diff --git a/graph/incidents_graphml/7/7a280e90-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7a280e90-1dac-11ee-a6c7-eb84cfc6792e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c28596a3a191330dc95ca09061ad00f31d3f35d6
--- /dev/null
+++ b/graph/incidents_graphml/7/7a280e90-1dac-11ee-a6c7-eb84cfc6792e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.137
+ USER-0015-1359.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688833711
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a280e90-1dac-11ee-a6c7-eb84cfc6792e
+
+
+
diff --git a/graph/incidents_graphml/7/7a2bc6f0-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7a2bc6f0-23ca-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b22e2f5a21ac949555c103cfc210b6ac16a0230
--- /dev/null
+++ b/graph/incidents_graphml/7/7a2bc6f0-23ca-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.206
+ 100.64.66.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717653801
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a2bc6f0-23ca-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/7/7a2c9a50-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a2c9a50-8616-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ebaac114b182dfdc5d5130b7f4d3f850ae1f508
--- /dev/null
+++ b/graph/incidents_graphml/7/7a2c9a50-8616-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.151
+ 100.64.62.151
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700314159
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a2c9a50-8616-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/7/7a2d7860-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/7a2d7860-34fb-11ee-9ec4-97bf79cb287b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..534cb63c0e8a320c2a82b54f49fcecb7efe0b621
--- /dev/null
+++ b/graph/incidents_graphml/7/7a2d7860-34fb-11ee-9ec4-97bf79cb287b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.186
+ 100.64.46.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691396518
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a2d7860-34fb-11ee-9ec4-97bf79cb287b
+
+
+
diff --git a/graph/incidents_graphml/7/7a36cd80-928d-11ee-92fb-e74bdedb3c0b.graphml b/graph/incidents_graphml/7/7a36cd80-928d-11ee-92fb-e74bdedb3c0b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d0b2f003e559947a7ff4461ec80e8d55d47988b
--- /dev/null
+++ b/graph/incidents_graphml/7/7a36cd80-928d-11ee-92fb-e74bdedb3c0b.graphml
@@ -0,0 +1,249 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.117
+ 100.64.69.117
+ ["Exploiting Host"]
+ 0.6203125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.20
+ 100.64.68.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.118
+ 100.64.69.118
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.119
+ 100.64.69.119
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684683
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a36cd80-928d-11ee-92fb-e74bdedb3c0b
+
+
+
diff --git a/graph/incidents_graphml/7/7a3af230-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a3af230-8616-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b01c553dfb13537b63ba956963787d888023a36c
--- /dev/null
+++ b/graph/incidents_graphml/7/7a3af230-8616-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.211
+ 100.64.45.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700314159
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a3af230-8616-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/7/7a3b7930-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7a3b7930-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1752912c01cd49faaaf740a7dd832335b4be04a
--- /dev/null
+++ b/graph/incidents_graphml/7/7a3b7930-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.190
+ 100.64.95.190
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693770776
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a3b7930-4a93-11ee-8b5b-ed2e81dcf9e7
+
+
+ INCIDENT_LINK
+ 1693770776
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a3b7930-4a93-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/7/7a3b7e60-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7a3b7e60-23ca-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79ff35443182c29761de9d3da7d894435b7751f1
--- /dev/null
+++ b/graph/incidents_graphml/7/7a3b7e60-23ca-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.242
+ 100.64.22.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717653801
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a3b7e60-23ca-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/7/7a400100-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7a400100-3fff-11ef-99da-f9fbcaa4b405.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f15e9481429641e0fefec39e073422250badb6c
--- /dev/null
+++ b/graph/incidents_graphml/7/7a400100-3fff-11ef-99da-f9fbcaa4b405.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.30
+ 100.64.53.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720755197
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a400100-3fff-11ef-99da-f9fbcaa4b405
+
+
+
diff --git a/graph/incidents_graphml/7/7a44a150-263e-11ee-8f39-83af752ea491.graphml b/graph/incidents_graphml/7/7a44a150-263e-11ee-8f39-83af752ea491.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45d3c8a27774ee466464b4fb4373a88c8bdb7c3f
--- /dev/null
+++ b/graph/incidents_graphml/7/7a44a150-263e-11ee-8f39-83af752ea491.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.36
+ 100.64.64.36
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689776027
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a44a150-263e-11ee-8f39-83af752ea491
+
+
+
diff --git a/graph/incidents_graphml/7/7a4a5b80-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a4a5b80-8616-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27fc38017a6b55930f1cb1880d23f6dc1da2d798
--- /dev/null
+++ b/graph/incidents_graphml/7/7a4a5b80-8616-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.211
+ 100.64.45.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700314159
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a4a5b80-8616-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/7/7a4b0990-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7a4b0990-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9de9f056a1f01c70ddbc0cbe50843f743233d023
--- /dev/null
+++ b/graph/incidents_graphml/7/7a4b0990-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.190
+ 100.64.95.190
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693770776
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a4b0990-4a93-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/7/7a4bf920-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7a4bf920-23ca-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e35377409ec3e8fd7b35bc7f873809a924ff3dc4
--- /dev/null
+++ b/graph/incidents_graphml/7/7a4bf920-23ca-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.242
+ 100.64.22.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1717653801
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a4bf920-23ca-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/7/7a531e10-ff1f-11ed-8129-cd2d5cf37ca1.graphml b/graph/incidents_graphml/7/7a531e10-ff1f-11ed-8129-cd2d5cf37ca1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfaed6fbd51944f75009ae86f7b059886c82858f
--- /dev/null
+++ b/graph/incidents_graphml/7/7a531e10-ff1f-11ed-8129-cd2d5cf37ca1.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.8
+ 100.64.9.8
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.9
+ 100.64.9.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.10
+ 100.64.9.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.11
+ 100.64.9.11
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.12
+ 100.64.9.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.13
+ 100.64.9.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.14
+ 100.64.9.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.15
+ 100.64.9.15
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.16
+ 100.64.9.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.17
+ 100.64.9.17
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.18
+ 100.64.9.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.19
+ 100.64.9.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.20
+ 100.64.9.20
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.90
+ 100.64.4.90
+ ["Exploiting Target","Exploiting Host"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.21
+ 100.64.9.21
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.22
+ 100.64.9.22
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.23
+ 100.64.9.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+ INCIDENT_LINK
+ 1685474618
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+
diff --git a/graph/incidents_graphml/7/7a5698a0-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7a5698a0-1dac-11ee-a6c7-eb84cfc6792e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c783ccaf02760e09a72ef6e49a101cf6d5a67443
--- /dev/null
+++ b/graph/incidents_graphml/7/7a5698a0-1dac-11ee-a6c7-eb84cfc6792e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.45.137
+ USER-0015-1359.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688833712
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a5698a0-1dac-11ee-a6c7-eb84cfc6792e
+
+
+
diff --git a/graph/incidents_graphml/7/7a57f010-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a57f010-8616-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a10b10fd0414e280e4bb69e4201157d6d0ae6bc
--- /dev/null
+++ b/graph/incidents_graphml/7/7a57f010-8616-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.179
+ 100.64.12.179
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700314159
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a57f010-8616-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/7/7a580130-1114-11ee-9311-e18c92d5b3d3.graphml b/graph/incidents_graphml/7/7a580130-1114-11ee-9311-e18c92d5b3d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e14e77fa2f60aa7ea9d7453b431dcfc6244e174
--- /dev/null
+++ b/graph/incidents_graphml/7/7a580130-1114-11ee-9311-e18c92d5b3d3.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.104
+ 100.64.41.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.173
+ 100.64.72.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.59.158
+ 100.64.59.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687449014
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a580130-1114-11ee-9311-e18c92d5b3d3
+
+
+ INCIDENT_LINK
+ 1687449014
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a580130-1114-11ee-9311-e18c92d5b3d3
+
+
+ INCIDENT_LINK
+ 1687449014
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a580130-1114-11ee-9311-e18c92d5b3d3
+
+
+ INCIDENT_LINK
+ 1687449014
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a580130-1114-11ee-9311-e18c92d5b3d3
+
+
+
diff --git a/graph/incidents_graphml/7/7a5854f0-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/7/7a5854f0-23b7-11ed-a328-9fe2f28e2833.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce31819b80e9f1f66dd4f2558c0588519913f591
--- /dev/null
+++ b/graph/incidents_graphml/7/7a5854f0-23b7-11ed-a328-9fe2f28e2833.graphml
@@ -0,0 +1,775 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.183
+ 100.64.85.183
+ ["Exploiting Host"]
+ 0.930390625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.184
+ 100.64.85.184
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.22.152
+ 100.64.22.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.185
+ 100.64.85.185
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.39.217
+ 100.64.39.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.186
+ 100.64.85.186
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.187
+ 100.64.85.187
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.3.124
+ 100.64.3.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.188
+ 100.64.85.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.217
+ 100.64.14.217
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.189
+ 100.64.85.189
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.190
+ 100.64.85.190
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.143
+ 100.64.39.143
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.191
+ 100.64.85.191
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.192
+ 100.64.85.192
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.202
+ 100.64.6.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.983125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350645
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a5854f0-23b7-11ed-a328-9fe2f28e2833
+
+
+
diff --git a/graph/incidents_graphml/7/7a5882a0-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7a5882a0-592f-11ee-a8a5-b59feb9cfe2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65a7277dfaa9b1d02978180bb69dd01d9a8792d4
--- /dev/null
+++ b/graph/incidents_graphml/7/7a5882a0-592f-11ee-a8a5-b59feb9cfe2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.126
+ 100.64.64.126
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695377094
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7a5882a0-592f-11ee-a8a5-b59feb9cfe2c
+
+
+
diff --git a/graph/incidents_graphml/7/7a59f1a0-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7a59f1a0-3fff-11ef-99da-f9fbcaa4b405.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb1d3d36946462f1d0bc5cd487ad2aa69bb24ec9
--- /dev/null
+++ b/graph/incidents_graphml/7/7a59f1a0-3fff-11ef-99da-f9fbcaa4b405.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.30
+ 100.64.53.30
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720755197
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a59f1a0-3fff-11ef-99da-f9fbcaa4b405
+
+
+
diff --git a/graph/incidents_graphml/7/7a5bf980-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7a5bf980-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f89db0d20196c0dca4b164a9ac49e74330768d5
--- /dev/null
+++ b/graph/incidents_graphml/7/7a5bf980-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.192
+ USER-0015-2142.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693770776
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a5bf980-4a93-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/7/7a681cb0-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a681cb0-8616-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3417a9c00adf865de900dedc11705308011e29a8
--- /dev/null
+++ b/graph/incidents_graphml/7/7a681cb0-8616-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.179
+ 100.64.12.179
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700314159
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a681cb0-8616-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/7/7a7369b0-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7a7369b0-0c38-11ee-9256-6d0394834f57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb347879c6f7b405e8db5c44b8bf9afbf63bd9d2
--- /dev/null
+++ b/graph/incidents_graphml/7/7a7369b0-0c38-11ee-9256-6d0394834f57.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.70
+ 100.64.36.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.212
+ 100.64.3.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.71
+ 100.64.36.71
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.72
+ 100.64.36.72
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.73
+ 100.64.36.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.74
+ 100.64.36.74
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a7369b0-0c38-11ee-9256-6d0394834f57
+
+
+
diff --git a/graph/incidents_graphml/7/7a75ff60-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a75ff60-8616-11ee-aad5-255bef0b512c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c25cf8a6ed67fc59373f800d7ebc1de6ac2a76e
--- /dev/null
+++ b/graph/incidents_graphml/7/7a75ff60-8616-11ee-aad5-255bef0b512c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.201
+ 100.64.12.201
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700314159
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7a75ff60-8616-11ee-aad5-255bef0b512c
+
+
+
diff --git a/graph/incidents_graphml/7/7a782e80-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7a782e80-0870-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1debc4d7e8969ff014c949a154f244001160a4a3
--- /dev/null
+++ b/graph/incidents_graphml/7/7a782e80-0870-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.56
+ 100.64.21.56
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686498968
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a782e80-0870-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/7/7a7cc7f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7a7cc7f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea97e3bddcd82dbd6aa287a94c6fa2a0814a8439
--- /dev/null
+++ b/graph/incidents_graphml/7/7a7cc7f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.36.15
+ 100.64.36.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693770777
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a7cc7f0-4a93-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/7/7a9034a0-106f-11ef-9de3-e13309ab258b.graphml b/graph/incidents_graphml/7/7a9034a0-106f-11ef-9de3-e13309ab258b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13c5a32cadd452652e1347f378324f4ff7bd7d7e
--- /dev/null
+++ b/graph/incidents_graphml/7/7a9034a0-106f-11ef-9de3-e13309ab258b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.46.208
+ 172.16.46.208
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.235
+ 100.64.91.235
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1715525645
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a9034a0-106f-11ef-9de3-e13309ab258b
+
+
+
diff --git a/graph/incidents_graphml/7/7a917900-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7a917900-0c38-11ee-9256-6d0394834f57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe8ccf2d8460670811f4f53eae31b86647e7f6fa
--- /dev/null
+++ b/graph/incidents_graphml/7/7a917900-0c38-11ee-9256-6d0394834f57.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.80
+ 100.64.36.80
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.81
+ 100.64.36.81
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.82
+ 100.64.36.82
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.83
+ 100.64.36.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.84
+ 100.64.36.84
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.47
+ 100.64.11.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914721
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a917900-0c38-11ee-9256-6d0394834f57
+
+
+
diff --git a/graph/incidents_graphml/7/7a968bf0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7a968bf0-0870-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e658159ad525eff11190cf3a5bdf505a548cf671
--- /dev/null
+++ b/graph/incidents_graphml/7/7a968bf0-0870-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,135 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.119
+ 100.64.7.119
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.58
+ 100.64.21.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.105.23.131
+ 10.105.23.131
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686498968
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a968bf0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498968
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a968bf0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498968
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a968bf0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498968
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a968bf0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498968
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a968bf0-0870-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/7/7a976740-277e-11ef-8c37-3d33f474c8fc.graphml b/graph/incidents_graphml/7/7a976740-277e-11ef-8c37-3d33f474c8fc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a5a102e8338098ed962447a287c312fb1db167d
--- /dev/null
+++ b/graph/incidents_graphml/7/7a976740-277e-11ef-8c37-3d33f474c8fc.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.42.189
+ 172.31.42.189
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.87
+ 100.64.88.87
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.1.77
+ 100.64.1.77
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.4
+ 100.64.87.4
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1718060964
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a976740-277e-11ef-8c37-3d33f474c8fc
+
+
+ INCIDENT_LINK
+ 1718060964
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a976740-277e-11ef-8c37-3d33f474c8fc
+
+
+ INCIDENT_LINK
+ 1718060964
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a976740-277e-11ef-8c37-3d33f474c8fc
+
+
+ INCIDENT_LINK
+ 1718060964
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a976740-277e-11ef-8c37-3d33f474c8fc
+
+
+ INCIDENT_LINK
+ 1718060964
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a976740-277e-11ef-8c37-3d33f474c8fc
+
+
+ INCIDENT_LINK
+ 1718060964
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a976740-277e-11ef-8c37-3d33f474c8fc
+
+
+
diff --git a/graph/incidents_graphml/7/7a9d42b0-038e-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/7/7a9d42b0-038e-11ee-8785-53111c12ea35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23c396b829b71374e921d6af5d90ceefedaf052e
--- /dev/null
+++ b/graph/incidents_graphml/7/7a9d42b0-038e-11ee-8785-53111c12ea35.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.191
+ 100.64.77.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.76.37
+ 100.64.76.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685962097
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a9d42b0-038e-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685962097
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7a9d42b0-038e-11ee-8785-53111c12ea35
+
+
+
diff --git a/graph/incidents_graphml/7/7a9f9230-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7a9f9230-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdf8f596190baa629ac6ef68806311e6de55d224
--- /dev/null
+++ b/graph/incidents_graphml/7/7a9f9230-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.194
+ 100.64.95.194
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693770777
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7a9f9230-4a93-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/7/7aa00090-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/7aa00090-dd81-11ee-bdd6-3b03475da548.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abde2a63d1bd57ae5be848489b5f0dd8997a756a
--- /dev/null
+++ b/graph/incidents_graphml/7/7aa00090-dd81-11ee-bdd6-3b03475da548.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.23.66
+ 100.64.23.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709925867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7aa00090-dd81-11ee-bdd6-3b03475da548
+
+
+
diff --git a/graph/incidents_graphml/7/7aa4d300-6887-11ee-93c3-d1b25d4a11e4.graphml b/graph/incidents_graphml/7/7aa4d300-6887-11ee-93c3-d1b25d4a11e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b49ba7f465ec7321448a1e9c10ee405c41728fa
--- /dev/null
+++ b/graph/incidents_graphml/7/7aa4d300-6887-11ee-93c3-d1b25d4a11e4.graphml
@@ -0,0 +1,797 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.91
+ 100.64.40.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.134
+ 100.64.40.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.135
+ 100.64.40.135
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.136
+ 100.64.40.136
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.43
+ 100.64.35.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.111
+ 100.64.13.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.187
+ 100.64.33.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.89
+ 100.64.33.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.137
+ 100.64.40.137
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.138
+ 100.64.40.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.139
+ 100.64.40.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.140
+ 100.64.40.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.141
+ 100.64.40.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.142
+ 100.64.40.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.143
+ 100.64.40.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.53
+ 100.64.33.53
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.144
+ 100.64.40.144
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.145
+ 100.64.40.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.174
+ 100.64.13.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+ INCIDENT_LINK
+ 1697064158
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7aa4d300-6887-11ee-93c3-d1b25d4a11e4
+
+
+
diff --git a/graph/incidents_graphml/7/7aa838b0-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7aa838b0-3fff-11ef-99da-f9fbcaa4b405.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6009580049fee91a98eee5a6177927913e9ba01a
--- /dev/null
+++ b/graph/incidents_graphml/7/7aa838b0-3fff-11ef-99da-f9fbcaa4b405.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.30
+ 100.64.53.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720755198
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7aa838b0-3fff-11ef-99da-f9fbcaa4b405
+
+
+
diff --git a/graph/incidents_graphml/7/7aadf5c0-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/7/7aadf5c0-182d-11ee-88ad-19cfc5af29bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91344bfbf2159518ad6687e9046455c308a24c0f
--- /dev/null
+++ b/graph/incidents_graphml/7/7aadf5c0-182d-11ee-88ad-19cfc5af29bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.182
+ 100.64.77.182
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.77
+ 100.64.73.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688229410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7aadf5c0-182d-11ee-88ad-19cfc5af29bb
+
+
+
diff --git a/graph/incidents_graphml/7/7ab00d10-10e4-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/7/7ab00d10-10e4-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66b7fef40cae2e1215e47d39cedaffde87881d8e
--- /dev/null
+++ b/graph/incidents_graphml/7/7ab00d10-10e4-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.152
+ 100.64.7.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.37
+ 100.64.1.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687428399
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ab00d10-10e4-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687428399
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ab00d10-10e4-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/7/7ab08b10-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/7ab08b10-34fb-11ee-9ec4-97bf79cb287b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9213194448846e8410e33ca8f2bf771a0131991
--- /dev/null
+++ b/graph/incidents_graphml/7/7ab08b10-34fb-11ee-9ec4-97bf79cb287b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.188
+ 100.64.46.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691396519
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7ab08b10-34fb-11ee-9ec4-97bf79cb287b
+
+
+
diff --git a/graph/incidents_graphml/7/7ab0a260-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/7ab0a260-dd81-11ee-bdd6-3b03475da548.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5559b4c25844e718d986591824c2aa099b5af98e
--- /dev/null
+++ b/graph/incidents_graphml/7/7ab0a260-dd81-11ee-bdd6-3b03475da548.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.36.238
+ 100.64.36.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709925867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7ab0a260-dd81-11ee-bdd6-3b03475da548
+
+
+ INCIDENT_LINK
+ 1709925867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7ab0a260-dd81-11ee-bdd6-3b03475da548
+
+
+
diff --git a/graph/incidents_graphml/7/7ab25c10-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7ab25c10-23ca-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..479b2c8643068df217c827169f007fda1bdc0bf1
--- /dev/null
+++ b/graph/incidents_graphml/7/7ab25c10-23ca-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.28
+ 100.64.60.28
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717653802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ab25c10-23ca-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/7/7ab362c0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7ab362c0-0870-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be9ba7e052f82555bbeeeaa78d9027eed73b903d
--- /dev/null
+++ b/graph/incidents_graphml/7/7ab362c0-0870-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.119
+ 100.64.7.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686498968
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7ab362c0-0870-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/7/7ab38f60-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7ab38f60-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4db45c44fdc97371b42f0578a50e38d33329f94d
--- /dev/null
+++ b/graph/incidents_graphml/7/7ab38f60-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.224
+ 100.64.32.224
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693770777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ab38f60-4a93-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/7/7ab4f4a0-35bb-11ee-95a2-5f9786093780.graphml b/graph/incidents_graphml/7/7ab4f4a0-35bb-11ee-95a2-5f9786093780.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34131fe288cf6c9f9d857a1d9e862aba6b97090a
--- /dev/null
+++ b/graph/incidents_graphml/7/7ab4f4a0-35bb-11ee-95a2-5f9786093780.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.141
+ 100.64.80.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691478983
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ab4f4a0-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691478983
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ab4f4a0-35bb-11ee-95a2-5f9786093780
+
+
+
diff --git a/graph/incidents_graphml/7/7abac700-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/7/7abac700-182d-11ee-88ad-19cfc5af29bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e905dd77c9aed36526014e2f41442f23b4b8d14
--- /dev/null
+++ b/graph/incidents_graphml/7/7abac700-182d-11ee-88ad-19cfc5af29bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.77
+ 100.64.73.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.182
+ 100.64.77.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688229410
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7abac700-182d-11ee-88ad-19cfc5af29bb
+
+
+
diff --git a/graph/incidents_graphml/7/7ac3bc00-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7ac3bc00-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d77ad895ab6415b215d039bdb4110b8c2abddcbb
--- /dev/null
+++ b/graph/incidents_graphml/7/7ac3bc00-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.32.224
+ 100.64.32.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693770777
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ac3bc00-4a93-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/7/7ac4e870-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7ac4e870-3fff-11ef-99da-f9fbcaa4b405.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5150f495dbffc07d2050537b3e65385bd8defec1
--- /dev/null
+++ b/graph/incidents_graphml/7/7ac4e870-3fff-11ef-99da-f9fbcaa4b405.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.30
+ 100.64.53.30
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720755198
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ac4e870-3fff-11ef-99da-f9fbcaa4b405
+
+
+
diff --git a/graph/incidents_graphml/7/7acbd780-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7acbd780-23ca-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26139c5b8831080ad4184cc60c94d0ad1f67f45b
--- /dev/null
+++ b/graph/incidents_graphml/7/7acbd780-23ca-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.28
+ 100.64.60.28
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717653802
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acbd780-23ca-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/7/7acc7c90-8be4-11ee-9efd-252771b20c20.graphml b/graph/incidents_graphml/7/7acc7c90-8be4-11ee-9efd-252771b20c20.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4bb5b9ae1f6e53653863892b8d48118e7c4a3b61
--- /dev/null
+++ b/graph/incidents_graphml/7/7acc7c90-8be4-11ee-9efd-252771b20c20.graphml
@@ -0,0 +1,387 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.127
+ 100.64.17.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.241
+ 100.64.33.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.242
+ 100.64.33.242
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.243
+ 100.64.33.243
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.244
+ 100.64.33.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.245
+ 100.64.33.245
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.246
+ 100.64.33.246
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.247
+ 100.64.33.247
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.36
+ 100.64.14.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+ INCIDENT_LINK
+ 1700952392
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7acc7c90-8be4-11ee-9efd-252771b20c20
+
+
+
diff --git a/graph/incidents_graphml/7/7ad107e0-4ec4-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/7/7ad107e0-4ec4-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a30709f6c0f6eef7b263bd4dc505f9f4e1b412a
--- /dev/null
+++ b/graph/incidents_graphml/7/7ad107e0-4ec4-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.99
+ 100.64.11.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694231627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ad107e0-4ec4-11ee-81d4-670b4c6897d4
+
+
+ INCIDENT_LINK
+ 1694231627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ad107e0-4ec4-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/7/7ad5b7d0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7ad5b7d0-0870-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82fe71718846239dc8862ea07bcff0b44b617f33
--- /dev/null
+++ b/graph/incidents_graphml/7/7ad5b7d0-0870-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.60
+ 100.64.21.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686498968
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ad5b7d0-0870-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/7/7ae68640-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7ae68640-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b43850f383a99f80564cd1b500bb458640723d8
--- /dev/null
+++ b/graph/incidents_graphml/7/7ae68640-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.110
+ 100.64.26.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693770777
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ae68640-4a93-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/7/7ae71ab0-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7ae71ab0-3517-11ee-9c89-2d8bbcce3119.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aee6223f8fec243aa6428bf626f5df97fbea570c
--- /dev/null
+++ b/graph/incidents_graphml/7/7ae71ab0-3517-11ee-9c89-2d8bbcce3119.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.210
+ 100.64.38.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408545
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7ae71ab0-3517-11ee-9c89-2d8bbcce3119
+
+
+
diff --git a/graph/incidents_graphml/7/7afa08b0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7afa08b0-0870-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c47f22913287e83a0be0177e1d5225a5ca63c941
--- /dev/null
+++ b/graph/incidents_graphml/7/7afa08b0-0870-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.60
+ 100.64.21.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7afa08b0-0870-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/7/7afb9410-4ac3-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/7/7afb9410-4ac3-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45c366a2c894db87a700cb85732960d4eab44906
--- /dev/null
+++ b/graph/incidents_graphml/7/7afb9410-4ac3-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,475 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.230
+ 100.64.20.230
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.30
+ 100.64.14.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.208
+ 100.64.20.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.231
+ 100.64.20.231
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.232
+ 100.64.20.232
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.233
+ 100.64.20.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.234
+ 100.64.20.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.235
+ 100.64.20.235
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.236
+ 100.64.20.236
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791393
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7afb9410-4ac3-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/7/7b0091e0-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7b0091e0-3fff-11ef-99da-f9fbcaa4b405.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..354acb843a1de26328abe5bc2158d178f39b4a63
--- /dev/null
+++ b/graph/incidents_graphml/7/7b0091e0-3fff-11ef-99da-f9fbcaa4b405.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.136
+ 100.64.5.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720755198
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b0091e0-3fff-11ef-99da-f9fbcaa4b405
+
+
+
diff --git a/graph/incidents_graphml/7/7b035540-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7b035540-3517-11ee-9c89-2d8bbcce3119.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0e3898e83a16a9d5b4a0bc65585db65f577d5a3
--- /dev/null
+++ b/graph/incidents_graphml/7/7b035540-3517-11ee-9c89-2d8bbcce3119.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.212
+ 100.64.38.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408546
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b035540-3517-11ee-9c89-2d8bbcce3119
+
+
+
diff --git a/graph/incidents_graphml/7/7b0f6ff0-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/7/7b0f6ff0-23b7-11ed-a328-9fe2f28e2833.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d607a6dfd026c94a4e5519aa795fd1f3567d320
--- /dev/null
+++ b/graph/incidents_graphml/7/7b0f6ff0-23b7-11ed-a328-9fe2f28e2833.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.19.200.161
+ 172.19.200.161
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.212
+ 100.64.85.212
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661350646
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b0f6ff0-23b7-11ed-a328-9fe2f28e2833
+
+
+ INCIDENT_LINK
+ 1661350646
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b0f6ff0-23b7-11ed-a328-9fe2f28e2833
+
+
+
diff --git a/graph/incidents_graphml/7/7b0ff320-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/7b0ff320-125f-11ee-8a81-b1159645422c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e93a5f18d1e7c04545217f4a910fbf5233d758fb
--- /dev/null
+++ b/graph/incidents_graphml/7/7b0ff320-125f-11ee-8a81-b1159645422c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.190
+ 100.64.47.190
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687591179
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b0ff320-125f-11ee-8a81-b1159645422c
+
+
+
diff --git a/graph/incidents_graphml/7/7b1425f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7b1425f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95caa3d07b8fe13dac93eda76e55b90c799d7df8
--- /dev/null
+++ b/graph/incidents_graphml/7/7b1425f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.65.34
+ 100.64.65.34
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693770778
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b1425f0-4a93-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/7/7b15c9f0-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7b15c9f0-1dac-11ee-a6c7-eb84cfc6792e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f2ef880fe95b6137da4024405f35241a5f41754
--- /dev/null
+++ b/graph/incidents_graphml/7/7b15c9f0-1dac-11ee-a6c7-eb84cfc6792e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.149
+ 100.64.56.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688833713
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b15c9f0-1dac-11ee-a6c7-eb84cfc6792e
+
+
+
diff --git a/graph/incidents_graphml/7/7b18e010-4ac3-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/7/7b18e010-4ac3-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55ae711f1882c0bcd3f9d678bbc5a6d9daaef61a
--- /dev/null
+++ b/graph/incidents_graphml/7/7b18e010-4ac3-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.230
+ 100.64.20.230
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693791394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b18e010-4ac3-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693791394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b18e010-4ac3-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/7/7b1a0300-6887-11ee-93c3-d1b25d4a11e4.graphml b/graph/incidents_graphml/7/7b1a0300-6887-11ee-93c3-d1b25d4a11e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e51bd90c3675826e46af61cc9be987b3442a02dd
--- /dev/null
+++ b/graph/incidents_graphml/7/7b1a0300-6887-11ee-93c3-d1b25d4a11e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.158
+ 100.64.40.158
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697064159
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b1a0300-6887-11ee-93c3-d1b25d4a11e4
+
+
+
diff --git a/graph/incidents_graphml/7/7b231340-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/7b231340-dd81-11ee-bdd6-3b03475da548.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb1b8f9bcf30ae4237b61ec2e46b91e94e065b7a
--- /dev/null
+++ b/graph/incidents_graphml/7/7b231340-dd81-11ee-bdd6-3b03475da548.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.84
+ 100.64.16.84
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1709925868
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b231340-dd81-11ee-bdd6-3b03475da548
+
+
+
diff --git a/graph/incidents_graphml/7/7b260550-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7b260550-04e3-11ed-a6aa-45e3cee3f3d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c974b1feaba810c7e681ac629c2d5a00525f2f27
--- /dev/null
+++ b/graph/incidents_graphml/7/7b260550-04e3-11ed-a6aa-45e3cee3f3d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.30
+ USER-0015-1729.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657961058
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b260550-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+
diff --git a/graph/incidents_graphml/7/7b2ab5a0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7b2ab5a0-0870-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61672eb31b0abd19f818d5c0fc7dc3ab3cf17b2a
--- /dev/null
+++ b/graph/incidents_graphml/7/7b2ab5a0-0870-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,801 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.62
+ 100.64.21.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.241
+ 100.64.2.241
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.63
+ USER-0015-1227.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.64
+ 100.64.21.64
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.65
+ 100.64.21.65
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.66
+ 100.64.21.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.67
+ 100.64.21.67
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.68
+ 100.64.21.68
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.110
+ 100.64.8.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.69
+ 100.64.21.69
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.21
+ 100.64.8.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.179
+ USER-0015-1228.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.70
+ 100.64.21.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.71
+ USER-0015-1229.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.72
+ 100.64.21.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ HOST-2906
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b2ab5a0-0870-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/7/7b2bb640-6887-11ee-93c3-d1b25d4a11e4.graphml b/graph/incidents_graphml/7/7b2bb640-6887-11ee-93c3-d1b25d4a11e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17d6789fe8a26359759f0518838a9d3ab8c8e891
--- /dev/null
+++ b/graph/incidents_graphml/7/7b2bb640-6887-11ee-93c3-d1b25d4a11e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.158
+ 100.64.40.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697064159
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b2bb640-6887-11ee-93c3-d1b25d4a11e4
+
+
+
diff --git a/graph/incidents_graphml/7/7b2c59f0-eb96-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/7/7b2c59f0-eb96-11ee-8f3a-6b2412cfa52f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27252746e35311a0fe1a931c61a16881d3b76a70
--- /dev/null
+++ b/graph/incidents_graphml/7/7b2c59f0-eb96-11ee-8f3a-6b2412cfa52f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.23
+ 100.64.70.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Okta","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711474203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b2c59f0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b2c59f0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+
diff --git a/graph/incidents_graphml/7/7b317700-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7b317700-04e3-11ed-a6aa-45e3cee3f3d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..591393a4e46637c38a291ff204e8cae0094aa79c
--- /dev/null
+++ b/graph/incidents_graphml/7/7b317700-04e3-11ed-a6aa-45e3cee3f3d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.30
+ USER-0015-1729.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657961058
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b317700-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+
diff --git a/graph/incidents_graphml/7/7b319130-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7b319130-3517-11ee-9c89-2d8bbcce3119.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51a38eb68f52347b0f8647090efc929348b676b8
--- /dev/null
+++ b/graph/incidents_graphml/7/7b319130-3517-11ee-9c89-2d8bbcce3119.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.212
+ 100.64.38.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408546
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b319130-3517-11ee-9c89-2d8bbcce3119
+
+
+
diff --git a/graph/incidents_graphml/7/7b32d180-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7b32d180-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f823c27d8693c402b78f424f42fbd0ffe7b46ab
--- /dev/null
+++ b/graph/incidents_graphml/7/7b32d180-4a93-11ee-8b5b-ed2e81dcf9e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.196
+ 100.64.95.196
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1693770778
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b32d180-4a93-11ee-8b5b-ed2e81dcf9e7
+
+
+
diff --git a/graph/incidents_graphml/7/7b34af30-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/7b34af30-34fb-11ee-9ec4-97bf79cb287b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0bf23ecd2e56b560ee996d087d44f538183a9385
--- /dev/null
+++ b/graph/incidents_graphml/7/7b34af30-34fb-11ee-9ec4-97bf79cb287b.graphml
@@ -0,0 +1,301 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.21
+ 100.64.8.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.190
+ 100.64.46.190
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.87
+ 100.64.29.87
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.191
+ 100.64.46.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.114
+ USER-0015-1204.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.68
+ 100.64.25.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b34af30-34fb-11ee-9ec4-97bf79cb287b
+
+
+
diff --git a/graph/incidents_graphml/7/7b365d30-3662-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/7/7b365d30-3662-11ef-b33d-111abc4c57da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83350c1bb4c065746bf232457539c01121fa794d
--- /dev/null
+++ b/graph/incidents_graphml/7/7b365d30-3662-11ef-b33d-111abc4c57da.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.153
+ 100.64.44.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719698207
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b365d30-3662-11ef-b33d-111abc4c57da
+
+
+ INCIDENT_LINK
+ 1719698207
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b365d30-3662-11ef-b33d-111abc4c57da
+
+
+
diff --git a/graph/incidents_graphml/7/7b3eb190-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/7b3eb190-dd81-11ee-bdd6-3b03475da548.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67375ac6c8911ba0a68e4d65403150ed13cf0529
--- /dev/null
+++ b/graph/incidents_graphml/7/7b3eb190-dd81-11ee-bdd6-3b03475da548.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.16.84
+ 100.64.16.84
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1709925868
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b3eb190-dd81-11ee-bdd6-3b03475da548
+
+
+
diff --git a/graph/incidents_graphml/7/7b4c8a30-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b4c8a30-7a9a-11ee-bfc5-c9e889c56814.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1279e0d5c3d60430ba9df3071de4a79405d0dbe7
--- /dev/null
+++ b/graph/incidents_graphml/7/7b4c8a30-7a9a-11ee-bfc5-c9e889c56814.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.198
+ 100.64.47.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699051440
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b4c8a30-7a9a-11ee-bfc5-c9e889c56814
+
+
+ INCIDENT_LINK
+ 1699051440
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b4c8a30-7a9a-11ee-bfc5-c9e889c56814
+
+
+ INCIDENT_LINK
+ 1699051440
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b4c8a30-7a9a-11ee-bfc5-c9e889c56814
+
+
+
diff --git a/graph/incidents_graphml/7/7b4fe250-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/7b4fe250-125f-11ee-8a81-b1159645422c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3806719a9bcc277467437a0c90f2a2ee0e9630d
--- /dev/null
+++ b/graph/incidents_graphml/7/7b4fe250-125f-11ee-8a81-b1159645422c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.190
+ 100.64.47.190
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687591179
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b4fe250-125f-11ee-8a81-b1159645422c
+
+
+
diff --git a/graph/incidents_graphml/7/7b5061f0-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7b5061f0-1dac-11ee-a6c7-eb84cfc6792e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea855223b49fc1e7af22212785db81bb6a587852
--- /dev/null
+++ b/graph/incidents_graphml/7/7b5061f0-1dac-11ee-a6c7-eb84cfc6792e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.56.149
+ 100.64.56.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688833713
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b5061f0-1dac-11ee-a6c7-eb84cfc6792e
+
+
+
diff --git a/graph/incidents_graphml/7/7b50b4f0-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/7/7b50b4f0-216e-11ee-9e0b-8dcc0a578b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af2d28dede81cca4f861c7b1f3674dbff6e799fa
--- /dev/null
+++ b/graph/incidents_graphml/7/7b50b4f0-216e-11ee-9e0b-8dcc0a578b7b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.28
+ 100.64.82.28
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.254
+ 100.64.71.254
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689246889
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b50b4f0-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246889
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b50b4f0-216e-11ee-9e0b-8dcc0a578b7b
+
+
+
diff --git a/graph/incidents_graphml/7/7b51f750-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/7/7b51f750-81bf-11ee-967b-47c68907a0bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..374b9df61ee72978fa7d596ce3bf72a1696087f4
--- /dev/null
+++ b/graph/incidents_graphml/7/7b51f750-81bf-11ee-967b-47c68907a0bd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.146
+ 100.64.31.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1699836990
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b51f750-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836990
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b51f750-81bf-11ee-967b-47c68907a0bd
+
+
+
diff --git a/graph/incidents_graphml/7/7b56e790-12a9-11ee-abf2-25c0fa3f9e2a.graphml b/graph/incidents_graphml/7/7b56e790-12a9-11ee-abf2-25c0fa3f9e2a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4207cd3a8f2631885f738dcaf487a814d9fadfa9
--- /dev/null
+++ b/graph/incidents_graphml/7/7b56e790-12a9-11ee-abf2-25c0fa3f9e2a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.204
+ 100.64.41.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.38
+ 100.64.73.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.249
+ 100.64.81.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687622962
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b56e790-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+ INCIDENT_LINK
+ 1687622962
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b56e790-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+ INCIDENT_LINK
+ 1687622962
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b56e790-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+ INCIDENT_LINK
+ 1687622962
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b56e790-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+
diff --git a/graph/incidents_graphml/7/7b587110-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b587110-7a9a-11ee-bfc5-c9e889c56814.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..282ec532b2cbf94480e82fcee2fb6bd32c20cf4d
--- /dev/null
+++ b/graph/incidents_graphml/7/7b587110-7a9a-11ee-bfc5-c9e889c56814.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.177
+ 100.64.62.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699051440
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b587110-7a9a-11ee-bfc5-c9e889c56814
+
+
+
diff --git a/graph/incidents_graphml/7/7b5cc220-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7b5cc220-0870-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2d55c3a5633e7072479ca2a80a555860d53120e
--- /dev/null
+++ b/graph/incidents_graphml/7/7b5cc220-0870-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.62
+ 100.64.21.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686498969
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b5cc220-0870-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/7/7b5d9010-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7b5d9010-04e3-11ed-a6aa-45e3cee3f3d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e48cb04303ff537ac772ae450efa6eb4e208aa89
--- /dev/null
+++ b/graph/incidents_graphml/7/7b5d9010-04e3-11ed-a6aa-45e3cee3f3d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.31
+ 100.64.76.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657961059
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b5d9010-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+
diff --git a/graph/incidents_graphml/7/7b66b7d0-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7b66b7d0-04e3-11ed-a6aa-45e3cee3f3d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f3e6b1f138b0ff0eafd73046c33dfe097d10945
--- /dev/null
+++ b/graph/incidents_graphml/7/7b66b7d0-04e3-11ed-a6aa-45e3cee3f3d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.31
+ 100.64.76.31
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657961059
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b66b7d0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+
diff --git a/graph/incidents_graphml/7/7b67b350-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b67b350-7a9a-11ee-bfc5-c9e889c56814.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44ba04cc2d834c0aa19b9a92af1debecf6cef710
--- /dev/null
+++ b/graph/incidents_graphml/7/7b67b350-7a9a-11ee-bfc5-c9e889c56814.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.177
+ 100.64.62.177
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699051440
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b67b350-7a9a-11ee-bfc5-c9e889c56814
+
+
+
diff --git a/graph/incidents_graphml/7/7b6c0f20-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7b6c0f20-23ca-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57b816fe3094310fa189911c384f2e26804b59bf
--- /dev/null
+++ b/graph/incidents_graphml/7/7b6c0f20-23ca-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.42
+ 100.64.30.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717653803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b6c0f20-23ca-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/7/7b6d99e0-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7b6d99e0-32d4-11ee-b53b-dbf4412bf717.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a1037620a3347ccf795a2497dffeed6cb1f5e61
--- /dev/null
+++ b/graph/incidents_graphml/7/7b6d99e0-32d4-11ee-b53b-dbf4412bf717.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.230
+ 100.64.52.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691159868
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b6d99e0-32d4-11ee-b53b-dbf4412bf717
+
+
+
diff --git a/graph/incidents_graphml/7/7b725700-4dbe-11ee-b251-912537db6da9.graphml b/graph/incidents_graphml/7/7b725700-4dbe-11ee-b251-912537db6da9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6924edf305fd152b911e0c9e884de9076842424
--- /dev/null
+++ b/graph/incidents_graphml/7/7b725700-4dbe-11ee-b251-912537db6da9.graphml
@@ -0,0 +1,207 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.12.189
+ 100.64.12.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.254
+ 100.64.69.254
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.23.220
+ 100.64.23.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.255
+ 100.64.69.255
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1694119100
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b725700-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119100
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b725700-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119100
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b725700-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119100
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b725700-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119100
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b725700-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119100
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b725700-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119100
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b725700-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119100
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b725700-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119100
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b725700-4dbe-11ee-b251-912537db6da9
+
+
+
diff --git a/graph/incidents_graphml/7/7b76a770-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b76a770-7a9a-11ee-bfc5-c9e889c56814.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcbf748336b87b2d775cff40db40b24378919329
--- /dev/null
+++ b/graph/incidents_graphml/7/7b76a770-7a9a-11ee-bfc5-c9e889c56814.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.191
+ 100.64.53.191
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699051441
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b76a770-7a9a-11ee-bfc5-c9e889c56814
+
+
+
diff --git a/graph/incidents_graphml/7/7b7b2e10-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/7b7b2e10-34fb-11ee-9ec4-97bf79cb287b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cb35f71ce15f8efade2d4e169813216557e776a
--- /dev/null
+++ b/graph/incidents_graphml/7/7b7b2e10-34fb-11ee-9ec4-97bf79cb287b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.137
+ USER-0015-1359.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691396520
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b7b2e10-34fb-11ee-9ec4-97bf79cb287b
+
+
+
diff --git a/graph/incidents_graphml/7/7b80a890-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7b80a890-23ca-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9a2c4a5576d7bb0c1f53c5f66000292f3e237e3
--- /dev/null
+++ b/graph/incidents_graphml/7/7b80a890-23ca-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.42
+ 100.64.30.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717653803
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b80a890-23ca-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/7/7b820e80-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7b820e80-592f-11ee-a8a5-b59feb9cfe2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4c1ceb24fe7fbd75c79efbd222c6b089c34ae98
--- /dev/null
+++ b/graph/incidents_graphml/7/7b820e80-592f-11ee-a8a5-b59feb9cfe2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.128
+ 100.64.64.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695377096
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b820e80-592f-11ee-a8a5-b59feb9cfe2c
+
+
+
diff --git a/graph/incidents_graphml/7/7b826740-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b826740-7a9a-11ee-bfc5-c9e889c56814.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60c81208a271978d48120782496a34ef868f7328
--- /dev/null
+++ b/graph/incidents_graphml/7/7b826740-7a9a-11ee-bfc5-c9e889c56814.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.52
+ 100.64.16.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699051441
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b826740-7a9a-11ee-bfc5-c9e889c56814
+
+
+
diff --git a/graph/incidents_graphml/7/7b8381c0-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7b8381c0-3517-11ee-9c89-2d8bbcce3119.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5bc2c53cad1127f9d39aa14d26d5bc65beffc96
--- /dev/null
+++ b/graph/incidents_graphml/7/7b8381c0-3517-11ee-9c89-2d8bbcce3119.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.214
+ 100.64.38.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408546
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b8381c0-3517-11ee-9c89-2d8bbcce3119
+
+
+
diff --git a/graph/incidents_graphml/7/7b8b0cf0-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7b8b0cf0-32d4-11ee-b53b-dbf4412bf717.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9f0c96b21e83e1788a515d090935d7f082d2897
--- /dev/null
+++ b/graph/incidents_graphml/7/7b8b0cf0-32d4-11ee-b53b-dbf4412bf717.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.230
+ 100.64.52.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691159868
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b8b0cf0-32d4-11ee-b53b-dbf4412bf717
+
+
+
diff --git a/graph/incidents_graphml/7/7b8c3690-038e-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/7/7b8c3690-038e-11ee-8785-53111c12ea35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2fb1b8142fa39a6f2f6bed567f7f5fc753b2c61b
--- /dev/null
+++ b/graph/incidents_graphml/7/7b8c3690-038e-11ee-8785-53111c12ea35.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.221
+ 100.64.71.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.82.170
+ 100.64.82.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685962098
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b8c3690-038e-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685962098
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b8c3690-038e-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685962098
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b8c3690-038e-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685962098
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b8c3690-038e-11ee-8785-53111c12ea35
+
+
+
diff --git a/graph/incidents_graphml/7/7b8ec1c0-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7b8ec1c0-41b6-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5805e18a1b6e26c573aebea250629f438b3bc7a5
--- /dev/null
+++ b/graph/incidents_graphml/7/7b8ec1c0-41b6-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.5
+ 100.64.73.5
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664648753
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b8ec1c0-41b6-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/7/7b8ec8e0-f755-11ee-9330-cddc7b6e96b7.graphml b/graph/incidents_graphml/7/7b8ec8e0-f755-11ee-9330-cddc7b6e96b7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..934819ec6711bc6d79e839bd12c55744591de224
--- /dev/null
+++ b/graph/incidents_graphml/7/7b8ec8e0-f755-11ee-9330-cddc7b6e96b7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.160
+ 100.64.65.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712765701
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b8ec8e0-f755-11ee-9330-cddc7b6e96b7
+
+
+
diff --git a/graph/incidents_graphml/7/7b8f86a0-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b8f86a0-7a9a-11ee-bfc5-c9e889c56814.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c3a0d50fb08acfdd23b2956950690f5b90de9464
--- /dev/null
+++ b/graph/incidents_graphml/7/7b8f86a0-7a9a-11ee-bfc5-c9e889c56814.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.52
+ 100.64.16.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699051441
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b8f86a0-7a9a-11ee-bfc5-c9e889c56814
+
+
+
diff --git a/graph/incidents_graphml/7/7b926b40-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7b926b40-41b6-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1679bf3ee3aab240afdf017cbe6b7e699bbab57
--- /dev/null
+++ b/graph/incidents_graphml/7/7b926b40-41b6-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.6
+ 100.64.73.6
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1664648753
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b926b40-41b6-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/7/7b980780-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7b980780-592f-11ee-a8a5-b59feb9cfe2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..064320b16a50b4d47801e1beed95edc892bfdd2c
--- /dev/null
+++ b/graph/incidents_graphml/7/7b980780-592f-11ee-a8a5-b59feb9cfe2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.54
+ 100.64.39.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695377096
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7b980780-592f-11ee-a8a5-b59feb9cfe2c
+
+
+
diff --git a/graph/incidents_graphml/7/7b985eb0-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7b985eb0-41b6-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ceacb1976f72a96ccd819118395de1af107c370
--- /dev/null
+++ b/graph/incidents_graphml/7/7b985eb0-41b6-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.6
+ 100.64.73.6
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664648753
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7b985eb0-41b6-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/7/7b99cb20-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7b99cb20-0870-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5de5b641875e1479873164fc13d3ddbde3419c09
--- /dev/null
+++ b/graph/incidents_graphml/7/7b99cb20-0870-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686498970
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7b99cb20-0870-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/7/7b9db360-3c10-11ee-96ec-5323ee82cf36.graphml b/graph/incidents_graphml/7/7b9db360-3c10-11ee-96ec-5323ee82cf36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08d78b063d5cec4da7f1a3f2c54f611340e809a9
--- /dev/null
+++ b/graph/incidents_graphml/7/7b9db360-3c10-11ee-96ec-5323ee82cf36.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.202
+ 100.64.68.202
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.23.220
+ 100.64.23.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.20.30
+ 100.64.20.30
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692175198
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b9db360-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175198
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b9db360-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175198
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b9db360-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175198
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b9db360-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175198
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b9db360-3c10-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692175198
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7b9db360-3c10-11ee-96ec-5323ee82cf36
+
+
+
diff --git a/graph/incidents_graphml/7/7ba132f0-928d-11ee-92fb-e74bdedb3c0b.graphml b/graph/incidents_graphml/7/7ba132f0-928d-11ee-92fb-e74bdedb3c0b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18276869eb603bb19ee819306de2bdf7d8eb9dad
--- /dev/null
+++ b/graph/incidents_graphml/7/7ba132f0-928d-11ee-92fb-e74bdedb3c0b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.242
+ 100.64.12.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1701684685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ba132f0-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ba132f0-928d-11ee-92fb-e74bdedb3c0b
+
+
+
diff --git a/graph/incidents_graphml/7/7ba7e600-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7ba7e600-592f-11ee-a8a5-b59feb9cfe2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9649bca34991464ce54038a39ce5d4e32213908
--- /dev/null
+++ b/graph/incidents_graphml/7/7ba7e600-592f-11ee-a8a5-b59feb9cfe2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.54
+ 100.64.39.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695377096
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ba7e600-592f-11ee-a8a5-b59feb9cfe2c
+
+
+
diff --git a/graph/incidents_graphml/7/7bb5c410-043d-11ee-8693-9b63b760243c.graphml b/graph/incidents_graphml/7/7bb5c410-043d-11ee-8693-9b63b760243c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6814f762a83389fda89dece3ddfd258b7aa1906
--- /dev/null
+++ b/graph/incidents_graphml/7/7bb5c410-043d-11ee-8693-9b63b760243c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.90
+ 100.64.12.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.178
+ 100.64.72.178
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1686037261
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7bb5c410-043d-11ee-8693-9b63b760243c
+
+
+ INCIDENT_LINK
+ 1686037261
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7bb5c410-043d-11ee-8693-9b63b760243c
+
+
+
diff --git a/graph/incidents_graphml/7/7bc0b1d0-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7bc0b1d0-3517-11ee-9c89-2d8bbcce3119.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..47403bddbd9acef3edfedb0d1d98300d56c2befc
--- /dev/null
+++ b/graph/incidents_graphml/7/7bc0b1d0-3517-11ee-9c89-2d8bbcce3119.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.216
+ 100.64.38.216
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408547
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7bc0b1d0-3517-11ee-9c89-2d8bbcce3119
+
+
+
diff --git a/graph/incidents_graphml/7/7bceae60-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7bceae60-2e2e-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9c67571396da8ba074071ceda96ef064cf59d5b
--- /dev/null
+++ b/graph/incidents_graphml/7/7bceae60-2e2e-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.202
+ 100.64.14.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690648767
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7bceae60-2e2e-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/7/7bdeaea0-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/7/7bdeaea0-2122-11ee-9a61-05dd24aa353e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..31e4e41e195e4503701b0ddf1404bd6c3c4f8e39
--- /dev/null
+++ b/graph/incidents_graphml/7/7bdeaea0-2122-11ee-9a61-05dd24aa353e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.127
+ 100.64.69.127
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1689214248
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7bdeaea0-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214248
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7bdeaea0-2122-11ee-9a61-05dd24aa353e
+
+
+
diff --git a/graph/incidents_graphml/7/7be26ce0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7be26ce0-0870-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d65a2757a18a44b8be9289311e1e6e348ab6b8d3
--- /dev/null
+++ b/graph/incidents_graphml/7/7be26ce0-0870-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686498970
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7be26ce0-0870-11ee-93d6-d5b5411f7922
+
+
+ INCIDENT_LINK
+ 1686498970
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7be26ce0-0870-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/7/7be42550-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7be42550-23ca-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db10b72faaed0f60e124156386928b4af83ad446
--- /dev/null
+++ b/graph/incidents_graphml/7/7be42550-23ca-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.128
+ 100.64.26.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717653804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7be42550-23ca-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/7/7be61d10-9456-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/7/7be61d10-9456-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11009f9dd8acf9e92167aa5b509d9f992367c9e5
--- /dev/null
+++ b/graph/incidents_graphml/7/7be61d10-9456-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.65
+ 100.64.72.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1673733468
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7be61d10-9456-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/7/7be83700-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7be83700-3517-11ee-9c89-2d8bbcce3119.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1181849c863ab68e6696867eb334be3fe199c52
--- /dev/null
+++ b/graph/incidents_graphml/7/7be83700-3517-11ee-9c89-2d8bbcce3119.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.218
+ 100.64.38.218
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408547
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7be83700-3517-11ee-9c89-2d8bbcce3119
+
+
+
diff --git a/graph/incidents_graphml/7/7becfed0-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7becfed0-04e3-11ed-a6aa-45e3cee3f3d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f26150b3bb631014abdbd3de595c24c8b27f466
--- /dev/null
+++ b/graph/incidents_graphml/7/7becfed0-04e3-11ed-a6aa-45e3cee3f3d6.graphml
@@ -0,0 +1,803 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.33
+ 100.64.76.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.233
+ 100.64.73.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.34
+ 100.64.76.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.35
+ 100.64.76.35
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.51
+ 100.64.73.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.36
+ 100.64.76.36
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.37
+ 100.64.76.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.38
+ 100.64.76.38
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.39
+ 100.64.76.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.38.73
+ 100.64.38.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.40
+ 100.64.76.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.41
+ 100.64.76.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.59.60
+ 100.64.59.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.240
+ 100.64.71.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.42
+ 100.64.76.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.43
+ 100.64.76.43
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.44
+ 100.64.76.44
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.93
+ 100.64.74.93
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.58.251
+ 100.64.58.251
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.21
+ 100.64.73.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+ INCIDENT_LINK
+ 1657961060
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6
+
+
+
diff --git a/graph/incidents_graphml/7/7bee2460-e103-11ee-81a0-b5a2af2ec372.graphml b/graph/incidents_graphml/7/7bee2460-e103-11ee-81a0-b5a2af2ec372.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef1efb6ffd58690d413305c5ffca6b3269cad543
--- /dev/null
+++ b/graph/incidents_graphml/7/7bee2460-e103-11ee-81a0-b5a2af2ec372.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.160
+ 100.64.42.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710311557
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7bee2460-e103-11ee-81a0-b5a2af2ec372
+
+
+
diff --git a/graph/incidents_graphml/7/7bf02460-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7bf02460-1dac-11ee-a6c7-eb84cfc6792e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a1b7e57555232b69b17f3a31ca3a42860dd6172
--- /dev/null
+++ b/graph/incidents_graphml/7/7bf02460-1dac-11ee-a6c7-eb84cfc6792e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.44.254
+ USER-0015-2099.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688833714
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7bf02460-1dac-11ee-a6c7-eb84cfc6792e
+
+
+
diff --git a/graph/incidents_graphml/7/7bf039c0-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/7bf039c0-26d3-11ee-ac10-e7e87ad84b9c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..909c22d179907b59f531614f31ac7c0768897516
--- /dev/null
+++ b/graph/incidents_graphml/7/7bf039c0-26d3-11ee-ac10-e7e87ad84b9c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.180
+ 100.64.55.180
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689840025
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7bf039c0-26d3-11ee-ac10-e7e87ad84b9c
+
+
+
diff --git a/graph/incidents_graphml/7/7bf2cf70-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7bf2cf70-32d4-11ee-b53b-dbf4412bf717.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2848f1339ac74fb49b1b9ce9251f0400a54ccdb2
--- /dev/null
+++ b/graph/incidents_graphml/7/7bf2cf70-32d4-11ee-b53b-dbf4412bf717.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.232
+ 100.64.52.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691159869
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7bf2cf70-32d4-11ee-b53b-dbf4412bf717
+
+
+
diff --git a/graph/incidents_graphml/7/7bf65d30-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7bf65d30-41b6-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32f0ef4e4f4f742bf2be8b465320df337a3fd619
--- /dev/null
+++ b/graph/incidents_graphml/7/7bf65d30-41b6-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.8
+ 100.64.73.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1664648753
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7bf65d30-41b6-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/7/7bf90ce0-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7bf90ce0-23ca-11ef-97fe-b186522e90f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1736e672cae98553592ac3bb8686741afad0bb28
--- /dev/null
+++ b/graph/incidents_graphml/7/7bf90ce0-23ca-11ef-97fe-b186522e90f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.128
+ 100.64.26.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717653804
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7bf90ce0-23ca-11ef-97fe-b186522e90f1
+
+
+
diff --git a/graph/incidents_graphml/7/7bf98d20-0c3b-11ee-954b-d57838b91a61.graphml b/graph/incidents_graphml/7/7bf98d20-0c3b-11ee-954b-d57838b91a61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bec69141358b6d0aa491c205dda62076b69f6334
--- /dev/null
+++ b/graph/incidents_graphml/7/7bf98d20-0c3b-11ee-954b-d57838b91a61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.1
+ USER-0015-1253.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686916011
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7bf98d20-0c3b-11ee-954b-d57838b91a61
+
+
+
diff --git a/graph/incidents_graphml/7/7bfb1590-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7bfb1590-2e2e-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..815a94bfdeda96e0e0fe141a5d25818473cff0ed
--- /dev/null
+++ b/graph/incidents_graphml/7/7bfb1590-2e2e-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.202
+ 100.64.14.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690648768
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7bfb1590-2e2e-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/7/7bfdb030-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7bfdb030-41b6-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..740affbd0889b87cee983bf68a2974856fd7172c
--- /dev/null
+++ b/graph/incidents_graphml/7/7bfdb030-41b6-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.8
+ 100.64.73.8
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664648753
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7bfdb030-41b6-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/7/7c051010-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7c051010-0870-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ac48afdc28b97174bf78f53911f283fe1939bb6
--- /dev/null
+++ b/graph/incidents_graphml/7/7c051010-0870-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686498970
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c051010-0870-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/7/7c0a9d30-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7c0a9d30-32d4-11ee-b53b-dbf4412bf717.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a15c74625e7411df502366e8a34114772a74cba0
--- /dev/null
+++ b/graph/incidents_graphml/7/7c0a9d30-32d4-11ee-b53b-dbf4412bf717.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.232
+ 100.64.52.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691159869
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c0a9d30-32d4-11ee-b53b-dbf4412bf717
+
+
+
diff --git a/graph/incidents_graphml/7/7c0c3d60-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/7/7c0c3d60-73c2-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c9e25c68048f5a9c939ec672c28f0aa75a9d5d7
--- /dev/null
+++ b/graph/incidents_graphml/7/7c0c3d60-73c2-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.137
+ 100.64.82.137
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.133
+ 100.64.72.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1670151466
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c0c3d60-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151466
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c0c3d60-73c2-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/7/7c0edff0-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c0edff0-52b2-11ee-9013-5fc05fa37c8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..691f9ae653555788c9198d9ef8ccba552d036259
--- /dev/null
+++ b/graph/incidents_graphml/7/7c0edff0-52b2-11ee-9013-5fc05fa37c8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.106
+ 100.64.19.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694663703
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c0edff0-52b2-11ee-9013-5fc05fa37c8b
+
+
+
diff --git a/graph/incidents_graphml/7/7c16bb30-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7c16bb30-8462-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..640841c007d3772dbdb10584c121b63c5c39c942
--- /dev/null
+++ b/graph/incidents_graphml/7/7c16bb30-8462-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.94
+ 100.64.25.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700126901
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c16bb30-8462-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/7/7c1c2660-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c1c2660-52b2-11ee-9013-5fc05fa37c8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8784ecf77395441aec0b22ee48dc22faa7b232c8
--- /dev/null
+++ b/graph/incidents_graphml/7/7c1c2660-52b2-11ee-9013-5fc05fa37c8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.1
+ 100.64.18.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694663703
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c1c2660-52b2-11ee-9013-5fc05fa37c8b
+
+
+
diff --git a/graph/incidents_graphml/7/7c1d1c80-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7c1d1c80-2e2e-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e695afd756903ef363c2cee3ee8d69e993e1605
--- /dev/null
+++ b/graph/incidents_graphml/7/7c1d1c80-2e2e-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.112
+ 100.64.33.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690648768
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7c1d1c80-2e2e-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/7/7c2993e0-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c2993e0-52b2-11ee-9013-5fc05fa37c8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1754599137b466b66d4e887c3181b03d2d775fe5
--- /dev/null
+++ b/graph/incidents_graphml/7/7c2993e0-52b2-11ee-9013-5fc05fa37c8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.1
+ 100.64.18.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694663703
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c2993e0-52b2-11ee-9013-5fc05fa37c8b
+
+
+
diff --git a/graph/incidents_graphml/7/7c365120-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7c365120-8462-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89aa7a50d0b4b0a5632c272c8da5f492e67727d7
--- /dev/null
+++ b/graph/incidents_graphml/7/7c365120-8462-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.174
+ 100.64.51.174
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700126902
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c365120-8462-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/7/7c372870-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c372870-52b2-11ee-9013-5fc05fa37c8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d74ba72085e0a7b9fa19b068aefc0d0ec9133150
--- /dev/null
+++ b/graph/incidents_graphml/7/7c372870-52b2-11ee-9013-5fc05fa37c8b.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.245
+ 100.64.13.245
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694663703
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c372870-52b2-11ee-9013-5fc05fa37c8b
+
+
+ INCIDENT_LINK
+ 1694663703
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c372870-52b2-11ee-9013-5fc05fa37c8b
+
+
+
diff --git a/graph/incidents_graphml/7/7c3c7180-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7c3c7180-3517-11ee-9c89-2d8bbcce3119.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86251ceaa1be6d1866a9599b03d49d940426eecf
--- /dev/null
+++ b/graph/incidents_graphml/7/7c3c7180-3517-11ee-9c89-2d8bbcce3119.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.140
+ 100.64.23.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c3c7180-3517-11ee-9c89-2d8bbcce3119
+
+
+
diff --git a/graph/incidents_graphml/7/7c3e85f0-c84e-11ed-9476-bf08a649e623.graphml b/graph/incidents_graphml/7/7c3e85f0-c84e-11ed-9476-bf08a649e623.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c277c4d0457b0aa53aa7bbf087c1fc1db4c9b95
--- /dev/null
+++ b/graph/incidents_graphml/7/7c3e85f0-c84e-11ed-9476-bf08a649e623.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.230.47
+ 172.27.230.47
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.106
+ 100.64.90.106
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1679447493
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7c3e85f0-c84e-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447493
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7c3e85f0-c84e-11ed-9476-bf08a649e623
+
+
+
diff --git a/graph/incidents_graphml/7/7c45a760-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c45a760-52b2-11ee-9013-5fc05fa37c8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16a442b3fc1373af1766f713b3e9a104b731039b
--- /dev/null
+++ b/graph/incidents_graphml/7/7c45a760-52b2-11ee-9013-5fc05fa37c8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.245
+ 100.64.13.245
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694663703
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c45a760-52b2-11ee-9013-5fc05fa37c8b
+
+
+
diff --git a/graph/incidents_graphml/7/7c4b0920-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7c4b0920-26c1-11ee-87ad-dd3f4232b94e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4179de08dffd4979a98ec460f48e44b2fe711a8
--- /dev/null
+++ b/graph/incidents_graphml/7/7c4b0920-26c1-11ee-87ad-dd3f4232b94e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.252
+ 100.64.9.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689832295
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7c4b0920-26c1-11ee-87ad-dd3f4232b94e
+
+
+
diff --git a/graph/incidents_graphml/7/7c4b86d0-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7c4b86d0-8462-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8d334d84f3065d1f99facc8e72a63f2baa6eed0
--- /dev/null
+++ b/graph/incidents_graphml/7/7c4b86d0-8462-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.174
+ 100.64.51.174
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700126902
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c4b86d0-8462-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/7/7c4f29e0-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/7c4f29e0-125f-11ee-8a81-b1159645422c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..482dc09af45cb80fcff8ae9699baeb34cde70d71
--- /dev/null
+++ b/graph/incidents_graphml/7/7c4f29e0-125f-11ee-8a81-b1159645422c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.192
+ 100.64.47.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687591181
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c4f29e0-125f-11ee-8a81-b1159645422c
+
+
+
diff --git a/graph/incidents_graphml/7/7c5766c0-277e-11ef-8c37-3d33f474c8fc.graphml b/graph/incidents_graphml/7/7c5766c0-277e-11ef-8c37-3d33f474c8fc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c15844bc4f609e0b935d32de9f5d20614b9a24a5
--- /dev/null
+++ b/graph/incidents_graphml/7/7c5766c0-277e-11ef-8c37-3d33f474c8fc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.226
+ 100.64.38.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1718060967
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c5766c0-277e-11ef-8c37-3d33f474c8fc
+
+
+
diff --git a/graph/incidents_graphml/7/7c5c8b50-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7c5c8b50-1889-11ee-a72c-7b8cdfc9cafd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42206230e8f243d0ed9ebbacd44be2ea8d38bb58
--- /dev/null
+++ b/graph/incidents_graphml/7/7c5c8b50-1889-11ee-a72c-7b8cdfc9cafd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.5
+ 100.64.91.5
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688268927
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c5c8b50-1889-11ee-a72c-7b8cdfc9cafd
+
+
+
diff --git a/graph/incidents_graphml/7/7c5fff10-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7c5fff10-3517-11ee-9c89-2d8bbcce3119.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85ac0eb8feb8a53dc70447aa30d7ef3b8798ce99
--- /dev/null
+++ b/graph/incidents_graphml/7/7c5fff10-3517-11ee-9c89-2d8bbcce3119.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.140
+ 100.64.23.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7c5fff10-3517-11ee-9c89-2d8bbcce3119
+
+
+
diff --git a/graph/incidents_graphml/7/7c727070-1f30-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/7/7c727070-1f30-11ee-9e2e-57c890ee02a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6fe3bb35ef1b1114c6c6a73b79275bbbb4a21d4e
--- /dev/null
+++ b/graph/incidents_graphml/7/7c727070-1f30-11ee-9e2e-57c890ee02a2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.107
+ 100.64.13.107
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689000360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c727070-1f30-11ee-9e2e-57c890ee02a2
+
+
+
diff --git a/graph/incidents_graphml/7/7c75eb40-277e-11ef-8c37-3d33f474c8fc.graphml b/graph/incidents_graphml/7/7c75eb40-277e-11ef-8c37-3d33f474c8fc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ae87752e27378000e6c19aa1502a2e87272e112
--- /dev/null
+++ b/graph/incidents_graphml/7/7c75eb40-277e-11ef-8c37-3d33f474c8fc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.38.226
+ 100.64.38.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718060968
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c75eb40-277e-11ef-8c37-3d33f474c8fc
+
+
+
diff --git a/graph/incidents_graphml/7/7c7775e0-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7c7775e0-5f20-11ee-9598-b95b2a00646d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a573ce8a30d97e9a3be3b13beed4ba3bebb7ccd7
--- /dev/null
+++ b/graph/incidents_graphml/7/7c7775e0-5f20-11ee-9598-b95b2a00646d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696030362
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c7775e0-5f20-11ee-9598-b95b2a00646d
+
+
+
diff --git a/graph/incidents_graphml/7/7c7f1fd0-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7c7f1fd0-3517-11ee-9c89-2d8bbcce3119.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f94ba68a2d59cd0366b52e312a129c7f90a0ac3
--- /dev/null
+++ b/graph/incidents_graphml/7/7c7f1fd0-3517-11ee-9c89-2d8bbcce3119.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.220
+ 100.64.38.220
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691408548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c7f1fd0-3517-11ee-9c89-2d8bbcce3119
+
+
+
diff --git a/graph/incidents_graphml/7/7c892750-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7c892750-41b6-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3223474488f835a272af1cd95cd36e4510fc216
--- /dev/null
+++ b/graph/incidents_graphml/7/7c892750-41b6-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.12
+ 100.64.73.12
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1664648754
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c892750-41b6-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/7/7c8a2a70-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c8a2a70-52b2-11ee-9013-5fc05fa37c8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e276d84408cb27830328d08de81d6541405ce61
--- /dev/null
+++ b/graph/incidents_graphml/7/7c8a2a70-52b2-11ee-9013-5fc05fa37c8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.128
+ 100.64.30.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694663704
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c8a2a70-52b2-11ee-9013-5fc05fa37c8b
+
+
+
diff --git a/graph/incidents_graphml/7/7c8e83f0-1f30-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/7/7c8e83f0-1f30-11ee-9e2e-57c890ee02a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..378e667c96849f64a154492b87c67ed7d0933d71
--- /dev/null
+++ b/graph/incidents_graphml/7/7c8e83f0-1f30-11ee-9e2e-57c890ee02a2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.107
+ 100.64.13.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689000360
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c8e83f0-1f30-11ee-9e2e-57c890ee02a2
+
+
+
diff --git a/graph/incidents_graphml/7/7c8fde10-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7c8fde10-41b6-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e062c01eaeb4236edfd8ee79f8fd7ac37ea93d72
--- /dev/null
+++ b/graph/incidents_graphml/7/7c8fde10-41b6-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.12
+ 100.64.73.12
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664648754
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c8fde10-41b6-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/7/7c96a570-ff1f-11ed-8129-cd2d5cf37ca1.graphml b/graph/incidents_graphml/7/7c96a570-ff1f-11ed-8129-cd2d5cf37ca1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62d3de22e0f079a263bdedf78b323e96b8a5788d
--- /dev/null
+++ b/graph/incidents_graphml/7/7c96a570-ff1f-11ed-8129-cd2d5cf37ca1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.40
+ 100.64.9.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685474621
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7c96a570-ff1f-11ed-8129-cd2d5cf37ca1
+
+
+
diff --git a/graph/incidents_graphml/7/7c9b1a60-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c9b1a60-52b2-11ee-9013-5fc05fa37c8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8cede8f6572aa0b26bf6f7ec7a08415c820ebda
--- /dev/null
+++ b/graph/incidents_graphml/7/7c9b1a60-52b2-11ee-9013-5fc05fa37c8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.128
+ 100.64.30.128
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694663704
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c9b1a60-52b2-11ee-9013-5fc05fa37c8b
+
+
+
diff --git a/graph/incidents_graphml/7/7c9b2790-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7c9b2790-4131-11ee-8e35-ab7460ef679b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53e1b2f85149a6024640e4a46d93963da98614db
--- /dev/null
+++ b/graph/incidents_graphml/7/7c9b2790-4131-11ee-8e35-ab7460ef679b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.237
+ 100.64.55.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692739129
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7c9b2790-4131-11ee-8e35-ab7460ef679b
+
+
+
diff --git a/graph/incidents_graphml/7/7c9f2910-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7c9f2910-1dac-11ee-a6c7-eb84cfc6792e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ec34a9c403899ed30855048b744ebdcb32dd2e1
--- /dev/null
+++ b/graph/incidents_graphml/7/7c9f2910-1dac-11ee-a6c7-eb84cfc6792e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.17.122
+ USER-0015-1214.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688833715
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7c9f2910-1dac-11ee-a6c7-eb84cfc6792e
+
+
+
diff --git a/graph/incidents_graphml/7/7ca6e420-4462-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/7/7ca6e420-4462-11ee-853f-87a1872d184b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66c3387afe6c6bbc8c07252cee6fb317d5c54280
--- /dev/null
+++ b/graph/incidents_graphml/7/7ca6e420-4462-11ee-853f-87a1872d184b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.221
+ 100.64.24.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693090028
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ca6e420-4462-11ee-853f-87a1872d184b
+
+
+
diff --git a/graph/incidents_graphml/7/7ca8e9c0-1f30-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/7/7ca8e9c0-1f30-11ee-9e2e-57c890ee02a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b760d3b281071199b61650c2b57a3783d19d04a
--- /dev/null
+++ b/graph/incidents_graphml/7/7ca8e9c0-1f30-11ee-9e2e-57c890ee02a2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.109
+ 100.64.13.109
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689000360
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ca8e9c0-1f30-11ee-9e2e-57c890ee02a2
+
+
+
diff --git a/graph/incidents_graphml/7/7ca9e770-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7ca9e770-52b2-11ee-9013-5fc05fa37c8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0e7f6d782a7c51c8d6f4cfab93327f205f6c04b
--- /dev/null
+++ b/graph/incidents_graphml/7/7ca9e770-52b2-11ee-9013-5fc05fa37c8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.202
+ 100.64.6.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.983125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694663704
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ca9e770-52b2-11ee-9013-5fc05fa37c8b
+
+
+
diff --git a/graph/incidents_graphml/7/7caa1180-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7caa1180-32d4-11ee-b53b-dbf4412bf717.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b307aaf93a85276ba5fea7af6911f4e81136292c
--- /dev/null
+++ b/graph/incidents_graphml/7/7caa1180-32d4-11ee-b53b-dbf4412bf717.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.239
+ 100.64.31.239
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691159870
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7caa1180-32d4-11ee-b53b-dbf4412bf717
+
+
+
diff --git a/graph/incidents_graphml/7/7caab7f0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7caab7f0-4131-11ee-8e35-ab7460ef679b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..73a9135c07586e9a5a8cde3b9f6f1b0e5a3920fc
--- /dev/null
+++ b/graph/incidents_graphml/7/7caab7f0-4131-11ee-8e35-ab7460ef679b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.237
+ 100.64.55.237
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692739129
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7caab7f0-4131-11ee-8e35-ab7460ef679b
+
+
+
diff --git a/graph/incidents_graphml/7/7cac36a0-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7cac36a0-592f-11ee-a8a5-b59feb9cfe2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e82adf7fcf0e00cb79a6a96edc10a7b1cca8852
--- /dev/null
+++ b/graph/incidents_graphml/7/7cac36a0-592f-11ee-a8a5-b59feb9cfe2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.96
+ 100.64.64.96
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695377098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7cac36a0-592f-11ee-a8a5-b59feb9cfe2c
+
+
+
diff --git a/graph/incidents_graphml/7/7cb737d0-4462-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/7/7cb737d0-4462-11ee-853f-87a1872d184b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32086f43aac179cb57f54ca8406df634056eb952
--- /dev/null
+++ b/graph/incidents_graphml/7/7cb737d0-4462-11ee-853f-87a1872d184b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.221
+ 100.64.24.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693090028
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7cb737d0-4462-11ee-853f-87a1872d184b
+
+
+
diff --git a/graph/incidents_graphml/7/7cb936e0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7cb936e0-4131-11ee-8e35-ab7460ef679b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abbacaff28c6621db9f5da168ce5887d30540dd3
--- /dev/null
+++ b/graph/incidents_graphml/7/7cb936e0-4131-11ee-8e35-ab7460ef679b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.239
+ 100.64.55.239
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692739129
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7cb936e0-4131-11ee-8e35-ab7460ef679b
+
+
+
diff --git a/graph/incidents_graphml/7/7cbcb160-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7cbcb160-592f-11ee-a8a5-b59feb9cfe2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d70295b232e91bee86e5c25adbe9c5501bf04471
--- /dev/null
+++ b/graph/incidents_graphml/7/7cbcb160-592f-11ee-a8a5-b59feb9cfe2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.96
+ 100.64.64.96
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695377098
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7cbcb160-592f-11ee-a8a5-b59feb9cfe2c
+
+
+
diff --git a/graph/incidents_graphml/7/7cc498f0-29c1-11ee-92d3-75b14f8be714.graphml b/graph/incidents_graphml/7/7cc498f0-29c1-11ee-92d3-75b14f8be714.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d2513ffda35974918b0df27d2915d7d710b5e91e
--- /dev/null
+++ b/graph/incidents_graphml/7/7cc498f0-29c1-11ee-92d3-75b14f8be714.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.83
+ 100.64.7.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690162149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7cc498f0-29c1-11ee-92d3-75b14f8be714
+
+
+
diff --git a/graph/incidents_graphml/7/7cc53aa0-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7cc53aa0-32d4-11ee-b53b-dbf4412bf717.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d410386372e68dd153b62816db51d0f1166de82
--- /dev/null
+++ b/graph/incidents_graphml/7/7cc53aa0-32d4-11ee-b53b-dbf4412bf717.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.239
+ 100.64.31.239
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691159870
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7cc53aa0-32d4-11ee-b53b-dbf4412bf717
+
+
+
diff --git a/graph/incidents_graphml/7/7cc9a500-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7cc9a500-1889-11ee-a72c-7b8cdfc9cafd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..690a3ecb395711b10cb3781cf8fe9a4edd6da120
--- /dev/null
+++ b/graph/incidents_graphml/7/7cc9a500-1889-11ee-a72c-7b8cdfc9cafd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.199
+ USER-0015-2054.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688268927
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cc9a500-1889-11ee-a72c-7b8cdfc9cafd
+
+
+
diff --git a/graph/incidents_graphml/7/7ccc70c0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7ccc70c0-4131-11ee-8e35-ab7460ef679b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee7a91f1ee8870a5f22cfb485a4ea390fb81581c
--- /dev/null
+++ b/graph/incidents_graphml/7/7ccc70c0-4131-11ee-8e35-ab7460ef679b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.239
+ 100.64.55.239
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692739129
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ccc70c0-4131-11ee-8e35-ab7460ef679b
+
+
+
diff --git a/graph/incidents_graphml/7/7cd59b70-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7cd59b70-5f20-11ee-9598-b95b2a00646d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a3ddad216e8c733fae8eea9c8997f6de978f395
--- /dev/null
+++ b/graph/incidents_graphml/7/7cd59b70-5f20-11ee-9598-b95b2a00646d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.70
+ 100.64.86.70
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696030363
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7cd59b70-5f20-11ee-9598-b95b2a00646d
+
+
+
diff --git a/graph/incidents_graphml/7/7cd653d0-4dbe-11ee-b251-912537db6da9.graphml b/graph/incidents_graphml/7/7cd653d0-4dbe-11ee-b251-912537db6da9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..372d40471ae9701013b228a916cc341ab3f895c2
--- /dev/null
+++ b/graph/incidents_graphml/7/7cd653d0-4dbe-11ee-b251-912537db6da9.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1694119102
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cd653d0-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119102
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cd653d0-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119102
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cd653d0-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119102
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cd653d0-4dbe-11ee-b251-912537db6da9
+
+
+
diff --git a/graph/incidents_graphml/7/7cdd13b0-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7cdd13b0-41b6-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..edcb16cf5c1f145bbb2782bed0e406b98d35111f
--- /dev/null
+++ b/graph/incidents_graphml/7/7cdd13b0-41b6-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.15
+ 100.64.73.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.80
+ 100.64.71.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7cdd13b0-41b6-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/7/7cde22f0-277e-11ef-8c37-3d33f474c8fc.graphml b/graph/incidents_graphml/7/7cde22f0-277e-11ef-8c37-3d33f474c8fc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82856a5d2c9046f2bafe628f2d518c51ba5257a3
--- /dev/null
+++ b/graph/incidents_graphml/7/7cde22f0-277e-11ef-8c37-3d33f474c8fc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.88
+ 100.64.88.88
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718060968
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cde22f0-277e-11ef-8c37-3d33f474c8fc
+
+
+
diff --git a/graph/incidents_graphml/7/7ce12710-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7ce12710-32d4-11ee-b53b-dbf4412bf717.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a0d31e023c78cf86bac5db1d55778f5a17dffeb
--- /dev/null
+++ b/graph/incidents_graphml/7/7ce12710-32d4-11ee-b53b-dbf4412bf717.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.234
+ 100.64.52.234
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691159870
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce12710-32d4-11ee-b53b-dbf4412bf717
+
+
+
diff --git a/graph/incidents_graphml/7/7ce16fc0-29c1-11ee-92d3-75b14f8be714.graphml b/graph/incidents_graphml/7/7ce16fc0-29c1-11ee-92d3-75b14f8be714.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca5ff7bcd959cd493321234ffa14f592a63cabaa
--- /dev/null
+++ b/graph/incidents_graphml/7/7ce16fc0-29c1-11ee-92d3-75b14f8be714.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.83
+ 100.64.7.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690162149
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ce16fc0-29c1-11ee-92d3-75b14f8be714
+
+
+
diff --git a/graph/incidents_graphml/7/7ce2b900-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7ce2b900-41b6-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87a0dc720cd43b97b93f48e5aab48b5103d79eed
--- /dev/null
+++ b/graph/incidents_graphml/7/7ce2b900-41b6-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.80
+ 100.64.71.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.15
+ 100.64.73.15
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ce2b900-41b6-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/7/7ce44170-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7ce44170-5f20-11ee-9598-b95b2a00646d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a1487d2c46cf859898565ab8f2400d3ec594bd4
--- /dev/null
+++ b/graph/incidents_graphml/7/7ce44170-5f20-11ee-9598-b95b2a00646d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.70
+ 100.64.86.70
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696030363
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ce44170-5f20-11ee-9598-b95b2a00646d
+
+
+
diff --git a/graph/incidents_graphml/7/7ce57820-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7ce57820-41b6-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..135435681ae2c0606155258f8aa21da8ad68b340
--- /dev/null
+++ b/graph/incidents_graphml/7/7ce57820-41b6-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,785 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.16
+ 100.64.73.16
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.65
+ 100.64.72.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.17
+ 100.64.73.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.18
+ 100.64.73.18
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.19
+ 100.64.73.19
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.20
+ 100.64.73.20
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.38.63
+ 100.64.38.63
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.156
+ 100.64.71.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.69.2
+ 100.64.69.2
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.130
+ 100.64.71.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.34.5
+ 100.64.34.5
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.240
+ 100.64.1.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.21
+ 100.64.73.21
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.22
+ 100.64.73.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.23
+ 100.64.73.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.28
+ 100.64.1.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.24
+ 100.64.73.24
+ []
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.25
+ 100.64.73.25
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.26
+ 100.64.73.26
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.27
+ 100.64.73.27
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.28
+ 100.64.73.28
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.147
+ 100.64.72.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.29
+ 100.64.73.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664648755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7ce57820-41b6-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/7/7ce76630-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7ce76630-1889-11ee-a72c-7b8cdfc9cafd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57387c7ec75ceb7a03686b81eca0394efc88e46d
--- /dev/null
+++ b/graph/incidents_graphml/7/7ce76630-1889-11ee-a72c-7b8cdfc9cafd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.25.199
+ USER-0015-2054.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688268928
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ce76630-1889-11ee-a72c-7b8cdfc9cafd
+
+
+
diff --git a/graph/incidents_graphml/7/7cee0250-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/7/7cee0250-2ff5-11ee-b00f-c1ca007fb916.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c94650fcf8f647460dbc457840971922465c45c
--- /dev/null
+++ b/graph/incidents_graphml/7/7cee0250-2ff5-11ee-b00f-c1ca007fb916.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.172
+ 100.64.69.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690844190
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7cee0250-2ff5-11ee-b00f-c1ca007fb916
+
+
+
diff --git a/graph/incidents_graphml/7/7cf1ecf0-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7cf1ecf0-52b2-11ee-9013-5fc05fa37c8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5939be770e14f0bb56ac31108b75132fa6dfebea
--- /dev/null
+++ b/graph/incidents_graphml/7/7cf1ecf0-52b2-11ee-9013-5fc05fa37c8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.12
+ 100.64.9.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694663704
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7cf1ecf0-52b2-11ee-9013-5fc05fa37c8b
+
+
+
diff --git a/graph/incidents_graphml/7/7cfae610-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/7/7cfae610-09ab-11ef-a326-59a1bcca7fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0cc3b449de4926c1487752eb0f0a478338d41520
--- /dev/null
+++ b/graph/incidents_graphml/7/7cfae610-09ab-11ef-a326-59a1bcca7fdf.graphml
@@ -0,0 +1,473 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.40
+ 100.64.49.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.41
+ 100.64.49.41
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.28
+ 100.64.49.28
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.29
+ 100.64.49.29
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.32
+ 100.64.22.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.30
+ 100.64.49.30
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.214
+ 100.64.8.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.31
+ 100.64.49.31
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.32
+ 100.64.49.32
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.33
+ 100.64.49.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7cfae610-09ab-11ef-a326-59a1bcca7fdf
+
+
+
diff --git a/graph/incidents_graphml/7/7cfb65d0-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7cfb65d0-32d4-11ee-b53b-dbf4412bf717.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e16715c0db835f4ba48b5def2ca732a48c71116
--- /dev/null
+++ b/graph/incidents_graphml/7/7cfb65d0-32d4-11ee-b53b-dbf4412bf717.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.234
+ 100.64.52.234
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691159870
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7cfb65d0-32d4-11ee-b53b-dbf4412bf717
+
+
+
diff --git a/graph/incidents_graphml/7/7cfe7d10-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/7/7cfe7d10-2ff5-11ee-b00f-c1ca007fb916.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a56b9faf909c11cb05a6cc71f19a1f492fc708a
--- /dev/null
+++ b/graph/incidents_graphml/7/7cfe7d10-2ff5-11ee-b00f-c1ca007fb916.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.172
+ 100.64.69.172
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690844190
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7cfe7d10-2ff5-11ee-b00f-c1ca007fb916
+
+
+
diff --git a/graph/incidents_graphml/7/7d012fc0-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7d012fc0-1889-11ee-a72c-7b8cdfc9cafd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f38652b61baae567ab3954c039da455c5fb288d8
--- /dev/null
+++ b/graph/incidents_graphml/7/7d012fc0-1889-11ee-a72c-7b8cdfc9cafd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.7
+ 100.64.91.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688268928
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d012fc0-1889-11ee-a72c-7b8cdfc9cafd
+
+
+
diff --git a/graph/incidents_graphml/7/7d0fb350-e2ab-11ee-bd91-33ef6009cb64.graphml b/graph/incidents_graphml/7/7d0fb350-e2ab-11ee-bd91-33ef6009cb64.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10b1b8c014b71c8c3ade4ea00a19ed88738f17cc
--- /dev/null
+++ b/graph/incidents_graphml/7/7d0fb350-e2ab-11ee-bd91-33ef6009cb64.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.198
+ 100.64.11.198
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710493666
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d0fb350-e2ab-11ee-bd91-33ef6009cb64
+
+
+
diff --git a/graph/incidents_graphml/7/7d0fda40-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/7/7d0fda40-9fd7-11ee-a827-c14dee966e17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2610f0c9b0374ab8e2b3fcb602c50554e099c133
--- /dev/null
+++ b/graph/incidents_graphml/7/7d0fda40-9fd7-11ee-a827-c14dee966e17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.19
+ 100.64.62.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703145836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d0fda40-9fd7-11ee-a827-c14dee966e17
+
+
+
diff --git a/graph/incidents_graphml/7/7d108480-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7d108480-8462-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8b8e22b2e2616c23e168a3cfb0c6ef1b3adf1a5
--- /dev/null
+++ b/graph/incidents_graphml/7/7d108480-8462-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.176
+ 100.64.51.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700126903
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d108480-8462-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/7/7d14e140-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7d14e140-32d4-11ee-b53b-dbf4412bf717.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5543d996aa3af22c8aa1b6a895f4c98b3901d027
--- /dev/null
+++ b/graph/incidents_graphml/7/7d14e140-32d4-11ee-b53b-dbf4412bf717.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691159870
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d14e140-32d4-11ee-b53b-dbf4412bf717
+
+
+
diff --git a/graph/incidents_graphml/7/7d1972b0-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7d1972b0-1889-11ee-a72c-7b8cdfc9cafd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78997010b33dd3169ebd2772dc1bf6c6258f1c58
--- /dev/null
+++ b/graph/incidents_graphml/7/7d1972b0-1889-11ee-a72c-7b8cdfc9cafd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.7
+ 100.64.91.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688268928
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d1972b0-1889-11ee-a72c-7b8cdfc9cafd
+
+
+
diff --git a/graph/incidents_graphml/7/7d199800-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/7/7d199800-2435-11ee-bc29-cfb067a56058.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..000942fb3f97b5c4f74126e14c159b342be5c5db
--- /dev/null
+++ b/graph/incidents_graphml/7/7d199800-2435-11ee-bc29-cfb067a56058.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1689552264
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d199800-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552264
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d199800-2435-11ee-bc29-cfb067a56058
+
+
+
diff --git a/graph/incidents_graphml/7/7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a.graphml b/graph/incidents_graphml/7/7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9efa319552a6516bfaa0c5b1356a319b968ea91
--- /dev/null
+++ b/graph/incidents_graphml/7/7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.102
+ 100.64.16.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.215
+ 100.64.72.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.250
+ 100.64.81.250
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687622965
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+ INCIDENT_LINK
+ 1687622965
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+ INCIDENT_LINK
+ 1687622965
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+ INCIDENT_LINK
+ 1687622965
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a
+
+
+
diff --git a/graph/incidents_graphml/7/7d21e9a0-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7d21e9a0-8462-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e34f154ca86d94e6462f229c896199324641492c
--- /dev/null
+++ b/graph/incidents_graphml/7/7d21e9a0-8462-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.176
+ 100.64.51.176
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700126903
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d21e9a0-8462-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/7/7d229ef0-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/7/7d229ef0-9fd7-11ee-a827-c14dee966e17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50649ba46c00dbbc493a204c459735c752f0f408
--- /dev/null
+++ b/graph/incidents_graphml/7/7d229ef0-9fd7-11ee-a827-c14dee966e17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.19
+ 100.64.62.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703145836
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d229ef0-9fd7-11ee-a827-c14dee966e17
+
+
+
diff --git a/graph/incidents_graphml/7/7d2a40e0-0367-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/7/7d2a40e0-0367-11ee-bce7-dffdb32a6ba9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17f8fe6230ffdd7f990ecde06b6ca22f1edfa4e9
--- /dev/null
+++ b/graph/incidents_graphml/7/7d2a40e0-0367-11ee-bce7-dffdb32a6ba9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.65
+ 100.64.80.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.91
+ 100.64.72.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685945351
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d2a40e0-0367-11ee-bce7-dffdb32a6ba9
+
+
+ INCIDENT_LINK
+ 1685945351
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d2a40e0-0367-11ee-bce7-dffdb32a6ba9
+
+
+
diff --git a/graph/incidents_graphml/7/7d2b59a0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7d2b59a0-4131-11ee-8e35-ab7460ef679b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5caa6b04a3c56fb741b4487271171e4c0ee966b
--- /dev/null
+++ b/graph/incidents_graphml/7/7d2b59a0-4131-11ee-8e35-ab7460ef679b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.241
+ 100.64.55.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692739130
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d2b59a0-4131-11ee-8e35-ab7460ef679b
+
+
+
diff --git a/graph/incidents_graphml/7/7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/7/7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc06fd8eff627d5212b64ed13e444f04147636d1
--- /dev/null
+++ b/graph/incidents_graphml/7/7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.219
+ 100.64.69.219
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1702389921
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c
+
+
+ INCIDENT_LINK
+ 1702389921
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c
+
+
+ INCIDENT_LINK
+ 1702389921
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c
+
+
+ INCIDENT_LINK
+ 1702389921
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c
+
+
+
diff --git a/graph/incidents_graphml/7/7d2e90e0-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7d2e90e0-5f20-11ee-9598-b95b2a00646d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ca90a3e92dd737f271b674ed4337238214c6fa1
--- /dev/null
+++ b/graph/incidents_graphml/7/7d2e90e0-5f20-11ee-9598-b95b2a00646d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.187
+ 100.64.7.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696030363
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d2e90e0-5f20-11ee-9598-b95b2a00646d
+
+
+
diff --git a/graph/incidents_graphml/7/7d2f7320-4896-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/7/7d2f7320-4896-11ee-a737-6b545b426b37.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..431894af577e0b31543136112da2195db7207a04
--- /dev/null
+++ b/graph/incidents_graphml/7/7d2f7320-4896-11ee-a737-6b545b426b37.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.64
+ 100.64.64.64
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693552167
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d2f7320-4896-11ee-a737-6b545b426b37
+
+
+
diff --git a/graph/incidents_graphml/7/7d30d670-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7d30d670-2e2e-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f67f77edeba8a33b9e44ef8b38812bf65805be78
--- /dev/null
+++ b/graph/incidents_graphml/7/7d30d670-2e2e-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.239
+ 100.64.45.239
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690648770
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d30d670-2e2e-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/7/7d3b8930-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7d3b8930-5f20-11ee-9598-b95b2a00646d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b612c8473d0dbcbf66ed9ed30ea1b554571a245a
--- /dev/null
+++ b/graph/incidents_graphml/7/7d3b8930-5f20-11ee-9598-b95b2a00646d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.7.187
+ 100.64.7.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696030364
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d3b8930-5f20-11ee-9598-b95b2a00646d
+
+
+
diff --git a/graph/incidents_graphml/7/7d3c2c60-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7d3c2c60-1dac-11ee-a6c7-eb84cfc6792e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0c8a08256250904767ead76fc961fd8fe69fcce
--- /dev/null
+++ b/graph/incidents_graphml/7/7d3c2c60-1dac-11ee-a6c7-eb84cfc6792e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.66
+ USER-0015-2100.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688833717
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d3c2c60-1dac-11ee-a6c7-eb84cfc6792e
+
+
+
diff --git a/graph/incidents_graphml/7/7d3cac30-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7d3cac30-3553-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d79fac0a44f1f15d33c3feb10185a9ab22d6443b
--- /dev/null
+++ b/graph/incidents_graphml/7/7d3cac30-3553-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.127
+ 100.64.23.127
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691434319
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d3cac30-3553-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/7/7d3e4030-4896-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/7/7d3e4030-4896-11ee-a737-6b545b426b37.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1399079b8209445042d0b8bc5086903b8aeaa35b
--- /dev/null
+++ b/graph/incidents_graphml/7/7d3e4030-4896-11ee-a737-6b545b426b37.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.64
+ 100.64.64.64
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693552167
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d3e4030-4896-11ee-a737-6b545b426b37
+
+
+
diff --git a/graph/incidents_graphml/7/7d432760-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7d432760-4131-11ee-8e35-ab7460ef679b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..75ac430679b676b4cebe17a9bddae4d213c99246
--- /dev/null
+++ b/graph/incidents_graphml/7/7d432760-4131-11ee-8e35-ab7460ef679b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.241
+ 100.64.55.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692739130
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d432760-4131-11ee-8e35-ab7460ef679b
+
+
+
diff --git a/graph/incidents_graphml/7/7d4d7b00-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7d4d7b00-1889-11ee-a72c-7b8cdfc9cafd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a496d8c62aaa2c754251266ec79bc31cbd0c63aa
--- /dev/null
+++ b/graph/incidents_graphml/7/7d4d7b00-1889-11ee-a72c-7b8cdfc9cafd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.181
+ USER-0015-1529.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688268928
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d4d7b00-1889-11ee-a72c-7b8cdfc9cafd
+
+
+
diff --git a/graph/incidents_graphml/7/7d53e6c0-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7d53e6c0-53e9-11ee-bfe4-c36dfe104f88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb5cb9e0ad90696e210ef6844c5f2cba565bb504
--- /dev/null
+++ b/graph/incidents_graphml/7/7d53e6c0-53e9-11ee-bfe4-c36dfe104f88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.97.151
+ 100.64.97.151
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694797279
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d53e6c0-53e9-11ee-bfe4-c36dfe104f88
+
+
+
diff --git a/graph/incidents_graphml/7/7d59e3b0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7d59e3b0-4131-11ee-8e35-ab7460ef679b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1cc7ec4eb4a5e40c86d6221179016192fd00c1a1
--- /dev/null
+++ b/graph/incidents_graphml/7/7d59e3b0-4131-11ee-8e35-ab7460ef679b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692739130
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7d59e3b0-4131-11ee-8e35-ab7460ef679b
+
+
+
diff --git a/graph/incidents_graphml/7/7d6a8f60-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7d6a8f60-1dac-11ee-a6c7-eb84cfc6792e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8df0bda6a46402dded02d8e84a2cf1878e359c3
--- /dev/null
+++ b/graph/incidents_graphml/7/7d6a8f60-1dac-11ee-a6c7-eb84cfc6792e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.66
+ USER-0015-2100.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688833717
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d6a8f60-1dac-11ee-a6c7-eb84cfc6792e
+
+
+
diff --git a/graph/incidents_graphml/7/7d6dfb50-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7d6dfb50-1889-11ee-a72c-7b8cdfc9cafd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09d1bc8d08dee2bc65c1717c43deb9fb894def36
--- /dev/null
+++ b/graph/incidents_graphml/7/7d6dfb50-1889-11ee-a72c-7b8cdfc9cafd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.69.181
+ USER-0015-1529.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688268929
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d6dfb50-1889-11ee-a72c-7b8cdfc9cafd
+
+
+
diff --git a/graph/incidents_graphml/7/7d6f1960-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7d6f1960-4131-11ee-8e35-ab7460ef679b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a2cd04d84275f7c7d4c8d2577339eda5cb3f908
--- /dev/null
+++ b/graph/incidents_graphml/7/7d6f1960-4131-11ee-8e35-ab7460ef679b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.243
+ 100.64.55.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692739130
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d6f1960-4131-11ee-8e35-ab7460ef679b
+
+
+
diff --git a/graph/incidents_graphml/7/7d738500-7baf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/7/7d738500-7baf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ad40ce2aa0284bd61bf652532816c0da465f2ca
--- /dev/null
+++ b/graph/incidents_graphml/7/7d738500-7baf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.97.25
+ 100.64.97.25
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699170414
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d738500-7baf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/7/7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/7/7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..024485e8c9128fb545c9894918c91b28ddb2f783
--- /dev/null
+++ b/graph/incidents_graphml/7/7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.17.136.40
+ 172.17.136.40
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.74
+ 100.64.87.74
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.75
+ 100.64.87.75
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.76
+ 100.64.87.76
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.77
+ 100.64.87.77
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.78
+ 100.64.87.78
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677495433
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495433
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495433
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495433
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495433
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495433
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495433
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495433
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495433
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495433
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/7/7d7e7580-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7d7e7580-52b2-11ee-9013-5fc05fa37c8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b80cdc26648a0e962a69d9fc253f1a9d1fc6dfb0
--- /dev/null
+++ b/graph/incidents_graphml/7/7d7e7580-52b2-11ee-9013-5fc05fa37c8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.130
+ 100.64.30.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694663705
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d7e7580-52b2-11ee-9013-5fc05fa37c8b
+
+
+
diff --git a/graph/incidents_graphml/7/7d7f92f0-7baf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/7/7d7f92f0-7baf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..22d3393ef6682d9d6d874984addfe36eac7ac84e
--- /dev/null
+++ b/graph/incidents_graphml/7/7d7f92f0-7baf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.20.132.195
+ 172.20.132.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.27
+ 100.64.97.27
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699170415
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d7f92f0-7baf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/7/7d7f9420-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7d7f9420-4131-11ee-8e35-ab7460ef679b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ba5fdef5ad9fec0406bcdb0068e0365c194fba7
--- /dev/null
+++ b/graph/incidents_graphml/7/7d7f9420-4131-11ee-8e35-ab7460ef679b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.245
+ 100.64.55.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692739131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d7f9420-4131-11ee-8e35-ab7460ef679b
+
+
+
diff --git a/graph/incidents_graphml/7/7d811950-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7d811950-2e2e-11ee-be2e-730d4c543b4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d4ab24e7ef9a1cd63d95e626609bf8e6e9895ee
--- /dev/null
+++ b/graph/incidents_graphml/7/7d811950-2e2e-11ee-be2e-730d4c543b4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.241
+ 100.64.45.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690648770
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d811950-2e2e-11ee-be2e-730d4c543b4a
+
+
+
diff --git a/graph/incidents_graphml/7/7d825630-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7d825630-5f20-11ee-9598-b95b2a00646d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c42470f643cbba58cca2ca97904aa43ad3ff57da
--- /dev/null
+++ b/graph/incidents_graphml/7/7d825630-5f20-11ee-9598-b95b2a00646d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.236
+ 100.64.52.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696030364
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d825630-5f20-11ee-9598-b95b2a00646d
+
+
+
diff --git a/graph/incidents_graphml/7/7d879ee0-1067-11ee-aaa6-7f821bc3777a.graphml b/graph/incidents_graphml/7/7d879ee0-1067-11ee-aaa6-7f821bc3777a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7905995965853dae8149abd006b787331d9f9b3c
--- /dev/null
+++ b/graph/incidents_graphml/7/7d879ee0-1067-11ee-aaa6-7f821bc3777a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.2
+ 100.64.59.2
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687374717
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d879ee0-1067-11ee-aaa6-7f821bc3777a
+
+
+
diff --git a/graph/incidents_graphml/7/7d87bf90-1329-11ef-aba1-33e212db0be8.graphml b/graph/incidents_graphml/7/7d87bf90-1329-11ef-aba1-33e212db0be8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9465c6908e6e36087b62af187f45287b96407ddf
--- /dev/null
+++ b/graph/incidents_graphml/7/7d87bf90-1329-11ef-aba1-33e212db0be8.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.170
+ 100.64.55.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.63
+ 100.64.23.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.171
+ 100.64.55.171
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.66
+ 100.64.18.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.1
+ 100.64.27.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715825439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d87bf90-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d87bf90-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d87bf90-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d87bf90-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d87bf90-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d87bf90-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d87bf90-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d87bf90-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d87bf90-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825439
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7d87bf90-1329-11ef-aba1-33e212db0be8
+
+
+
diff --git a/graph/incidents_graphml/7/7d8df320-e560-11ee-be14-8bb84b2c14a8.graphml b/graph/incidents_graphml/7/7d8df320-e560-11ee-be14-8bb84b2c14a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3f2ea47a5102ee9f82311a7730c5bff4903a6ad
--- /dev/null
+++ b/graph/incidents_graphml/7/7d8df320-e560-11ee-be14-8bb84b2c14a8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.93
+ 100.64.68.93
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ INCIDENT_LINK
+ 1710791308
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d8df320-e560-11ee-be14-8bb84b2c14a8
+
+
+ INCIDENT_LINK
+ 1710791308
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d8df320-e560-11ee-be14-8bb84b2c14a8
+
+
+
diff --git a/graph/incidents_graphml/7/7d902f30-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/7/7d902f30-2122-11ee-9a61-05dd24aa353e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c0568c5d868b51a4a26807d06d0c817857ffd2a
--- /dev/null
+++ b/graph/incidents_graphml/7/7d902f30-2122-11ee-9a61-05dd24aa353e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.53
+ 100.64.29.53
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1689214251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d902f30-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7d902f30-2122-11ee-9a61-05dd24aa353e
+
+
+
diff --git a/graph/incidents_graphml/7/7d905ff0-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7d905ff0-5f20-11ee-9598-b95b2a00646d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cef5882374e0952942ec740d1e0a786357a59945
--- /dev/null
+++ b/graph/incidents_graphml/7/7d905ff0-5f20-11ee-9598-b95b2a00646d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.52.236
+ 100.64.52.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696030364
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7d905ff0-5f20-11ee-9598-b95b2a00646d
+
+
+
diff --git a/graph/incidents_graphml/7/7d908860-866f-11ee-8f03-878f88d78f03.graphml b/graph/incidents_graphml/7/7d908860-866f-11ee-8f03-878f88d78f03.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a4334ff3f9ed240ecaa614e415e3595251b8265
--- /dev/null
+++ b/graph/incidents_graphml/7/7d908860-866f-11ee-8f03-878f88d78f03.graphml
@@ -0,0 +1,659 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.34
+ 100.64.18.34
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.193
+ 100.64.69.193
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.194
+ 100.64.69.194
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.22.246
+ 100.64.22.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.26.110
+ 100.64.26.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.81015625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.189
+ 100.64.69.189
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.37.97
+ 100.64.37.97
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.58.133
+ 100.64.58.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.26.139
+ 100.64.26.139
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.190
+ 100.64.69.190
+ ["Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.69.195
+ 100.64.69.195
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.59.226
+ 100.64.59.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352390
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 7d908860-866f-11ee-8f03-878f88d78f03
+
+
+
diff --git a/graph/incidents_graphml/7/7da49cc0-1067-11ee-aaa6-7f821bc3777a.graphml b/graph/incidents_graphml/7/7da49cc0-1067-11ee-aaa6-7f821bc3777a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd1328d3efcfea3a0651fb9001cd3111eff95746
--- /dev/null
+++ b/graph/incidents_graphml/7/7da49cc0-1067-11ee-aaa6-7f821bc3777a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.2
+ 100.64.59.2
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687374717
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7da49cc0-1067-11ee-aaa6-7f821bc3777a
+
+
+
diff --git a/graph/incidents_graphml/7/7db287c0-9eb7-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/7/7db287c0-9eb7-11ee-9861-037a800baf91.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70df8ab7228600776b25246bb964e5552dfea774
--- /dev/null
+++ b/graph/incidents_graphml/7/7db287c0-9eb7-11ee-9861-037a800baf91.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.132
+ 100.64.90.132
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703022142
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7db287c0-9eb7-11ee-9861-037a800baf91
+
+
+
diff --git a/graph/incidents_graphml/7/7db3ff10-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7db3ff10-3553-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2051f12f46ef4124d30e99f54dd609c706a967c
--- /dev/null
+++ b/graph/incidents_graphml/7/7db3ff10-3553-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.129
+ 100.64.23.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691434320
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7db3ff10-3553-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/7/7dc961c0-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7dc961c0-1889-11ee-a72c-7b8cdfc9cafd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..124befc2ae2577fad88b26f84dcc83b648567b44
--- /dev/null
+++ b/graph/incidents_graphml/7/7dc961c0-1889-11ee-a72c-7b8cdfc9cafd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.10
+ 100.64.91.10
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688268929
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7dc961c0-1889-11ee-a72c-7b8cdfc9cafd
+
+
+
diff --git a/graph/incidents_graphml/7/7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/7/7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90f2e33aab33c8502e50f345968dc2ae0bd2ff14
--- /dev/null
+++ b/graph/incidents_graphml/7/7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.138
+ 100.64.82.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.127
+ 100.64.72.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.82.139
+ 100.64.82.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1670151469
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151469
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151469
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151469
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/7/7dd638a0-221a-11ef-a5a3-b5bcb77a69cd.graphml b/graph/incidents_graphml/7/7dd638a0-221a-11ef-a5a3-b5bcb77a69cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a5639e20eea346d53734ea8004a82ac62f4af88
--- /dev/null
+++ b/graph/incidents_graphml/7/7dd638a0-221a-11ef-a5a3-b5bcb77a69cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.37
+ 100.64.15.37
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717468264
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7dd638a0-221a-11ef-a5a3-b5bcb77a69cd
+
+
+
diff --git a/graph/incidents_graphml/7/7de581e0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7de581e0-4131-11ee-8e35-ab7460ef679b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ccca0b71c8030a92c926525edf360ee78714e866
--- /dev/null
+++ b/graph/incidents_graphml/7/7de581e0-4131-11ee-8e35-ab7460ef679b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.151
+ 100.64.11.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692739131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7de581e0-4131-11ee-8e35-ab7460ef679b
+
+
+
diff --git a/graph/incidents_graphml/7/7deb44c0-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7deb44c0-53e9-11ee-bfe4-c36dfe104f88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58faafc1a4ad58fbd525f494c220ba85fe14865a
--- /dev/null
+++ b/graph/incidents_graphml/7/7deb44c0-53e9-11ee-bfe4-c36dfe104f88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.153
+ 100.64.97.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694797280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7deb44c0-53e9-11ee-bfe4-c36dfe104f88
+
+
+
diff --git a/graph/incidents_graphml/7/7debcd50-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7debcd50-1dac-11ee-a6c7-eb84cfc6792e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ef311f0b7e0fd3fe981f4921ea7025b15df4288
--- /dev/null
+++ b/graph/incidents_graphml/7/7debcd50-1dac-11ee-a6c7-eb84cfc6792e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.68
+ 100.64.93.68
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1688833718
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7debcd50-1dac-11ee-a6c7-eb84cfc6792e
+
+
+
diff --git a/graph/incidents_graphml/7/7dee27d0-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7dee27d0-1889-11ee-a72c-7b8cdfc9cafd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bdbf02c9f97ce356ad036aa7b40f8b7816c1d045
--- /dev/null
+++ b/graph/incidents_graphml/7/7dee27d0-1889-11ee-a72c-7b8cdfc9cafd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.91.12
+ 100.64.91.12
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688268929
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7dee27d0-1889-11ee-a72c-7b8cdfc9cafd
+
+
+
diff --git a/graph/incidents_graphml/7/7dee9720-5b9f-11ee-95ea-792d2008bff3.graphml b/graph/incidents_graphml/7/7dee9720-5b9f-11ee-95ea-792d2008bff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e665fb37cf0a937244c426c03be7ec1f9d1c28d1
--- /dev/null
+++ b/graph/incidents_graphml/7/7dee9720-5b9f-11ee-95ea-792d2008bff3.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.135.182
+ 172.25.135.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.153
+ 100.64.95.153
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.202
+ 100.64.95.202
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695645106
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7dee9720-5b9f-11ee-95ea-792d2008bff3
+
+
+ INCIDENT_LINK
+ 1695645106
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7dee9720-5b9f-11ee-95ea-792d2008bff3
+
+
+ INCIDENT_LINK
+ 1695645106
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7dee9720-5b9f-11ee-95ea-792d2008bff3
+
+
+ INCIDENT_LINK
+ 1695645106
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7dee9720-5b9f-11ee-95ea-792d2008bff3
+
+
+
diff --git a/graph/incidents_graphml/7/7def44b0-7baf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/7/7def44b0-7baf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..340f947b997344c6e68fb9277b85b26a55268cd2
--- /dev/null
+++ b/graph/incidents_graphml/7/7def44b0-7baf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.103.13
+ 192.168.103.13
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.97.28
+ 100.64.97.28
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699170415
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7def44b0-7baf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/7/7df24090-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7df24090-3553-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ecb1318b638b6af2426fd9b42f5c398c1bdb155
--- /dev/null
+++ b/graph/incidents_graphml/7/7df24090-3553-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.129
+ 100.64.23.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691434320
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7df24090-3553-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/7/7dfb9870-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7dfb9870-53e9-11ee-bfe4-c36dfe104f88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..219bd313dc44dd60d05819664935f4323fb856a1
--- /dev/null
+++ b/graph/incidents_graphml/7/7dfb9870-53e9-11ee-bfe4-c36dfe104f88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.153
+ 100.64.97.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694797280
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7dfb9870-53e9-11ee-bfe4-c36dfe104f88
+
+
+
diff --git a/graph/incidents_graphml/7/7dff3440-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7dff3440-1617-11ee-a9fc-9ffb4847312b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f0c9469af097b97d136669acc0690d777b5410e
--- /dev/null
+++ b/graph/incidents_graphml/7/7dff3440-1617-11ee-a9fc-9ffb4847312b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.1
+ 100.64.28.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7dff3440-1617-11ee-a9fc-9ffb4847312b
+
+
+
diff --git a/graph/incidents_graphml/7/7e022f00-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7e022f00-26c1-11ee-87ad-dd3f4232b94e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2402aadbd0579014e3ca8fea6ad20cb0e0304bb2
--- /dev/null
+++ b/graph/incidents_graphml/7/7e022f00-26c1-11ee-87ad-dd3f4232b94e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.250
+ 100.64.12.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689832298
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7e022f00-26c1-11ee-87ad-dd3f4232b94e
+
+
+
diff --git a/graph/incidents_graphml/7/7e07aeb0-7baf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/7/7e07aeb0-7baf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..878b7fd1b57abe1fec2e1edaa965d80b4175b725
--- /dev/null
+++ b/graph/incidents_graphml/7/7e07aeb0-7baf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.181.72.179
+ 10.181.72.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 172.16.59.105
+ 172.16.59.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Stealthwatch","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1699170415
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7e07aeb0-7baf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/7/7e0e3c50-9eb7-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/7/7e0e3c50-9eb7-11ee-9861-037a800baf91.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67b9a2b3e6631137ba4beafa68e37ef6e3605d55
--- /dev/null
+++ b/graph/incidents_graphml/7/7e0e3c50-9eb7-11ee-9861-037a800baf91.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.136
+ 100.64.90.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703022142
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7e0e3c50-9eb7-11ee-9861-037a800baf91
+
+
+
diff --git a/graph/incidents_graphml/7/7e19fcc0-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7e19fcc0-26c1-11ee-87ad-dd3f4232b94e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..687ce18d79dec3ac3241d4d69386b3a28007573f
--- /dev/null
+++ b/graph/incidents_graphml/7/7e19fcc0-26c1-11ee-87ad-dd3f4232b94e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.250
+ 100.64.12.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689832298
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7e19fcc0-26c1-11ee-87ad-dd3f4232b94e
+
+
+
diff --git a/graph/incidents_graphml/7/7e1ddfd0-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7e1ddfd0-1617-11ee-a9fc-9ffb4847312b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b6a1a2cd7e9f6857c8a2acd43bef3fd6f27444d
--- /dev/null
+++ b/graph/incidents_graphml/7/7e1ddfd0-1617-11ee-a9fc-9ffb4847312b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.1
+ 100.64.28.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7e1ddfd0-1617-11ee-a9fc-9ffb4847312b
+
+
+
diff --git a/graph/incidents_graphml/7/7e207420-f7ff-11ec-9c0d-cfd14a23bdb2.graphml b/graph/incidents_graphml/7/7e207420-f7ff-11ec-9c0d-cfd14a23bdb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc36d815a0ceae2c6c6bf350da187dc9cf241132
--- /dev/null
+++ b/graph/incidents_graphml/7/7e207420-f7ff-11ec-9c0d-cfd14a23bdb2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.211
+ 100.64.81.211
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.217
+ 100.64.73.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.1
+ 100.64.71.1
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656543724
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7e207420-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+ INCIDENT_LINK
+ 1656543724
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7e207420-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+ INCIDENT_LINK
+ 1656543724
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7e207420-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+ INCIDENT_LINK
+ 1656543724
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7e207420-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+
diff --git a/graph/incidents_graphml/7/7e242600-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7e242600-3553-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf2bb7165cac4278750ba9588f83aa6528eb07d1
--- /dev/null
+++ b/graph/incidents_graphml/7/7e242600-3553-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.131
+ 100.64.23.131
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691434321
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e242600-3553-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/7/7e291530-eb52-11ec-9c3b-83765024aa2d.graphml b/graph/incidents_graphml/7/7e291530-eb52-11ec-9c3b-83765024aa2d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a87d111cecd21ee28136d5e5bebc48f07aaed035
--- /dev/null
+++ b/graph/incidents_graphml/7/7e291530-eb52-11ec-9c3b-83765024aa2d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.241
+ USER-0015-1880.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655150007
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e291530-eb52-11ec-9c3b-83765024aa2d
+
+
+
diff --git a/graph/incidents_graphml/7/7e312fb0-7baf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/7/7e312fb0-7baf-11ee-b624-7d3a11587cf9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19a055cf75053f97bdf87fa7547a431b13caa9be
--- /dev/null
+++ b/graph/incidents_graphml/7/7e312fb0-7baf-11ee-b624-7d3a11587cf9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.170
+ USER-0015-2163.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ HOST-17780
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1699170416
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e312fb0-7baf-11ee-b624-7d3a11587cf9
+
+
+
diff --git a/graph/incidents_graphml/7/7e323fb0-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7e323fb0-26c1-11ee-87ad-dd3f4232b94e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3009c02404672bced4d305d9f9e83589c5edb107
--- /dev/null
+++ b/graph/incidents_graphml/7/7e323fb0-26c1-11ee-87ad-dd3f4232b94e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.12
+ 100.64.55.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689832298
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e323fb0-26c1-11ee-87ad-dd3f4232b94e
+
+
+
diff --git a/graph/incidents_graphml/7/7e39de40-4896-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/7/7e39de40-4896-11ee-a737-6b545b426b37.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..247675ce4511d9b06cc7f0efc5099f049fb6a482
--- /dev/null
+++ b/graph/incidents_graphml/7/7e39de40-4896-11ee-a737-6b545b426b37.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.123
+ 100.64.13.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693552169
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e39de40-4896-11ee-a737-6b545b426b37
+
+
+
diff --git a/graph/incidents_graphml/7/7e3b5890-df6a-11ee-b599-d5300ed6974c.graphml b/graph/incidents_graphml/7/7e3b5890-df6a-11ee-b599-d5300ed6974c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9fa370a7c9f342ff54ec187b37ddf02cdfc53395
--- /dev/null
+++ b/graph/incidents_graphml/7/7e3b5890-df6a-11ee-b599-d5300ed6974c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.24
+ 100.64.67.24
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710135897
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7e3b5890-df6a-11ee-b599-d5300ed6974c
+
+
+
diff --git a/graph/incidents_graphml/7/7e419f30-13cc-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/7/7e419f30-13cc-11ee-918c-e193118b03e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d10cc2938ff3ce80301ec1c600b7465835349b4
--- /dev/null
+++ b/graph/incidents_graphml/7/7e419f30-13cc-11ee-918c-e193118b03e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.214
+ 100.64.9.214
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687747950
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7e419f30-13cc-11ee-918c-e193118b03e7
+
+
+
diff --git a/graph/incidents_graphml/7/7e4615d0-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7e4615d0-26c1-11ee-87ad-dd3f4232b94e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7bf18459678d6641be689022a9db4379066e29c1
--- /dev/null
+++ b/graph/incidents_graphml/7/7e4615d0-26c1-11ee-87ad-dd3f4232b94e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.12
+ 100.64.55.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689832298
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7e4615d0-26c1-11ee-87ad-dd3f4232b94e
+
+
+
diff --git a/graph/incidents_graphml/7/7e4a8010-4896-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/7/7e4a8010-4896-11ee-a737-6b545b426b37.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0d687ee09779f4b716d7976160b2c8e5520cf54
--- /dev/null
+++ b/graph/incidents_graphml/7/7e4a8010-4896-11ee-a737-6b545b426b37.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.123
+ 100.64.13.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693552169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7e4a8010-4896-11ee-a737-6b545b426b37
+
+
+
diff --git a/graph/incidents_graphml/7/7e501910-df6a-11ee-b599-d5300ed6974c.graphml b/graph/incidents_graphml/7/7e501910-df6a-11ee-b599-d5300ed6974c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8022448456b1ebf2d2c430dcadd02354251ee2b
--- /dev/null
+++ b/graph/incidents_graphml/7/7e501910-df6a-11ee-b599-d5300ed6974c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.24
+ 100.64.67.24
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710135897
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7e501910-df6a-11ee-b599-d5300ed6974c
+
+
+
diff --git a/graph/incidents_graphml/7/7e5479a0-ea51-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/7/7e5479a0-ea51-11ee-a5b0-ebb549372bba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5bd58ed46292dfb3e4b8086fe73d498d30d43c17
--- /dev/null
+++ b/graph/incidents_graphml/7/7e5479a0-ea51-11ee-a5b0-ebb549372bba.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.164
+ 100.64.10.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1711334622
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5479a0-ea51-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711334622
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5479a0-ea51-11ee-a5b0-ebb549372bba
+
+
+
diff --git a/graph/incidents_graphml/7/7e5945e0-13cc-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/7/7e5945e0-13cc-11ee-918c-e193118b03e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..713b82d42c8224bf470718387d1edc9e582ade19
--- /dev/null
+++ b/graph/incidents_graphml/7/7e5945e0-13cc-11ee-918c-e193118b03e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.222
+ 100.64.9.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687747950
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7e5945e0-13cc-11ee-918c-e193118b03e7
+
+
+
diff --git a/graph/incidents_graphml/7/7e5d8a90-fbd8-11ec-820d-995ce05c6788.graphml b/graph/incidents_graphml/7/7e5d8a90-fbd8-11ec-820d-995ce05c6788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e934c4e449e2c46805773e1e08a8f822a9fa9cac
--- /dev/null
+++ b/graph/incidents_graphml/7/7e5d8a90-fbd8-11ec-820d-995ce05c6788.graphml
@@ -0,0 +1,639 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.99
+ 100.64.71.99
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.100
+ USER-0015-1617.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.114
+ USER-0015-1204.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.101
+ 100.64.71.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.228
+ 100.64.70.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.102
+ 100.64.71.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.103
+ 100.64.71.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.104
+ 100.64.71.104
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.33
+ USER-0015-1618.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.105
+ 100.64.71.105
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.106
+ 100.64.71.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.107
+ 100.64.71.107
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.250
+ 100.64.70.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.108
+ 100.64.71.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.109
+ 100.64.71.109
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.110
+ 100.64.71.110
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.53
+ 100.64.1.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.111
+ 100.64.71.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+ INCIDENT_LINK
+ 1656966779
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e5d8a90-fbd8-11ec-820d-995ce05c6788
+
+
+
diff --git a/graph/incidents_graphml/7/7e65e9f0-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7e65e9f0-3553-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5738dcbd5c092abc44416f4c473c7f8b90a3b30a
--- /dev/null
+++ b/graph/incidents_graphml/7/7e65e9f0-3553-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.131
+ 100.64.23.131
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691434321
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e65e9f0-3553-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/7/7e68f840-df6a-11ee-b599-d5300ed6974c.graphml b/graph/incidents_graphml/7/7e68f840-df6a-11ee-b599-d5300ed6974c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d023bb8695c3f377bbcb04174bb35240899133f
--- /dev/null
+++ b/graph/incidents_graphml/7/7e68f840-df6a-11ee-b599-d5300ed6974c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.26
+ 100.64.67.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710135897
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e68f840-df6a-11ee-b599-d5300ed6974c
+
+
+
diff --git a/graph/incidents_graphml/7/7e6ef0c0-13cc-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/7/7e6ef0c0-13cc-11ee-918c-e193118b03e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..357f5e76bf62ce905b0e6e84edc9571a3fbb59f0
--- /dev/null
+++ b/graph/incidents_graphml/7/7e6ef0c0-13cc-11ee-918c-e193118b03e7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.222
+ 100.64.9.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687747951
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7e6ef0c0-13cc-11ee-918c-e193118b03e7
+
+
+
diff --git a/graph/incidents_graphml/7/7e732bc0-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7e732bc0-1617-11ee-a9fc-9ffb4847312b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5c06ecfb90a493fec3d60457c09e9fd23483a68
--- /dev/null
+++ b/graph/incidents_graphml/7/7e732bc0-1617-11ee-a9fc-9ffb4847312b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.207
+ 100.64.35.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e732bc0-1617-11ee-a9fc-9ffb4847312b
+
+
+
diff --git a/graph/incidents_graphml/7/7e7400e0-eb52-11ec-9c3b-83765024aa2d.graphml b/graph/incidents_graphml/7/7e7400e0-eb52-11ec-9c3b-83765024aa2d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd89739feed20ea320b9d79dd3cd0567cf429818
--- /dev/null
+++ b/graph/incidents_graphml/7/7e7400e0-eb52-11ec-9c3b-83765024aa2d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.241
+ USER-0015-1880.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655150008
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7e7400e0-eb52-11ec-9c3b-83765024aa2d
+
+
+
diff --git a/graph/incidents_graphml/7/7e7d6aa0-df6a-11ee-b599-d5300ed6974c.graphml b/graph/incidents_graphml/7/7e7d6aa0-df6a-11ee-b599-d5300ed6974c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ec8de4cf95c310f16205ec1c47d33d6a6b0b30c
--- /dev/null
+++ b/graph/incidents_graphml/7/7e7d6aa0-df6a-11ee-b599-d5300ed6974c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.26
+ 100.64.67.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710135897
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7e7d6aa0-df6a-11ee-b599-d5300ed6974c
+
+
+
diff --git a/graph/incidents_graphml/7/7e856a40-368f-11ee-b546-fb0db7567997.graphml b/graph/incidents_graphml/7/7e856a40-368f-11ee-b546-fb0db7567997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca25cb39b647dc05a1416a5f4c3c1a60c52d99af
--- /dev/null
+++ b/graph/incidents_graphml/7/7e856a40-368f-11ee-b546-fb0db7567997.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.120
+ 100.64.48.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691570042
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e856a40-368f-11ee-b546-fb0db7567997
+
+
+
diff --git a/graph/incidents_graphml/7/7e95ded0-0367-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/7/7e95ded0-0367-11ee-bce7-dffdb32a6ba9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13286ba3361ab64146f9d5e9243041a438a70b60
--- /dev/null
+++ b/graph/incidents_graphml/7/7e95ded0-0367-11ee-bce7-dffdb32a6ba9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.250
+ 100.64.17.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685945353
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7e95ded0-0367-11ee-bce7-dffdb32a6ba9
+
+
+
diff --git a/graph/incidents_graphml/7/7ea5ad70-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7ea5ad70-1617-11ee-a9fc-9ffb4847312b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61fc268787602d9599febbb96781f46f7a69b00c
--- /dev/null
+++ b/graph/incidents_graphml/7/7ea5ad70-1617-11ee-a9fc-9ffb4847312b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.207
+ 100.64.35.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000066
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7ea5ad70-1617-11ee-a9fc-9ffb4847312b
+
+
+
diff --git a/graph/incidents_graphml/7/7eaa1260-45bb-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/7/7eaa1260-45bb-11ee-853f-87a1872d184b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81219019c741e879609603090210757b473d3e96
--- /dev/null
+++ b/graph/incidents_graphml/7/7eaa1260-45bb-11ee-853f-87a1872d184b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.114
+ 100.64.24.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693238208
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7eaa1260-45bb-11ee-853f-87a1872d184b
+
+
+ INCIDENT_LINK
+ 1693238208
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7eaa1260-45bb-11ee-853f-87a1872d184b
+
+
+
diff --git a/graph/incidents_graphml/7/7eb6fd50-eb52-11ec-9c3b-83765024aa2d.graphml b/graph/incidents_graphml/7/7eb6fd50-eb52-11ec-9c3b-83765024aa2d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29d984bc819f102993e258a558cdd2a548964583
--- /dev/null
+++ b/graph/incidents_graphml/7/7eb6fd50-eb52-11ec-9c3b-83765024aa2d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.132
+ USER-0015-1922.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655150008
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7eb6fd50-eb52-11ec-9c3b-83765024aa2d
+
+
+
diff --git a/graph/incidents_graphml/7/7eb86a40-45bb-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/7/7eb86a40-45bb-11ee-853f-87a1872d184b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..533317edfc8d72ba03350bab6d757f0a2a422ba0
--- /dev/null
+++ b/graph/incidents_graphml/7/7eb86a40-45bb-11ee-853f-87a1872d184b.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.116
+ 100.64.24.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.117
+ USER-0015-1250.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.118
+ 100.64.24.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693238208
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7eb86a40-45bb-11ee-853f-87a1872d184b
+
+
+ INCIDENT_LINK
+ 1693238208
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7eb86a40-45bb-11ee-853f-87a1872d184b
+
+
+ INCIDENT_LINK
+ 1693238208
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7eb86a40-45bb-11ee-853f-87a1872d184b
+
+
+ INCIDENT_LINK
+ 1693238208
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7eb86a40-45bb-11ee-853f-87a1872d184b
+
+
+ INCIDENT_LINK
+ 1693238208
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7eb86a40-45bb-11ee-853f-87a1872d184b
+
+
+ INCIDENT_LINK
+ 1693238208
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7eb86a40-45bb-11ee-853f-87a1872d184b
+
+
+
diff --git a/graph/incidents_graphml/7/7ebc4760-5b9f-11ee-95ea-792d2008bff3.graphml b/graph/incidents_graphml/7/7ebc4760-5b9f-11ee-95ea-792d2008bff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48ccf31292ce4c9c2945c49d6305b1969d7e7d0f
--- /dev/null
+++ b/graph/incidents_graphml/7/7ebc4760-5b9f-11ee-95ea-792d2008bff3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.17.244
+ 172.25.17.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.203
+ 100.64.95.203
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695645107
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ebc4760-5b9f-11ee-95ea-792d2008bff3
+
+
+ INCIDENT_LINK
+ 1695645107
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ebc4760-5b9f-11ee-95ea-792d2008bff3
+
+
+
diff --git a/graph/incidents_graphml/7/7ec63c20-c054-11ed-96c1-674c48144fee.graphml b/graph/incidents_graphml/7/7ec63c20-c054-11ed-96c1-674c48144fee.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0af86e8a291be6ea309c0c35f8cb85c7167713aa
--- /dev/null
+++ b/graph/incidents_graphml/7/7ec63c20-c054-11ed-96c1-674c48144fee.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.235
+ 100.64.69.235
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ INCIDENT_LINK
+ 1678570465
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ 7ec63c20-c054-11ed-96c1-674c48144fee
+
+
+
diff --git a/graph/incidents_graphml/7/7edbb190-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7edbb190-1617-11ee-a9fc-9ffb4847312b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c9e3e2f6f849605bad576214bef294c4e8914cf
--- /dev/null
+++ b/graph/incidents_graphml/7/7edbb190-1617-11ee-a9fc-9ffb4847312b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.209
+ 100.64.35.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000066
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7edbb190-1617-11ee-a9fc-9ffb4847312b
+
+
+
diff --git a/graph/incidents_graphml/7/7edc88d0-0c3b-11ee-954b-d57838b91a61.graphml b/graph/incidents_graphml/7/7edc88d0-0c3b-11ee-954b-d57838b91a61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a35e5def18edae8b9cf4a5d55558599b3366f538
--- /dev/null
+++ b/graph/incidents_graphml/7/7edc88d0-0c3b-11ee-954b-d57838b91a61.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.3
+ 100.64.25.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686916016
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7edc88d0-0c3b-11ee-954b-d57838b91a61
+
+
+ INCIDENT_LINK
+ 1686916016
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7edc88d0-0c3b-11ee-954b-d57838b91a61
+
+
+
diff --git a/graph/incidents_graphml/7/7eea4470-0c3b-11ee-954b-d57838b91a61.graphml b/graph/incidents_graphml/7/7eea4470-0c3b-11ee-954b-d57838b91a61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..358e69dbb0740de61b4e79c0e9e0737d6c6c06c5
--- /dev/null
+++ b/graph/incidents_graphml/7/7eea4470-0c3b-11ee-954b-d57838b91a61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.3
+ 100.64.25.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686916016
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7eea4470-0c3b-11ee-954b-d57838b91a61
+
+
+
diff --git a/graph/incidents_graphml/7/7eea9610-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7eea9610-51a9-11ee-8616-91cf6f807a5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..069c96f4b5903bc02f1b27349a50e78fb59b3e5e
--- /dev/null
+++ b/graph/incidents_graphml/7/7eea9610-51a9-11ee-8616-91cf6f807a5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.127
+ 100.64.38.127
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694549891
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7eea9610-51a9-11ee-8616-91cf6f807a5f
+
+
+
diff --git a/graph/incidents_graphml/7/7ef1e760-b68d-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/7/7ef1e760-b68d-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9490c7f6c1110ca52475e5d89b224d14bedd5674
--- /dev/null
+++ b/graph/incidents_graphml/7/7ef1e760-b68d-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,207 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.79
+ 100.64.87.79
+ ["Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.238.61
+ 172.30.238.61
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.44
+ 100.64.13.44
+ ["Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.80
+ 100.64.87.80
+ ["Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.173
+ 100.64.47.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.859375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.81
+ 100.64.87.81
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677495435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677495435
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/7/7ef8d680-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7ef8d680-1617-11ee-a9fc-9ffb4847312b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b7c9f68a7993ac51c5badc346c6fb4610f5fc5f
--- /dev/null
+++ b/graph/incidents_graphml/7/7ef8d680-1617-11ee-a9fc-9ffb4847312b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.209
+ 100.64.35.209
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000066
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ef8d680-1617-11ee-a9fc-9ffb4847312b
+
+
+
diff --git a/graph/incidents_graphml/7/7efa2670-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7efa2670-51a9-11ee-8616-91cf6f807a5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e02aa5971f48fc09c5da97d845240bdb2408e96
--- /dev/null
+++ b/graph/incidents_graphml/7/7efa2670-51a9-11ee-8616-91cf6f807a5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.127
+ 100.64.38.127
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694549891
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7efa2670-51a9-11ee-8616-91cf6f807a5f
+
+
+
diff --git a/graph/incidents_graphml/7/7efb7410-23a1-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/7/7efb7410-23a1-11ef-8910-2ffbcbe646c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f604f2cd9f633cbea66db383b89281d83626084
--- /dev/null
+++ b/graph/incidents_graphml/7/7efb7410-23a1-11ef-8910-2ffbcbe646c0.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.112
+ 100.64.16.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.99
+ 100.64.20.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.100
+ 100.64.20.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.181
+ 100.64.17.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.101
+ 100.64.20.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.102
+ 100.64.20.102
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.103
+ 100.64.20.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.104
+ 100.64.20.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.105
+ 100.64.20.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.106
+ 100.64.20.106
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.107
+ 100.64.20.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.108
+ 100.64.20.108
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.109
+ 100.64.20.109
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.110
+ 100.64.20.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.111
+ 100.64.20.111
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.112
+ 100.64.20.112
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.113
+ 100.64.20.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.85
+ 100.64.11.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636199
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7efb7410-23a1-11ef-8910-2ffbcbe646c0
+
+
+
diff --git a/graph/incidents_graphml/7/7f083030-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7f083030-51a9-11ee-8616-91cf6f807a5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e1b6af557886278e537c2616ebf30f3ffe0b714
--- /dev/null
+++ b/graph/incidents_graphml/7/7f083030-51a9-11ee-8616-91cf6f807a5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.129
+ 100.64.38.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694549891
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f083030-51a9-11ee-8616-91cf6f807a5f
+
+
+
diff --git a/graph/incidents_graphml/7/7f0dc2b0-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7f0dc2b0-3553-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9b25ef94efd957feb056d9ad71268a80f43af08
--- /dev/null
+++ b/graph/incidents_graphml/7/7f0dc2b0-3553-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.133
+ 100.64.23.133
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691434322
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f0dc2b0-3553-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/7/7f0ff2c0-eb52-11ec-9c3b-83765024aa2d.graphml b/graph/incidents_graphml/7/7f0ff2c0-eb52-11ec-9c3b-83765024aa2d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c596102eb56c3e6b2bbe8c50a51bc1fe561e0db
--- /dev/null
+++ b/graph/incidents_graphml/7/7f0ff2c0-eb52-11ec-9c3b-83765024aa2d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.132
+ USER-0015-1922.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655150009
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f0ff2c0-eb52-11ec-9c3b-83765024aa2d
+
+
+
diff --git a/graph/incidents_graphml/7/7f1e5040-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7f1e5040-51a9-11ee-8616-91cf6f807a5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb0347d534037b4a6f4a22b2ec0f4fd5e6e94583
--- /dev/null
+++ b/graph/incidents_graphml/7/7f1e5040-51a9-11ee-8616-91cf6f807a5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.129
+ 100.64.38.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694549891
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f1e5040-51a9-11ee-8616-91cf6f807a5f
+
+
+
diff --git a/graph/incidents_graphml/7/7f1e86f0-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7f1e86f0-1617-11ee-a9fc-9ffb4847312b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b02a7855612e9e0235ff5ff1f7c7dd29d8bcd292
--- /dev/null
+++ b/graph/incidents_graphml/7/7f1e86f0-1617-11ee-a9fc-9ffb4847312b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.211
+ 100.64.35.211
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000066
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f1e86f0-1617-11ee-a9fc-9ffb4847312b
+
+
+
diff --git a/graph/incidents_graphml/7/7f255ac0-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7f255ac0-8462-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87045f283729984fcb696e5e790700240d2104dc
--- /dev/null
+++ b/graph/incidents_graphml/7/7f255ac0-8462-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.178
+ 100.64.51.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700126907
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f255ac0-8462-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/7/7f2cf640-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7f2cf640-51a9-11ee-8616-91cf6f807a5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34fc8710a345ce4a382a435de993968b66bbfd81
--- /dev/null
+++ b/graph/incidents_graphml/7/7f2cf640-51a9-11ee-8616-91cf6f807a5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.131
+ 100.64.38.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694549892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f2cf640-51a9-11ee-8616-91cf6f807a5f
+
+
+
diff --git a/graph/incidents_graphml/7/7f32d140-0a46-11ef-8e53-fb0f959aa93f.graphml b/graph/incidents_graphml/7/7f32d140-0a46-11ef-8e53-fb0f959aa93f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72ddfab01f00ad91ac58a6d3db20590b4402ecbb
--- /dev/null
+++ b/graph/incidents_graphml/7/7f32d140-0a46-11ef-8e53-fb0f959aa93f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.161
+ 100.64.17.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714848337
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f32d140-0a46-11ef-8e53-fb0f959aa93f
+
+
+
diff --git a/graph/incidents_graphml/7/7f36e6f0-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7f36e6f0-8462-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15b67476ae5fe01ba6661d698297bbb3097534e5
--- /dev/null
+++ b/graph/incidents_graphml/7/7f36e6f0-8462-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.178
+ 100.64.51.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700126907
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f36e6f0-8462-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/7/7f3b45f0-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7f3b45f0-592f-11ee-a8a5-b59feb9cfe2c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee2b935189142b4711f5eb5cab12841cc80830d7
--- /dev/null
+++ b/graph/incidents_graphml/7/7f3b45f0-592f-11ee-a8a5-b59feb9cfe2c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.126
+ 100.64.64.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695377102
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f3b45f0-592f-11ee-a8a5-b59feb9cfe2c
+
+
+
diff --git a/graph/incidents_graphml/7/7f3d80a0-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7f3d80a0-1617-11ee-a9fc-9ffb4847312b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1fa47556c328f81d329b2c854f627561b96d0182
--- /dev/null
+++ b/graph/incidents_graphml/7/7f3d80a0-1617-11ee-a9fc-9ffb4847312b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.211
+ 100.64.35.211
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000067
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f3d80a0-1617-11ee-a9fc-9ffb4847312b
+
+
+
diff --git a/graph/incidents_graphml/7/7f3dbf20-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7f3dbf20-51a9-11ee-8616-91cf6f807a5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d1ec629b5ca5d052c61dbf4c761edd498abaa51
--- /dev/null
+++ b/graph/incidents_graphml/7/7f3dbf20-51a9-11ee-8616-91cf6f807a5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.131
+ 100.64.38.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694549892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f3dbf20-51a9-11ee-8616-91cf6f807a5f
+
+
+
diff --git a/graph/incidents_graphml/7/7f439a20-0a46-11ef-8e53-fb0f959aa93f.graphml b/graph/incidents_graphml/7/7f439a20-0a46-11ef-8e53-fb0f959aa93f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8dc247bf298e8b517441c7f99be64c24710c9ee3
--- /dev/null
+++ b/graph/incidents_graphml/7/7f439a20-0a46-11ef-8e53-fb0f959aa93f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.161
+ 100.64.17.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714848337
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f439a20-0a46-11ef-8e53-fb0f959aa93f
+
+
+
diff --git a/graph/incidents_graphml/7/7f44f570-d773-11ed-b131-97a6b3859c17.graphml b/graph/incidents_graphml/7/7f44f570-d773-11ed-b131-97a6b3859c17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a4f2d8fec0c24cc6583f47d9cf5d0e4202d3f50
--- /dev/null
+++ b/graph/incidents_graphml/7/7f44f570-d773-11ed-b131-97a6b3859c17.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.11
+ 100.64.17.11
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.12
+ 100.64.17.12
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1681112657
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f44f570-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112657
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f44f570-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112657
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f44f570-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112657
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f44f570-d773-11ed-b131-97a6b3859c17
+
+
+
diff --git a/graph/incidents_graphml/7/7f4dc3f0-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f4dc3f0-1fe8-11ed-98ff-21bdae0ea557.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f0b894e10ed45611bd0db012d2f5db5ead64db0c
--- /dev/null
+++ b/graph/incidents_graphml/7/7f4dc3f0-1fe8-11ed-98ff-21bdae0ea557.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.105
+ 100.64.73.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f4dc3f0-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f4dc3f0-1fe8-11ed-98ff-21bdae0ea557
+
+
+
diff --git a/graph/incidents_graphml/7/7f4dd8f0-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7f4dd8f0-3553-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7aa541fbf1dee8cdd5918643fb568673519a166
--- /dev/null
+++ b/graph/incidents_graphml/7/7f4dd8f0-3553-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.133
+ 100.64.23.133
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691434323
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f4dd8f0-3553-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/7/7f520e50-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7f520e50-0c38-11ee-9256-6d0394834f57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d138a26d8ebb9cf75d64b1eb020c4b2a3a7cf51
--- /dev/null
+++ b/graph/incidents_graphml/7/7f520e50-0c38-11ee-9256-6d0394834f57.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.115
+ 100.64.33.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.18
+ 100.64.4.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.83125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.92
+ 100.64.36.92
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.93
+ 100.64.36.93
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.225
+ 100.64.34.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.94
+ 100.64.36.94
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f520e50-0c38-11ee-9256-6d0394834f57
+
+
+
diff --git a/graph/incidents_graphml/7/7f58d010-63a3-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/7/7f58d010-63a3-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b03c1bde109dcace55ed01060696ad2c2e7fc8d0
--- /dev/null
+++ b/graph/incidents_graphml/7/7f58d010-63a3-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.43
+ 100.64.9.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696526436
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f58d010-63a3-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/7/7f5d0630-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f5d0630-1fe8-11ed-98ff-21bdae0ea557.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98cfc6f723de0377a8a3edd9b912e967c7cc735e
--- /dev/null
+++ b/graph/incidents_graphml/7/7f5d0630-1fe8-11ed-98ff-21bdae0ea557.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.161
+ 100.64.72.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.254
+ 100.64.78.254
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.255
+ 100.64.78.255
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.1
+ 100.64.79.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f5d0630-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f5d0630-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f5d0630-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f5d0630-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f5d0630-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f5d0630-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f5d0630-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f5d0630-1fe8-11ed-98ff-21bdae0ea557
+
+
+
diff --git a/graph/incidents_graphml/7/7f63e400-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f63e400-1fe8-11ed-98ff-21bdae0ea557.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..574d5a47c406db356b5f467fc41e356de90f63a1
--- /dev/null
+++ b/graph/incidents_graphml/7/7f63e400-1fe8-11ed-98ff-21bdae0ea557.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.21.26.128
+ 10.21.26.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.1
+ 100.64.79.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 10.81.190.183
+ 10.81.190.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f63e400-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f63e400-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f63e400-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f63e400-1fe8-11ed-98ff-21bdae0ea557
+
+
+
diff --git a/graph/incidents_graphml/7/7f66ced0-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7f66ced0-0c38-11ee-9256-6d0394834f57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e34aeedb6490ae4d558dbaf6dbbf92bf9eef30b
--- /dev/null
+++ b/graph/incidents_graphml/7/7f66ced0-0c38-11ee-9256-6d0394834f57.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.98
+ 100.64.36.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.93
+ 100.64.35.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.99
+ 100.64.36.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.100
+ 100.64.36.100
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f66ced0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f66ced0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f66ced0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f66ced0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f66ced0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f66ced0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f66ced0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f66ced0-0c38-11ee-9256-6d0394834f57
+
+
+
diff --git a/graph/incidents_graphml/7/7f6850d0-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f6850d0-1fe8-11ed-98ff-21bdae0ea557.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..624aeda4af8707a9985650bb8414c1949642ba53
--- /dev/null
+++ b/graph/incidents_graphml/7/7f6850d0-1fe8-11ed-98ff-21bdae0ea557.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.153
+ 100.64.73.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f6850d0-1fe8-11ed-98ff-21bdae0ea557
+
+
+
diff --git a/graph/incidents_graphml/7/7f6c31c0-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7f6c31c0-1617-11ee-a9fc-9ffb4847312b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4edb29eaa065b4a3556214cae2a5b1bf7b8e8409
--- /dev/null
+++ b/graph/incidents_graphml/7/7f6c31c0-1617-11ee-a9fc-9ffb4847312b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.192
+ 100.64.14.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000067
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f6c31c0-1617-11ee-a9fc-9ffb4847312b
+
+
+
diff --git a/graph/incidents_graphml/7/7f73e990-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f73e990-1fe8-11ed-98ff-21bdae0ea557.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1fe0d62c9647d05f1bd82693c380f8309fbb683d
--- /dev/null
+++ b/graph/incidents_graphml/7/7f73e990-1fe8-11ed-98ff-21bdae0ea557.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.153
+ 100.64.73.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f73e990-1fe8-11ed-98ff-21bdae0ea557
+
+
+
diff --git a/graph/incidents_graphml/7/7f792420-7c1f-11ee-8eb9-57773318f728.graphml b/graph/incidents_graphml/7/7f792420-7c1f-11ee-8eb9-57773318f728.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a15e332ec2acaaaa344c8ae379ecd342ef54f421
--- /dev/null
+++ b/graph/incidents_graphml/7/7f792420-7c1f-11ee-8eb9-57773318f728.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.158
+ 100.64.35.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699218522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f792420-7c1f-11ee-8eb9-57773318f728
+
+
+
diff --git a/graph/incidents_graphml/7/7f797db0-23a1-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/7/7f797db0-23a1-11ef-8910-2ffbcbe646c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f0ee262192215c17f2f4d8b595233e19200dc7f
--- /dev/null
+++ b/graph/incidents_graphml/7/7f797db0-23a1-11ef-8910-2ffbcbe646c0.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.133
+ 100.64.20.133
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.240
+ 100.64.9.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.134
+ 100.64.20.134
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.135
+ 100.64.20.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.45
+ 100.64.15.45
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.136
+ 100.64.20.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.20.137
+ 100.64.20.137
+ []
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.20.138
+ 100.64.20.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.63
+ 100.64.8.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.20.139
+ 100.64.20.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.140
+ 100.64.20.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.141
+ 100.64.20.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.142
+ 100.64.20.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.143
+ 100.64.20.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.144
+ 100.64.20.144
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+ INCIDENT_LINK
+ 1717636200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f797db0-23a1-11ef-8910-2ffbcbe646c0
+
+
+
diff --git a/graph/incidents_graphml/7/7f79b5f0-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f79b5f0-1fe8-11ed-98ff-21bdae0ea557.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d0d4ad5bb71a2d2532f21e22bb0323224f3f9e7
--- /dev/null
+++ b/graph/incidents_graphml/7/7f79b5f0-1fe8-11ed-98ff-21bdae0ea557.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.253
+ 100.64.78.253
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660931894
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f79b5f0-1fe8-11ed-98ff-21bdae0ea557
+
+
+
diff --git a/graph/incidents_graphml/7/7f7cb8b0-52c1-11ee-92d3-651405d7002c.graphml b/graph/incidents_graphml/7/7f7cb8b0-52c1-11ee-92d3-651405d7002c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec1500754c0d7987ee2814a464303e7c057ee393
--- /dev/null
+++ b/graph/incidents_graphml/7/7f7cb8b0-52c1-11ee-92d3-651405d7002c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.173
+ 100.64.8.173
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694670151
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f7cb8b0-52c1-11ee-92d3-651405d7002c
+
+
+
diff --git a/graph/incidents_graphml/7/7f7d5a90-eb52-11ec-9c3b-83765024aa2d.graphml b/graph/incidents_graphml/7/7f7d5a90-eb52-11ec-9c3b-83765024aa2d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f24c83c9768988a7117e9c07cc6d47ac30027b84
--- /dev/null
+++ b/graph/incidents_graphml/7/7f7d5a90-eb52-11ec-9c3b-83765024aa2d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.140
+ USER-0015-1923.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.25
+ USER-0015-1893.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655150010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f7d5a90-eb52-11ec-9c3b-83765024aa2d
+
+
+
diff --git a/graph/incidents_graphml/7/7f7e2760-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7f7e2760-0c38-11ee-9256-6d0394834f57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48edea6250eb3fd3eef4444b212e57a73b7d9f16
--- /dev/null
+++ b/graph/incidents_graphml/7/7f7e2760-0c38-11ee-9256-6d0394834f57.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.104
+ USER-0015-1307.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.105
+ 100.64.36.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.106
+ 100.64.36.106
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.107
+ 100.64.36.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f7e2760-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f7e2760-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f7e2760-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f7e2760-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f7e2760-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f7e2760-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f7e2760-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f7e2760-0c38-11ee-9256-6d0394834f57
+
+
+
diff --git a/graph/incidents_graphml/7/7f828f90-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f828f90-1fe8-11ed-98ff-21bdae0ea557.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1690c6272013e47a748a3beabba785b9db80c610
--- /dev/null
+++ b/graph/incidents_graphml/7/7f828f90-1fe8-11ed-98ff-21bdae0ea557.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.253
+ 100.64.78.253
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660931895
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f828f90-1fe8-11ed-98ff-21bdae0ea557
+
+
+
diff --git a/graph/incidents_graphml/7/7f87bfb0-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f87bfb0-1fe8-11ed-98ff-21bdae0ea557.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce95dae32128f95554f913848e9f2ac363ddb1cb
--- /dev/null
+++ b/graph/incidents_graphml/7/7f87bfb0-1fe8-11ed-98ff-21bdae0ea557.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.156
+ 100.64.71.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.25
+ 100.64.12.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.157
+ 100.64.71.157
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660931895
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f87bfb0-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931895
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f87bfb0-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931895
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f87bfb0-1fe8-11ed-98ff-21bdae0ea557
+
+
+ INCIDENT_LINK
+ 1660931895
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f87bfb0-1fe8-11ed-98ff-21bdae0ea557
+
+
+
diff --git a/graph/incidents_graphml/7/7f88db90-7c1f-11ee-8eb9-57773318f728.graphml b/graph/incidents_graphml/7/7f88db90-7c1f-11ee-8eb9-57773318f728.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dedf9b9c72255ef722c0cc24677ba6f35d8b2d16
--- /dev/null
+++ b/graph/incidents_graphml/7/7f88db90-7c1f-11ee-8eb9-57773318f728.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.158
+ 100.64.35.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699218522
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7f88db90-7c1f-11ee-8eb9-57773318f728
+
+
+
diff --git a/graph/incidents_graphml/7/7f8f7130-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7f8f7130-1617-11ee-a9fc-9ffb4847312b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b95937f61d9bc0d823c890b40cad57830476134
--- /dev/null
+++ b/graph/incidents_graphml/7/7f8f7130-1617-11ee-a9fc-9ffb4847312b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.114
+ USER-0015-1204.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000067
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7f8f7130-1617-11ee-a9fc-9ffb4847312b
+
+
+
diff --git a/graph/incidents_graphml/7/7f8faef0-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f8faef0-1fe8-11ed-98ff-21bdae0ea557.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..692d379931675bbbb9623ee4573c13161fc2b6fa
--- /dev/null
+++ b/graph/incidents_graphml/7/7f8faef0-1fe8-11ed-98ff-21bdae0ea557.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.124
+ USER-0015-1799.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660931895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f8faef0-1fe8-11ed-98ff-21bdae0ea557
+
+
+
diff --git a/graph/incidents_graphml/7/7f995080-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7f995080-0c38-11ee-9256-6d0394834f57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6320293127489cb66ed8ac147d599111826cde91
--- /dev/null
+++ b/graph/incidents_graphml/7/7f995080-0c38-11ee-9256-6d0394834f57.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.112
+ 100.64.36.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f995080-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914729
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7f995080-0c38-11ee-9256-6d0394834f57
+
+
+
diff --git a/graph/incidents_graphml/7/7f9d6190-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7f9d6190-53e9-11ee-bfe4-c36dfe104f88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b03aaa6ab3110116c6a5b96844b1f4dce9dc8465
--- /dev/null
+++ b/graph/incidents_graphml/7/7f9d6190-53e9-11ee-bfe4-c36dfe104f88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.58
+ USER-0015-2171.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694797282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7f9d6190-53e9-11ee-bfe4-c36dfe104f88
+
+
+
diff --git a/graph/incidents_graphml/7/7fae5180-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7fae5180-53e9-11ee-bfe4-c36dfe104f88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0454948b83568863a75692d7b5899be77dab2adf
--- /dev/null
+++ b/graph/incidents_graphml/7/7fae5180-53e9-11ee-bfe4-c36dfe104f88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.54.58
+ USER-0015-2171.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694797283
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7fae5180-53e9-11ee-bfe4-c36dfe104f88
+
+
+
diff --git a/graph/incidents_graphml/7/7fbb70e0-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7fbb70e0-53e9-11ee-bfe4-c36dfe104f88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..532b3f2acdcf730abbac50b05798c0525269c62f
--- /dev/null
+++ b/graph/incidents_graphml/7/7fbb70e0-53e9-11ee-bfe4-c36dfe104f88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.196
+ 100.64.31.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694797283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7fbb70e0-53e9-11ee-bfe4-c36dfe104f88
+
+
+
diff --git a/graph/incidents_graphml/7/7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/7/7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..defaf184fcd563f0e37337f25e3b5c28e9559577
--- /dev/null
+++ b/graph/incidents_graphml/7/7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.29
+ 100.64.82.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Meraki"]
+
+
+ HOST
+ 100.64.71.237
+ 100.64.71.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.233
+ 100.64.71.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689246896
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246896
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246896
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246896
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b
+
+
+
diff --git a/graph/incidents_graphml/7/7fc8be30-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7fc8be30-26c1-11ee-87ad-dd3f4232b94e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09f90b85d032e2231ca8c406103d6d0f641f5e4b
--- /dev/null
+++ b/graph/incidents_graphml/7/7fc8be30-26c1-11ee-87ad-dd3f4232b94e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689832301
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 7fc8be30-26c1-11ee-87ad-dd3f4232b94e
+
+
+
diff --git a/graph/incidents_graphml/7/7fc9c8c0-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7fc9c8c0-53e9-11ee-bfe4-c36dfe104f88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad9504fbaacf8680c76e292e0587a76988c3f494
--- /dev/null
+++ b/graph/incidents_graphml/7/7fc9c8c0-53e9-11ee-bfe4-c36dfe104f88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.31.196
+ 100.64.31.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694797283
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7fc9c8c0-53e9-11ee-bfe4-c36dfe104f88
+
+
+
diff --git a/graph/incidents_graphml/7/7fd6e6a0-52c1-11ee-92d3-651405d7002c.graphml b/graph/incidents_graphml/7/7fd6e6a0-52c1-11ee-92d3-651405d7002c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10720e3cbda1586bd8a0d049cacd5fa548ca058d
--- /dev/null
+++ b/graph/incidents_graphml/7/7fd6e6a0-52c1-11ee-92d3-651405d7002c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.211
+ 100.64.13.211
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7fd6e6a0-52c1-11ee-92d3-651405d7002c
+
+
+
diff --git a/graph/incidents_graphml/7/7fdbd100-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7fdbd100-26c1-11ee-87ad-dd3f4232b94e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9f23e17a7b78b540d5196d6e8801ea058de3c58
--- /dev/null
+++ b/graph/incidents_graphml/7/7fdbd100-26c1-11ee-87ad-dd3f4232b94e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689832301
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7fdbd100-26c1-11ee-87ad-dd3f4232b94e
+
+
+
diff --git a/graph/incidents_graphml/7/7fe58ca0-52c1-11ee-92d3-651405d7002c.graphml b/graph/incidents_graphml/7/7fe58ca0-52c1-11ee-92d3-651405d7002c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c198935395e694fc7266747f617b57f9cade4c7
--- /dev/null
+++ b/graph/incidents_graphml/7/7fe58ca0-52c1-11ee-92d3-651405d7002c.graphml
@@ -0,0 +1,833 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.213
+ 100.64.13.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.214
+ 100.64.13.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.215
+ 100.64.13.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.216
+ 100.64.13.216
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.16
+ 100.64.9.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.217
+ 100.64.13.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.218
+ 100.64.13.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.219
+ 100.64.13.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.220
+ 100.64.13.220
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.140
+ 100.64.5.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.221
+ 100.64.13.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.222
+ 100.64.13.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.223
+ 100.64.13.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.232
+ 100.64.9.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.231
+ 100.64.10.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.224
+ 100.64.13.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.225
+ 100.64.13.225
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 7fe58ca0-52c1-11ee-92d3-651405d7002c
+
+
+
diff --git a/graph/incidents_graphml/7/7ff4b580-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7ff4b580-7a9a-11ee-bfc5-c9e889c56814.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03327b6cdf6320acedce3646fcc0993084b1d057
--- /dev/null
+++ b/graph/incidents_graphml/7/7ff4b580-7a9a-11ee-bfc5-c9e889c56814.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.179
+ 100.64.62.179
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699051448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 7ff4b580-7a9a-11ee-bfc5-c9e889c56814
+
+
+
diff --git a/graph/incidents_graphml/7/7ff54410-52c1-11ee-92d3-651405d7002c.graphml b/graph/incidents_graphml/7/7ff54410-52c1-11ee-92d3-651405d7002c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af16e55e33b5e97b2f50636f914db540c6b56556
--- /dev/null
+++ b/graph/incidents_graphml/7/7ff54410-52c1-11ee-92d3-651405d7002c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.213
+ 100.64.13.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694670152
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 7ff54410-52c1-11ee-92d3-651405d7002c
+
+
+
diff --git a/graph/incidents_graphml/8/80087930-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/80087930-0dfd-11ee-a017-1387949db3a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ad1756d8a609d8ef2e21954b8e16cf0b772f64b
--- /dev/null
+++ b/graph/incidents_graphml/8/80087930-0dfd-11ee-a017-1387949db3a7.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687109292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80087930-0dfd-11ee-a017-1387949db3a7
+
+
+ INCIDENT_LINK
+ 1687109292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80087930-0dfd-11ee-a017-1387949db3a7
+
+
+ INCIDENT_LINK
+ 1687109292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80087930-0dfd-11ee-a017-1387949db3a7
+
+
+
diff --git a/graph/incidents_graphml/8/8011cf10-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/8011cf10-4ed7-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f8a8a2daac4d99d394bff68cf615ef3d8db7e12
--- /dev/null
+++ b/graph/incidents_graphml/8/8011cf10-4ed7-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.78
+ 100.64.57.78
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694239796
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8011cf10-4ed7-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/8/801816b0-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/8/801816b0-26c1-11ee-87ad-dd3f4232b94e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cf5c730e9d5b929cb7afcad5739cc50f43eab1f
--- /dev/null
+++ b/graph/incidents_graphml/8/801816b0-26c1-11ee-87ad-dd3f4232b94e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.167
+ 100.64.41.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689832301
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 801816b0-26c1-11ee-87ad-dd3f4232b94e
+
+
+
diff --git a/graph/incidents_graphml/8/801a65f0-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/8/801a65f0-7a9a-11ee-bfc5-c9e889c56814.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ddcbce1a522e6eaa7376937dd3dc2c2fc81a7cba
--- /dev/null
+++ b/graph/incidents_graphml/8/801a65f0-7a9a-11ee-bfc5-c9e889c56814.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.104
+ USER-0015-1241.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699051448
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 801a65f0-7a9a-11ee-bfc5-c9e889c56814
+
+
+
diff --git a/graph/incidents_graphml/8/80233430-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80233430-4ed7-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcef18782e175718788be4e0336bd58f4e4e3af2
--- /dev/null
+++ b/graph/incidents_graphml/8/80233430-4ed7-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.78
+ 100.64.57.78
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694239797
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80233430-4ed7-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/8/80246130-1114-11ee-9311-e18c92d5b3d3.graphml b/graph/incidents_graphml/8/80246130-1114-11ee-9311-e18c92d5b3d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55816684005163fc8723d2df5fd1298c1e959fea
--- /dev/null
+++ b/graph/incidents_graphml/8/80246130-1114-11ee-9311-e18c92d5b3d3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.226.203
+ 192.168.226.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.80.198
+ 100.64.80.198
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687449024
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80246130-1114-11ee-9311-e18c92d5b3d3
+
+
+ INCIDENT_LINK
+ 1687449024
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80246130-1114-11ee-9311-e18c92d5b3d3
+
+
+
diff --git a/graph/incidents_graphml/8/80280f20-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/80280f20-0dfd-11ee-a017-1387949db3a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbce9e224eec8876e72819a60dedf8f0e7438912
--- /dev/null
+++ b/graph/incidents_graphml/8/80280f20-0dfd-11ee-a017-1387949db3a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687109292
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 80280f20-0dfd-11ee-a017-1387949db3a7
+
+
+
diff --git a/graph/incidents_graphml/8/802b7850-2819-11ee-b06f-b17f5f626799.graphml b/graph/incidents_graphml/8/802b7850-2819-11ee-b06f-b17f5f626799.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52c12391dd4d622f58e16f0f4cca70fea58ff46b
--- /dev/null
+++ b/graph/incidents_graphml/8/802b7850-2819-11ee-b06f-b17f5f626799.graphml
@@ -0,0 +1,459 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.151
+ 100.64.39.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.13
+ 100.64.44.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.46
+ 100.64.21.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.109
+ 100.64.8.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.250
+ 100.64.13.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.119
+ 100.64.65.119
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.120
+ 100.64.65.120
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.121
+ 100.64.65.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.73
+ 100.64.7.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.75
+ 100.64.7.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+ INCIDENT_LINK
+ 1689980048
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802b7850-2819-11ee-b06f-b17f5f626799
+
+
+
diff --git a/graph/incidents_graphml/8/802d6e10-e2ab-11ee-bd91-33ef6009cb64.graphml b/graph/incidents_graphml/8/802d6e10-e2ab-11ee-bd91-33ef6009cb64.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d18a505d7622d2e8446573079a10ad4ee0b2f30e
--- /dev/null
+++ b/graph/incidents_graphml/8/802d6e10-e2ab-11ee-bd91-33ef6009cb64.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.200
+ 100.64.11.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 802d6e10-e2ab-11ee-bd91-33ef6009cb64
+
+
+
diff --git a/graph/incidents_graphml/8/802f4830-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/8/802f4830-26c1-11ee-87ad-dd3f4232b94e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61740bffdf38583cb486534f83856c41f3ca0cf8
--- /dev/null
+++ b/graph/incidents_graphml/8/802f4830-26c1-11ee-87ad-dd3f4232b94e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.167
+ 100.64.41.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689832301
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 802f4830-26c1-11ee-87ad-dd3f4232b94e
+
+
+
diff --git a/graph/incidents_graphml/8/803ecb70-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/803ecb70-0dfd-11ee-a017-1387949db3a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..789396d2e46ee4bb8bbfb16654a15a54a8b68295
--- /dev/null
+++ b/graph/incidents_graphml/8/803ecb70-0dfd-11ee-a017-1387949db3a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.205
+ 100.64.67.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687109292
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 803ecb70-0dfd-11ee-a017-1387949db3a7
+
+
+
diff --git a/graph/incidents_graphml/8/80404f40-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/8/80404f40-3553-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc713156bb3d183aec59dd91d8abad630fb6817a
--- /dev/null
+++ b/graph/incidents_graphml/8/80404f40-3553-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.206
+ 100.64.6.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691434324
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 80404f40-3553-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/8/8041dcd0-fb32-11ed-9187-67e5cded34a2.graphml b/graph/incidents_graphml/8/8041dcd0-fb32-11ed-9187-67e5cded34a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..de52f872137be904356f24a831e72555d6d696a6
--- /dev/null
+++ b/graph/incidents_graphml/8/8041dcd0-fb32-11ed-9187-67e5cded34a2.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.21.75
+ 100.64.21.75
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.60.156
+ 100.64.60.156
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"]
+
+
+ INCIDENT_LINK
+ 1685042983
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ 8041dcd0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042983
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ 8041dcd0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042983
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ 8041dcd0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042983
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ 8041dcd0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042983
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ 8041dcd0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042983
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ 8041dcd0-fb32-11ed-9187-67e5cded34a2
+
+
+
diff --git a/graph/incidents_graphml/8/80427cb0-e2ab-11ee-bd91-33ef6009cb64.graphml b/graph/incidents_graphml/8/80427cb0-e2ab-11ee-bd91-33ef6009cb64.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d458dcb4fc71fa24ec8a3cdd6dbbff9b9ed82c9
--- /dev/null
+++ b/graph/incidents_graphml/8/80427cb0-e2ab-11ee-bd91-33ef6009cb64.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.200
+ 100.64.11.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 80427cb0-e2ab-11ee-bd91-33ef6009cb64
+
+
+
diff --git a/graph/incidents_graphml/8/804e9bc0-3582-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/8/804e9bc0-3582-11ee-a01e-93ea9ac7eb39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8b92e7d6c05fb962c746ff8410b804c4e561ab4
--- /dev/null
+++ b/graph/incidents_graphml/8/804e9bc0-3582-11ee-a01e-93ea9ac7eb39.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.45
+ 100.64.39.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691454511
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 804e9bc0-3582-11ee-a01e-93ea9ac7eb39
+
+
+
diff --git a/graph/incidents_graphml/8/80534590-e2ab-11ee-bd91-33ef6009cb64.graphml b/graph/incidents_graphml/8/80534590-e2ab-11ee-bd91-33ef6009cb64.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..744b29421d9061954348c1eb41e81fb7da6095a5
--- /dev/null
+++ b/graph/incidents_graphml/8/80534590-e2ab-11ee-bd91-33ef6009cb64.graphml
@@ -0,0 +1,503 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.202
+ 100.64.11.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.203
+ 100.64.11.203
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.204
+ 100.64.11.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.205
+ 100.64.11.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.206
+ 100.64.11.206
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.207
+ 100.64.11.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.208
+ 100.64.11.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.209
+ 100.64.11.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.210
+ 100.64.11.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.211
+ 100.64.11.211
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80534590-e2ab-11ee-bd91-33ef6009cb64
+
+
+
diff --git a/graph/incidents_graphml/8/805cab40-0a46-11ef-8e53-fb0f959aa93f.graphml b/graph/incidents_graphml/8/805cab40-0a46-11ef-8e53-fb0f959aa93f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42c72e94a50be1873b8a8771f4769884eab4ee88
--- /dev/null
+++ b/graph/incidents_graphml/8/805cab40-0a46-11ef-8e53-fb0f959aa93f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.43
+ 100.64.33.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714848339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 805cab40-0a46-11ef-8e53-fb0f959aa93f
+
+
+
diff --git a/graph/incidents_graphml/8/805d9e10-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/805d9e10-0dfd-11ee-a017-1387949db3a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a976713e35fcbb24d4f76f7b8841fa2a9f3585ba
--- /dev/null
+++ b/graph/incidents_graphml/8/805d9e10-0dfd-11ee-a017-1387949db3a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.205
+ 100.64.67.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687109292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 805d9e10-0dfd-11ee-a017-1387949db3a7
+
+
+
diff --git a/graph/incidents_graphml/8/8060df80-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/8/8060df80-26c1-11ee-87ad-dd3f4232b94e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11bff7495d243de7a8e3fe39b1d9243fbde69188
--- /dev/null
+++ b/graph/incidents_graphml/8/8060df80-26c1-11ee-87ad-dd3f4232b94e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689832302
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 8060df80-26c1-11ee-87ad-dd3f4232b94e
+
+
+
diff --git a/graph/incidents_graphml/8/8067b7f0-e2ab-11ee-bd91-33ef6009cb64.graphml b/graph/incidents_graphml/8/8067b7f0-e2ab-11ee-bd91-33ef6009cb64.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bcd03d125bc30e288e090b8d1540538000fdb7e4
--- /dev/null
+++ b/graph/incidents_graphml/8/8067b7f0-e2ab-11ee-bd91-33ef6009cb64.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.202
+ 100.64.11.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710493671
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8067b7f0-e2ab-11ee-bd91-33ef6009cb64
+
+
+
diff --git a/graph/incidents_graphml/8/806eaca0-0a46-11ef-8e53-fb0f959aa93f.graphml b/graph/incidents_graphml/8/806eaca0-0a46-11ef-8e53-fb0f959aa93f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5bc4e28cea9223b84eb2326d5f15f28544e8498
--- /dev/null
+++ b/graph/incidents_graphml/8/806eaca0-0a46-11ef-8e53-fb0f959aa93f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.43
+ 100.64.33.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714848339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 806eaca0-0a46-11ef-8e53-fb0f959aa93f
+
+
+
diff --git a/graph/incidents_graphml/8/8088dc50-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/8/8088dc50-2ff5-11ee-b00f-c1ca007fb916.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa3339da3fb2aaa84d47a6826daeda979807b95d
--- /dev/null
+++ b/graph/incidents_graphml/8/8088dc50-2ff5-11ee-b00f-c1ca007fb916.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690844196
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8088dc50-2ff5-11ee-b00f-c1ca007fb916
+
+
+
diff --git a/graph/incidents_graphml/8/808aa370-35bb-11ee-95a2-5f9786093780.graphml b/graph/incidents_graphml/8/808aa370-35bb-11ee-95a2-5f9786093780.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66ec7dd2b75d015e68c52be7aa8d5da3119e09cd
--- /dev/null
+++ b/graph/incidents_graphml/8/808aa370-35bb-11ee-95a2-5f9786093780.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.142
+ 100.64.80.142
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.137
+ 100.64.74.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.143
+ 100.64.80.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1691478992
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 808aa370-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691478992
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 808aa370-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691478992
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 808aa370-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691478992
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 808aa370-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691478992
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 808aa370-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691478992
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 808aa370-35bb-11ee-95a2-5f9786093780
+
+
+
diff --git a/graph/incidents_graphml/8/808ddce0-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/808ddce0-4ed7-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..601d9fc7205de5e3f81664c80b116fb7414f1d99
--- /dev/null
+++ b/graph/incidents_graphml/8/808ddce0-4ed7-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.140
+ 100.64.37.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694239797
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 808ddce0-4ed7-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/8/808e6320-f51b-11ec-9c76-edb488c77bbc.graphml b/graph/incidents_graphml/8/808e6320-f51b-11ec-9c76-edb488c77bbc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33ba7746eb966442fe9123f5b9162b8058ecdce3
--- /dev/null
+++ b/graph/incidents_graphml/8/808e6320-f51b-11ec-9c76-edb488c77bbc.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.21
+ 100.64.16.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.72
+ USER-0015-1725.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656225901
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 808e6320-f51b-11ec-9c76-edb488c77bbc
+
+
+ INCIDENT_LINK
+ 1656225901
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 808e6320-f51b-11ec-9c76-edb488c77bbc
+
+
+
diff --git a/graph/incidents_graphml/8/808e6450-7211-11ee-bd8d-9bab1f3513c7.graphml b/graph/incidents_graphml/8/808e6450-7211-11ee-bd8d-9bab1f3513c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d40d23587d67bccb8f976e7f9fbed156ff1f512
--- /dev/null
+++ b/graph/incidents_graphml/8/808e6450-7211-11ee-bd8d-9bab1f3513c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.133
+ 100.64.58.133
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698112999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 808e6450-7211-11ee-bd8d-9bab1f3513c7
+
+
+
diff --git a/graph/incidents_graphml/8/80919830-3582-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/8/80919830-3582-11ee-a01e-93ea9ac7eb39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57d247c942937c41bca5477b623be94d035cebde
--- /dev/null
+++ b/graph/incidents_graphml/8/80919830-3582-11ee-a01e-93ea9ac7eb39.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.45
+ 100.64.39.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691454511
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 80919830-3582-11ee-a01e-93ea9ac7eb39
+
+
+
diff --git a/graph/incidents_graphml/8/8091aa90-1067-11ee-aaa6-7f821bc3777a.graphml b/graph/incidents_graphml/8/8091aa90-1067-11ee-aaa6-7f821bc3777a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1b30dcead39fccc05d2736ac12bcb36b3b0bced
--- /dev/null
+++ b/graph/incidents_graphml/8/8091aa90-1067-11ee-aaa6-7f821bc3777a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.4
+ 100.64.59.4
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687374722
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 8091aa90-1067-11ee-aaa6-7f821bc3777a
+
+
+
diff --git a/graph/incidents_graphml/8/809bdcc0-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/8/809bdcc0-3553-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1dfbcbfaf9f760c088247bc79f76eb037b4f362
--- /dev/null
+++ b/graph/incidents_graphml/8/809bdcc0-3553-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.206
+ 100.64.6.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691434325
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 809bdcc0-3553-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/8/80a101f0-7211-11ee-bd8d-9bab1f3513c7.graphml b/graph/incidents_graphml/8/80a101f0-7211-11ee-bd8d-9bab1f3513c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..615860b0a250a27e3c95b42985a83e2ea6f603b0
--- /dev/null
+++ b/graph/incidents_graphml/8/80a101f0-7211-11ee-bd8d-9bab1f3513c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.29
+ 100.64.12.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698112999
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 80a101f0-7211-11ee-bd8d-9bab1f3513c7
+
+
+
diff --git a/graph/incidents_graphml/8/80a8b7e0-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80a8b7e0-4ed7-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7dc3e15754bff26c2c58ecf51a23ac7e0bdee82
--- /dev/null
+++ b/graph/incidents_graphml/8/80a8b7e0-4ed7-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.80
+ 100.64.57.80
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694239797
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80a8b7e0-4ed7-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/8/80a97420-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/80a97420-0dfd-11ee-a017-1387949db3a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94b18a2a7d8dd44d0ff4bdbfe5bdffdf743f8500
--- /dev/null
+++ b/graph/incidents_graphml/8/80a97420-0dfd-11ee-a017-1387949db3a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.73
+ USER-0015-1490.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687109293
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 80a97420-0dfd-11ee-a017-1387949db3a7
+
+
+
diff --git a/graph/incidents_graphml/8/80aed450-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/8/80aed450-2122-11ee-9a61-05dd24aa353e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f7b25cb5da74f8565f54aba3c6e582313126551
--- /dev/null
+++ b/graph/incidents_graphml/8/80aed450-2122-11ee-9a61-05dd24aa353e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.128
+ 100.64.69.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1689214256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 80aed450-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 80aed450-2122-11ee-9a61-05dd24aa353e
+
+
+
diff --git a/graph/incidents_graphml/8/80b0ca60-1007-11ef-b866-697ee3663480.graphml b/graph/incidents_graphml/8/80b0ca60-1007-11ef-b866-697ee3663480.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b86dca0176737a5cb4a763d963dd919bebfedc12
--- /dev/null
+++ b/graph/incidents_graphml/8/80b0ca60-1007-11ef-b866-697ee3663480.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.103
+ 100.64.18.103
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715480988
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80b0ca60-1007-11ef-b866-697ee3663480
+
+
+
diff --git a/graph/incidents_graphml/8/80b6e8b0-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80b6e8b0-4ed7-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f262c51d8bc189024f8b77e43adb05e82078190
--- /dev/null
+++ b/graph/incidents_graphml/8/80b6e8b0-4ed7-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.80
+ 100.64.57.80
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694239798
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 80b6e8b0-4ed7-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/8/80c4a450-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80c4a450-4ed7-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b745fd49e722ce9ad0dc5211a101911eda611063
--- /dev/null
+++ b/graph/incidents_graphml/8/80c4a450-4ed7-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.120
+ 100.64.46.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694239798
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 80c4a450-4ed7-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/8/80c5d300-5b9f-11ee-95ea-792d2008bff3.graphml b/graph/incidents_graphml/8/80c5d300-5b9f-11ee-95ea-792d2008bff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab09a486dc020ac14cee4e238e285123e7a5e184
--- /dev/null
+++ b/graph/incidents_graphml/8/80c5d300-5b9f-11ee-95ea-792d2008bff3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.204
+ 100.64.95.204
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695645111
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 80c5d300-5b9f-11ee-95ea-792d2008bff3
+
+
+
diff --git a/graph/incidents_graphml/8/80ccdaa0-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/80ccdaa0-0dfd-11ee-a017-1387949db3a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7e50c13e3e7e325e2c896c629d25a36566feaf3
--- /dev/null
+++ b/graph/incidents_graphml/8/80ccdaa0-0dfd-11ee-a017-1387949db3a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.73
+ USER-0015-1490.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687109293
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 80ccdaa0-0dfd-11ee-a017-1387949db3a7
+
+
+
diff --git a/graph/incidents_graphml/8/80d2ae10-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80d2ae10-4ed7-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7770e54230d1a7739b030bd21d4ce5a8c372087e
--- /dev/null
+++ b/graph/incidents_graphml/8/80d2ae10-4ed7-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.120
+ 100.64.46.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694239798
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 80d2ae10-4ed7-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/8/80d5bc00-4dbe-11ee-b251-912537db6da9.graphml b/graph/incidents_graphml/8/80d5bc00-4dbe-11ee-b251-912537db6da9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba0439460cbe49787fab3c8eac9a9e964041da7d
--- /dev/null
+++ b/graph/incidents_graphml/8/80d5bc00-4dbe-11ee-b251-912537db6da9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.1
+ 100.64.70.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1694119109
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 80d5bc00-4dbe-11ee-b251-912537db6da9
+
+
+ INCIDENT_LINK
+ 1694119109
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 80d5bc00-4dbe-11ee-b251-912537db6da9
+
+
+
diff --git a/graph/incidents_graphml/8/80e34fe0-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80e34fe0-4ed7-11ee-b44c-ffbac85a0b7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83ca51a593699508aa4de44c8e944ba98d88f22a
--- /dev/null
+++ b/graph/incidents_graphml/8/80e34fe0-4ed7-11ee-b44c-ffbac85a0b7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.219
+ 100.64.17.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694239798
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 80e34fe0-4ed7-11ee-b44c-ffbac85a0b7c
+
+
+
diff --git a/graph/incidents_graphml/8/80ead590-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/8/80ead590-5f20-11ee-9598-b95b2a00646d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50207549fa05bad8709c63208dce1e34a5670178
--- /dev/null
+++ b/graph/incidents_graphml/8/80ead590-5f20-11ee-9598-b95b2a00646d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.21.172
+ USER-0015-1977.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696030370
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 80ead590-5f20-11ee-9598-b95b2a00646d
+
+
+
diff --git a/graph/incidents_graphml/8/80ee9370-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/80ee9370-0dfd-11ee-a017-1387949db3a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29610c95a1c3e0032a1a8315cd20186646f9a06a
--- /dev/null
+++ b/graph/incidents_graphml/8/80ee9370-0dfd-11ee-a017-1387949db3a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.68
+ 100.64.21.68
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687109293
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 80ee9370-0dfd-11ee-a017-1387949db3a7
+
+
+
diff --git a/graph/incidents_graphml/8/81072b80-0b98-11ef-bee4-2118ac552c06.graphml b/graph/incidents_graphml/8/81072b80-0b98-11ef-bee4-2118ac552c06.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e70d72e6e453b5e6adf0cfe245a0c69bda8d3e8d
--- /dev/null
+++ b/graph/incidents_graphml/8/81072b80-0b98-11ef-bee4-2118ac552c06.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.57
+ 100.64.38.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714993510
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 81072b80-0b98-11ef-bee4-2118ac552c06
+
+
+
diff --git a/graph/incidents_graphml/8/810f88f0-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/810f88f0-0dfd-11ee-a017-1387949db3a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..224d8e655abe2e21312d6e145dd4517235b05fc9
--- /dev/null
+++ b/graph/incidents_graphml/8/810f88f0-0dfd-11ee-a017-1387949db3a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.68
+ 100.64.21.68
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687109293
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 810f88f0-0dfd-11ee-a017-1387949db3a7
+
+
+
diff --git a/graph/incidents_graphml/8/811d21a0-fb32-11ed-9187-67e5cded34a2.graphml b/graph/incidents_graphml/8/811d21a0-fb32-11ed-9187-67e5cded34a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d8b02eaf07922c60546a46bb2c6fca52bddcfe1
--- /dev/null
+++ b/graph/incidents_graphml/8/811d21a0-fb32-11ed-9187-67e5cded34a2.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.28.242
+ 100.64.28.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","Azure Security","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.30.59
+ 100.64.30.59
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.8.78
+ 100.64.8.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.81015625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.220
+ 100.64.68.220
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.221
+ 100.64.68.221
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.222
+ 100.64.68.222
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.223
+ 100.64.68.223
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.18.74
+ 100.64.18.74
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ 0.6625
+ ["Precinct","Okta","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.224
+ 100.64.68.224
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042985
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 811d21a0-fb32-11ed-9187-67e5cded34a2
+
+
+
diff --git a/graph/incidents_graphml/8/81203ac0-dcd2-11ee-877f-c1ac29d0ce14.graphml b/graph/incidents_graphml/8/81203ac0-dcd2-11ee-877f-c1ac29d0ce14.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a69728ff6194bce91e83da9f06d65407bdc8b042
--- /dev/null
+++ b/graph/incidents_graphml/8/81203ac0-dcd2-11ee-877f-c1ac29d0ce14.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.61
+ 100.64.23.61
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709850716
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 81203ac0-dcd2-11ee-877f-c1ac29d0ce14
+
+
+
diff --git a/graph/incidents_graphml/8/812b1980-7211-11ee-bd8d-9bab1f3513c7.graphml b/graph/incidents_graphml/8/812b1980-7211-11ee-bd8d-9bab1f3513c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1dea29115ba531a4287eb198ce041d77ea58e32
--- /dev/null
+++ b/graph/incidents_graphml/8/812b1980-7211-11ee-bd8d-9bab1f3513c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.76
+ 100.64.18.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698113000
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 812b1980-7211-11ee-bd8d-9bab1f3513c7
+
+
+
diff --git a/graph/incidents_graphml/8/81393440-1007-11ef-b866-697ee3663480.graphml b/graph/incidents_graphml/8/81393440-1007-11ef-b866-697ee3663480.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c11b79bd2684cdc7c9081b2472f13bf3c9e59e2
--- /dev/null
+++ b/graph/incidents_graphml/8/81393440-1007-11ef-b866-697ee3663480.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.105
+ 100.64.18.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715480989
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 81393440-1007-11ef-b866-697ee3663480
+
+
+
diff --git a/graph/incidents_graphml/8/8139e690-7211-11ee-bd8d-9bab1f3513c7.graphml b/graph/incidents_graphml/8/8139e690-7211-11ee-bd8d-9bab1f3513c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f01414b832962e89cb1183c81d06c9162769281
--- /dev/null
+++ b/graph/incidents_graphml/8/8139e690-7211-11ee-bd8d-9bab1f3513c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.76
+ 100.64.18.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698113000
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 8139e690-7211-11ee-bd8d-9bab1f3513c7
+
+
+
diff --git a/graph/incidents_graphml/8/813b5e90-10ff-11ed-87b3-2f5c2a8265d8.graphml b/graph/incidents_graphml/8/813b5e90-10ff-11ed-87b3-2f5c2a8265d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4088aba4599c945ebcea40885bf54c45b792c173
--- /dev/null
+++ b/graph/incidents_graphml/8/813b5e90-10ff-11ed-87b3-2f5c2a8265d8.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.13
+ 100.64.39.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.119
+ 100.64.71.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.109
+ 100.64.1.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.22.229
+ 100.64.22.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.179
+ 100.64.71.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659292508
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 813b5e90-10ff-11ed-87b3-2f5c2a8265d8
+
+
+ INCIDENT_LINK
+ 1659292508
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 813b5e90-10ff-11ed-87b3-2f5c2a8265d8
+
+
+ INCIDENT_LINK
+ 1659292508
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 813b5e90-10ff-11ed-87b3-2f5c2a8265d8
+
+
+ INCIDENT_LINK
+ 1659292508
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 813b5e90-10ff-11ed-87b3-2f5c2a8265d8
+
+
+ INCIDENT_LINK
+ 1659292508
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 813b5e90-10ff-11ed-87b3-2f5c2a8265d8
+
+
+ INCIDENT_LINK
+ 1659292508
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 813b5e90-10ff-11ed-87b3-2f5c2a8265d8
+
+
+ INCIDENT_LINK
+ 1659292508
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 813b5e90-10ff-11ed-87b3-2f5c2a8265d8
+
+
+ INCIDENT_LINK
+ 1659292508
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 813b5e90-10ff-11ed-87b3-2f5c2a8265d8
+
+
+
diff --git a/graph/incidents_graphml/8/81436870-df6a-11ee-b599-d5300ed6974c.graphml b/graph/incidents_graphml/8/81436870-df6a-11ee-b599-d5300ed6974c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bc76e13ce86ebfaa15ce7aae9f46196e12f2742
--- /dev/null
+++ b/graph/incidents_graphml/8/81436870-df6a-11ee-b599-d5300ed6974c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.180
+ 100.64.8.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710135902
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 81436870-df6a-11ee-b599-d5300ed6974c
+
+
+
diff --git a/graph/incidents_graphml/8/814960e0-1007-11ef-b866-697ee3663480.graphml b/graph/incidents_graphml/8/814960e0-1007-11ef-b866-697ee3663480.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c8b7333c3b255b98d4e875502367050ad65e940
--- /dev/null
+++ b/graph/incidents_graphml/8/814960e0-1007-11ef-b866-697ee3663480.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.105
+ 100.64.18.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715480989
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 814960e0-1007-11ef-b866-697ee3663480
+
+
+
diff --git a/graph/incidents_graphml/8/81502460-dcd2-11ee-877f-c1ac29d0ce14.graphml b/graph/incidents_graphml/8/81502460-dcd2-11ee-877f-c1ac29d0ce14.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17b09f0f824f341ff27563d17605ef2804af9927
--- /dev/null
+++ b/graph/incidents_graphml/8/81502460-dcd2-11ee-877f-c1ac29d0ce14.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.120
+ 100.64.8.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709850716
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 81502460-dcd2-11ee-877f-c1ac29d0ce14
+
+
+ INCIDENT_LINK
+ 1709850716
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 81502460-dcd2-11ee-877f-c1ac29d0ce14
+
+
+ INCIDENT_LINK
+ 1709850716
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 81502460-dcd2-11ee-877f-c1ac29d0ce14
+
+
+