diff --git a/graph/incidents_graphml/7/7826c430-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/7/7826c430-090f-11ee-8afe-6d26bac63fb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..efac8da34847cb3eb06825c9cfc7df61e87ccf21 --- /dev/null +++ b/graph/incidents_graphml/7/7826c430-090f-11ee-8afe-6d26bac63fb3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.47.65 + 192.168.47.65 + [] + 0.4375 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.0.196 + 100.64.0.196 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686567254 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7826c430-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567254 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7826c430-090f-11ee-8afe-6d26bac63fb3 + + + diff --git a/graph/incidents_graphml/7/783465a0-7092-11ee-a33b-d3994469616f.graphml b/graph/incidents_graphml/7/783465a0-7092-11ee-a33b-d3994469616f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3918e1fca76d795c85e63eabbe8a14ea920224a --- /dev/null +++ b/graph/incidents_graphml/7/783465a0-7092-11ee-a33b-d3994469616f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.100 + 100.64.51.100 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697948488 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 783465a0-7092-11ee-a33b-d3994469616f + + + diff --git a/graph/incidents_graphml/7/78353240-27a6-11ed-b92c-490402bdd5e6.graphml b/graph/incidents_graphml/7/78353240-27a6-11ed-b92c-490402bdd5e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..064f8ae2174c9e68e9d8369169cceaffd0ec1610 --- /dev/null +++ b/graph/incidents_graphml/7/78353240-27a6-11ed-b92c-490402bdd5e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.80 + 100.64.72.80 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661783145 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78353240-27a6-11ed-b92c-490402bdd5e6 + + + diff --git a/graph/incidents_graphml/7/78394ac0-4f2c-11ee-896d-938683508860.graphml b/graph/incidents_graphml/7/78394ac0-4f2c-11ee-896d-938683508860.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3294ae077f79b22faaa67693d0fe03404310adf5 --- /dev/null +++ b/graph/incidents_graphml/7/78394ac0-4f2c-11ee-896d-938683508860.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.98 + 100.64.43.98 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694276291 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78394ac0-4f2c-11ee-896d-938683508860 + + + diff --git a/graph/incidents_graphml/7/784552b0-7b60-11ee-b996-61ac976b8a88.graphml b/graph/incidents_graphml/7/784552b0-7b60-11ee-b996-61ac976b8a88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cb7a1fd8405fca26861e6ea6d5b806462118041 --- /dev/null +++ b/graph/incidents_graphml/7/784552b0-7b60-11ee-b996-61ac976b8a88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.202 + 100.64.35.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699136476 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 784552b0-7b60-11ee-b996-61ac976b8a88 + + + diff --git a/graph/incidents_graphml/7/7845e6e0-a815-11ed-8da7-05bace042fb8.graphml b/graph/incidents_graphml/7/7845e6e0-a815-11ed-8da7-05bace042fb8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0810b0545d670585d9be7f5bff3e2d193e595db0 --- /dev/null +++ b/graph/incidents_graphml/7/7845e6e0-a815-11ed-8da7-05bace042fb8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.154 + 100.64.33.154 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-16914 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1675904568 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7845e6e0-a815-11ed-8da7-05bace042fb8 + + + diff --git a/graph/incidents_graphml/7/784aa4e0-4ac3-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/7/784aa4e0-4ac3-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..942ac5cd5b44ec456a69bac525e8982fece2664e --- /dev/null +++ b/graph/incidents_graphml/7/784aa4e0-4ac3-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,661 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.208 + 100.64.20.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.54 + 100.64.12.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.209 + 100.64.20.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.9 + 100.64.3.9 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.210 + 100.64.20.210 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.187 + 100.64.4.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.211 + 100.64.20.211 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.212 + 100.64.20.212 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.170 + 100.64.11.170 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.213 + 100.64.20.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.214 + 100.64.20.214 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.215 + 100.64.20.215 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.216 + 100.64.20.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.217 + 100.64.20.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.65 + 100.64.15.65 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.132 + 100.64.19.132 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791389 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 784aa4e0-4ac3-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/7/784b2510-4f2c-11ee-896d-938683508860.graphml b/graph/incidents_graphml/7/784b2510-4f2c-11ee-896d-938683508860.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0239c994f80ab06a7a38bbe45e2916048c1251d3 --- /dev/null +++ b/graph/incidents_graphml/7/784b2510-4f2c-11ee-896d-938683508860.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.98 + 100.64.43.98 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694276291 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 784b2510-4f2c-11ee-896d-938683508860 + + + diff --git a/graph/incidents_graphml/7/7851a390-2d94-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/7/7851a390-2d94-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26396bcc892f279497d2ce902f187e484510a3e6 --- /dev/null +++ b/graph/incidents_graphml/7/7851a390-2d94-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.247 + 100.64.6.247 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690582619 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7851a390-2d94-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/7/7858dad0-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/7858dad0-7285-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bdbe41e46781a279f68a68de75448d9a9ecf1ab7 --- /dev/null +++ b/graph/incidents_graphml/7/7858dad0-7285-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,129 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.30 + 100.64.30.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698162807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7858dad0-7285-11ee-9478-f721b34a9cef + + + INCIDENT_LINK + 1698162807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7858dad0-7285-11ee-9478-f721b34a9cef + + + INCIDENT_LINK + 1698162807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7858dad0-7285-11ee-9478-f721b34a9cef + + + INCIDENT_LINK + 1698162807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7858dad0-7285-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/7/7860d470-a5a6-11ee-bda8-6b49f5844970.graphml b/graph/incidents_graphml/7/7860d470-a5a6-11ee-bda8-6b49f5844970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d1a4fa66292d9936ff212e8b09bbe1419e516e2 --- /dev/null +++ b/graph/incidents_graphml/7/7860d470-a5a6-11ee-bda8-6b49f5844970.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.135 + 100.64.29.135 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"] + + + INCIDENT_LINK + 1703784489 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7860d470-a5a6-11ee-bda8-6b49f5844970 + + + diff --git a/graph/incidents_graphml/7/7862f450-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/7862f450-26d3-11ee-ac10-e7e87ad84b9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33d0baedba7fca4e800fdc232c7332b463345d2b --- /dev/null +++ b/graph/incidents_graphml/7/7862f450-26d3-11ee-ac10-e7e87ad84b9c.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.194 + 100.64.49.194 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689840019 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7862f450-26d3-11ee-ac10-e7e87ad84b9c + + + INCIDENT_LINK + 1689840019 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7862f450-26d3-11ee-ac10-e7e87ad84b9c + + + diff --git a/graph/incidents_graphml/7/786302e0-26a8-11ee-bacb-e1766d74be09.graphml b/graph/incidents_graphml/7/786302e0-26a8-11ee-bacb-e1766d74be09.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b127be3f820f8f81ceba8f6322b18665e851a55 --- /dev/null +++ b/graph/incidents_graphml/7/786302e0-26a8-11ee-bacb-e1766d74be09.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.122 + 100.64.36.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689821551 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 786302e0-26a8-11ee-bacb-e1766d74be09 + + + diff --git a/graph/incidents_graphml/7/78660c50-3a81-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/7/78660c50-3a81-11ee-b55b-6596b150fac1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d971d6fff466e2425c0494b0508e26bfb96efb70 --- /dev/null +++ b/graph/incidents_graphml/7/78660c50-3a81-11ee-b55b-6596b150fac1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.85 + 100.64.68.85 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692003824 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78660c50-3a81-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692003824 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78660c50-3a81-11ee-b55b-6596b150fac1 + + + diff --git a/graph/incidents_graphml/7/78676370-8be4-11ee-9efd-252771b20c20.graphml b/graph/incidents_graphml/7/78676370-8be4-11ee-9efd-252771b20c20.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c3d201b6a05792e8f1a88240a4aeb48e457aaea --- /dev/null +++ b/graph/incidents_graphml/7/78676370-8be4-11ee-9efd-252771b20c20.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.237 + 100.64.33.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.18 + 100.64.22.18 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.238 + 100.64.33.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.220 + 100.64.4.220 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.138 + 100.64.33.138 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700952388 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78676370-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952388 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78676370-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952388 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78676370-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952388 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78676370-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952388 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78676370-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952388 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78676370-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952388 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78676370-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952388 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78676370-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952388 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78676370-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952388 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78676370-8be4-11ee-9efd-252771b20c20 + + + diff --git a/graph/incidents_graphml/7/786a0890-3c71-11ee-89e7-7976671c0f18.graphml b/graph/incidents_graphml/7/786a0890-3c71-11ee-89e7-7976671c0f18.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f012f6962d34fde8e8762d909ee469813ee37c3 --- /dev/null +++ b/graph/incidents_graphml/7/786a0890-3c71-11ee-89e7-7976671c0f18.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.30 + 100.64.20.30 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.36.31 + 100.64.36.31 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692216854 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 786a0890-3c71-11ee-89e7-7976671c0f18 + + + INCIDENT_LINK + 1692216854 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 786a0890-3c71-11ee-89e7-7976671c0f18 + + + INCIDENT_LINK + 1692216854 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 786a0890-3c71-11ee-89e7-7976671c0f18 + + + INCIDENT_LINK + 1692216854 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 786a0890-3c71-11ee-89e7-7976671c0f18 + + + INCIDENT_LINK + 1692216854 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 786a0890-3c71-11ee-89e7-7976671c0f18 + + + INCIDENT_LINK + 1692216854 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 786a0890-3c71-11ee-89e7-7976671c0f18 + + + diff --git a/graph/incidents_graphml/7/786a6700-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/786a6700-7285-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4d81ea327df1912ad477cd345da694fd1a7ba1d --- /dev/null +++ b/graph/incidents_graphml/7/786a6700-7285-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.30 + 100.64.30.30 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698162807 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 786a6700-7285-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/7/786e3770-7b60-11ee-b996-61ac976b8a88.graphml b/graph/incidents_graphml/7/786e3770-7b60-11ee-b996-61ac976b8a88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fba3cc0ca408d807e15deae43e422c9adb57bf15 --- /dev/null +++ b/graph/incidents_graphml/7/786e3770-7b60-11ee-b996-61ac976b8a88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.161 + 100.64.32.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699136476 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 786e3770-7b60-11ee-b996-61ac976b8a88 + + + diff --git a/graph/incidents_graphml/7/786fd800-d773-11ed-b131-97a6b3859c17.graphml b/graph/incidents_graphml/7/786fd800-d773-11ed-b131-97a6b3859c17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff2330f0d7b1f2eec6f7ca3d1b981b9d85c6b20b --- /dev/null +++ b/graph/incidents_graphml/7/786fd800-d773-11ed-b131-97a6b3859c17.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.7 + 100.64.17.7 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.8 + 100.64.17.8 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1681112646 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 786fd800-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112646 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 786fd800-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112646 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 786fd800-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112646 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 786fd800-d773-11ed-b131-97a6b3859c17 + + + diff --git a/graph/incidents_graphml/7/78751fc0-a5a6-11ee-bda8-6b49f5844970.graphml b/graph/incidents_graphml/7/78751fc0-a5a6-11ee-bda8-6b49f5844970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78928b39a852da35b59480e0b344152d14bf872a --- /dev/null +++ b/graph/incidents_graphml/7/78751fc0-a5a6-11ee-bda8-6b49f5844970.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.6 + 100.64.70.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"] + + + INCIDENT_LINK + 1703784489 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78751fc0-a5a6-11ee-bda8-6b49f5844970 + + + diff --git a/graph/incidents_graphml/7/78752b50-26a8-11ee-bacb-e1766d74be09.graphml b/graph/incidents_graphml/7/78752b50-26a8-11ee-bacb-e1766d74be09.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0358296c36c79d8c054be078359a05c09d4db74e --- /dev/null +++ b/graph/incidents_graphml/7/78752b50-26a8-11ee-bacb-e1766d74be09.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.122 + 100.64.36.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689821551 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 78752b50-26a8-11ee-bacb-e1766d74be09 + + + diff --git a/graph/incidents_graphml/7/787849b0-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/787849b0-7285-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb1ec96ebe503bab405cb8f517b366f3c8592f44 --- /dev/null +++ b/graph/incidents_graphml/7/787849b0-7285-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.97 + 100.64.48.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698162807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 787849b0-7285-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/7/78789f30-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/78789f30-26d3-11ee-ac10-e7e87ad84b9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33451444b9652318f1d790ba2f0aedfa71092b35 --- /dev/null +++ b/graph/incidents_graphml/7/78789f30-26d3-11ee-ac10-e7e87ad84b9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.194 + 100.64.49.194 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689840019 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 78789f30-26d3-11ee-ac10-e7e87ad84b9c + + + diff --git a/graph/incidents_graphml/7/787a7b30-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/787a7b30-125f-11ee-8a81-b1159645422c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..983250909e4a29b901afbf37d0c6f64f94085039 --- /dev/null +++ b/graph/incidents_graphml/7/787a7b30-125f-11ee-8a81-b1159645422c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.150 + HOST-2906 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687591174 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 787a7b30-125f-11ee-8a81-b1159645422c + + + diff --git a/graph/incidents_graphml/7/787e6410-7b60-11ee-b996-61ac976b8a88.graphml b/graph/incidents_graphml/7/787e6410-7b60-11ee-b996-61ac976b8a88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4d78ef8e7e842f3033b4c97dfdfeac1c361efa7 --- /dev/null +++ b/graph/incidents_graphml/7/787e6410-7b60-11ee-b996-61ac976b8a88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.202 + 100.64.35.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699136476 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 787e6410-7b60-11ee-b996-61ac976b8a88 + + + diff --git a/graph/incidents_graphml/7/787e92c0-0858-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/7/787e92c0-0858-11ef-81c9-bbab78bb4e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a12de329eb03c08d0da84a05bc7351ed69b85905 --- /dev/null +++ b/graph/incidents_graphml/7/787e92c0-0858-11ef-81c9-bbab78bb4e36.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"] + + + HOST + 100.64.87.4 + 100.64.87.4 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.73 + 100.64.92.73 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.46 + 100.64.97.46 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.177 + 100.64.97.177 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714636154 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 787e92c0-0858-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636154 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 787e92c0-0858-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636154 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 787e92c0-0858-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636154 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 787e92c0-0858-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636154 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 787e92c0-0858-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636154 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 787e92c0-0858-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636154 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 787e92c0-0858-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636154 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 787e92c0-0858-11ef-81c9-bbab78bb4e36 + + + diff --git a/graph/incidents_graphml/7/787ef520-2d94-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/7/787ef520-2d94-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb976230843ee78f4a4db72e8039fd746d8d59c4 --- /dev/null +++ b/graph/incidents_graphml/7/787ef520-2d94-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.250 + 100.64.52.250 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690582619 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 787ef520-2d94-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/7/78880120-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/78880120-7285-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4b2d2f6fc8a65fc2c81ea214b8d568187411c92 --- /dev/null +++ b/graph/incidents_graphml/7/78880120-7285-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.97 + 100.64.48.97 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698162807 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 78880120-7285-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/7/788e7420-a5a6-11ee-bda8-6b49f5844970.graphml b/graph/incidents_graphml/7/788e7420-a5a6-11ee-bda8-6b49f5844970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4d124e67a52be32db5dba54e7cd967c376c7047 --- /dev/null +++ b/graph/incidents_graphml/7/788e7420-a5a6-11ee-bda8-6b49f5844970.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.7 + 100.64.70.7 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"] + + + INCIDENT_LINK + 1703784490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 788e7420-a5a6-11ee-bda8-6b49f5844970 + + + diff --git a/graph/incidents_graphml/7/7899db70-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/7899db70-7285-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9cb9e9bbcb1e4b2e30db1f03adec523195f6366 --- /dev/null +++ b/graph/incidents_graphml/7/7899db70-7285-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.219 + 100.64.22.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698162807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7899db70-7285-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/7/789ccc00-a5a6-11ee-bda8-6b49f5844970.graphml b/graph/incidents_graphml/7/789ccc00-a5a6-11ee-bda8-6b49f5844970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d4e2c69714a2692035319379e3c1e7757647cc8 --- /dev/null +++ b/graph/incidents_graphml/7/789ccc00-a5a6-11ee-bda8-6b49f5844970.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.144 + 100.64.12.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.20 + 100.64.68.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1703784490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 789ccc00-a5a6-11ee-bda8-6b49f5844970 + + + diff --git a/graph/incidents_graphml/7/789d0b90-10e4-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/7/789d0b90-10e4-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..526013a2bd237bcd80f6cfb2ce3e069a3618056f --- /dev/null +++ b/graph/incidents_graphml/7/789d0b90-10e4-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.31 + USER-0015-1838.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.228 + 100.64.71.228 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687428395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 789d0b90-10e4-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687428395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 789d0b90-10e4-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/7/78a02df0-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/78a02df0-8616-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb130f527cadb341db7f84714d25b4ab86a68cf7 --- /dev/null +++ b/graph/incidents_graphml/7/78a02df0-8616-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.86 + 100.64.53.86 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700314156 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78a02df0-8616-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/7/78a086e0-2d94-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/7/78a086e0-2d94-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abca6c4c67c11be44ed578a463cc55ed4adb7cec --- /dev/null +++ b/graph/incidents_graphml/7/78a086e0-2d94-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.250 + 100.64.52.250 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690582619 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78a086e0-2d94-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/7/78a30310-7b60-11ee-b996-61ac976b8a88.graphml b/graph/incidents_graphml/7/78a30310-7b60-11ee-b996-61ac976b8a88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1ebe18be3d5a2b208196745ad8712913d4177dd --- /dev/null +++ b/graph/incidents_graphml/7/78a30310-7b60-11ee-b996-61ac976b8a88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.101 + 100.64.34.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699136476 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78a30310-7b60-11ee-b996-61ac976b8a88 + + + diff --git a/graph/incidents_graphml/7/78a3ae10-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/78a3ae10-125f-11ee-8a81-b1159645422c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ca6e53cd6af70fac1a2441bf47fac4bc185cf78 --- /dev/null +++ b/graph/incidents_graphml/7/78a3ae10-125f-11ee-8a81-b1159645422c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + HOST-2906 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687591175 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 78a3ae10-125f-11ee-8a81-b1159645422c + + + diff --git a/graph/incidents_graphml/7/78b18200-7b60-11ee-b996-61ac976b8a88.graphml b/graph/incidents_graphml/7/78b18200-7b60-11ee-b996-61ac976b8a88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0fe36cc07536b749289546baf0833f2a7216c65 --- /dev/null +++ b/graph/incidents_graphml/7/78b18200-7b60-11ee-b996-61ac976b8a88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.101 + 100.64.34.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699136476 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78b18200-7b60-11ee-b996-61ac976b8a88 + + + diff --git a/graph/incidents_graphml/7/78b18ec0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78b18ec0-31d9-11ed-a735-37a95a76e51b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ef72398991b0005f54c3a066ef384e7d96116b4 --- /dev/null +++ b/graph/incidents_graphml/7/78b18ec0-31d9-11ed-a735-37a95a76e51b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662904562 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78b18ec0-31d9-11ed-a735-37a95a76e51b + + + diff --git a/graph/incidents_graphml/7/78b6b240-7285-11ee-9478-f721b34a9cef.graphml b/graph/incidents_graphml/7/78b6b240-7285-11ee-9478-f721b34a9cef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad00680e518aaeb30e1aa065d8295f694449ceb3 --- /dev/null +++ b/graph/incidents_graphml/7/78b6b240-7285-11ee-9478-f721b34a9cef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.219 + 100.64.22.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698162807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 78b6b240-7285-11ee-9478-f721b34a9cef + + + diff --git a/graph/incidents_graphml/7/78c0ec90-4ec4-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/7/78c0ec90-4ec4-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7587681e25ce9c2f13b6cf172fb8df9cac5b7f69 --- /dev/null +++ b/graph/incidents_graphml/7/78c0ec90-4ec4-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.97 + 100.64.11.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694231624 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78c0ec90-4ec4-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/7/78c2ccd0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78c2ccd0-31d9-11ed-a735-37a95a76e51b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82a533d57de4afe72e13e70ba78a098d54a97376 --- /dev/null +++ b/graph/incidents_graphml/7/78c2ccd0-31d9-11ed-a735-37a95a76e51b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662904562 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 78c2ccd0-31d9-11ed-a735-37a95a76e51b + + + diff --git a/graph/incidents_graphml/7/78c7fcf0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78c7fcf0-31d9-11ed-a735-37a95a76e51b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2782e87bf7a6966b4a63af26c63bfd20389cad1c --- /dev/null +++ b/graph/incidents_graphml/7/78c7fcf0-31d9-11ed-a735-37a95a76e51b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.25 + 100.64.91.25 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662904562 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78c7fcf0-31d9-11ed-a735-37a95a76e51b + + + diff --git a/graph/incidents_graphml/7/78ca2330-0451-11ef-82af-f11a2f279dd8.graphml b/graph/incidents_graphml/7/78ca2330-0451-11ef-82af-f11a2f279dd8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb93dbf0e9cb36eddd987ca283ee86ca91467ee9 --- /dev/null +++ b/graph/incidents_graphml/7/78ca2330-0451-11ef-82af-f11a2f279dd8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.31 + 100.64.4.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714193343 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78ca2330-0451-11ef-82af-f11a2f279dd8 + + + diff --git a/graph/incidents_graphml/7/78ce18e0-368f-11ee-b546-fb0db7567997.graphml b/graph/incidents_graphml/7/78ce18e0-368f-11ee-b546-fb0db7567997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c39181e0bb91d5fb4be24ebadadcba2dd7dda035 --- /dev/null +++ b/graph/incidents_graphml/7/78ce18e0-368f-11ee-b546-fb0db7567997.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.239 + 100.64.65.239 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.43.10.92 + 10.43.10.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691570033 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78ce18e0-368f-11ee-b546-fb0db7567997 + + + INCIDENT_LINK + 1691570033 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78ce18e0-368f-11ee-b546-fb0db7567997 + + + diff --git a/graph/incidents_graphml/7/78d0fda0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78d0fda0-31d9-11ed-a735-37a95a76e51b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5984eebd6052ecd777a5e696cf3434d125e496fe --- /dev/null +++ b/graph/incidents_graphml/7/78d0fda0-31d9-11ed-a735-37a95a76e51b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.25 + 100.64.91.25 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662904562 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 78d0fda0-31d9-11ed-a735-37a95a76e51b + + + diff --git a/graph/incidents_graphml/7/78d18e60-4ec4-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/7/78d18e60-4ec4-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..946c8e0c1b4230adc867e27fbd82efbca5a8c479 --- /dev/null +++ b/graph/incidents_graphml/7/78d18e60-4ec4-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.97 + 100.64.11.97 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694231624 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 78d18e60-4ec4-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/7/78d22a70-0508-11ed-8762-011b41c4e26e.graphml b/graph/incidents_graphml/7/78d22a70-0508-11ed-8762-011b41c4e26e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d9f89bbb5d8d61436808af93fd22c50fe0abc34 --- /dev/null +++ b/graph/incidents_graphml/7/78d22a70-0508-11ed-8762-011b41c4e26e.graphml @@ -0,0 +1,617 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.31 + 100.64.83.31 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.228 + 100.64.71.228 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.83.32 + USER-0015-1943.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.80.128 + 100.64.80.128 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.25.66 + 100.64.25.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.4.216 + 100.64.4.216 + ["Exploiting Target","Exploiting Host"] + 0.9634375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.31 + 100.64.75.31 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.111 + 100.64.71.111 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.252 + 100.64.79.252 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.80.61 + 100.64.80.61 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.7.252 + 100.64.7.252 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.63 + USER-0015-1731.example.internal + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.83.33 + 100.64.83.33 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.67 + 100.64.73.67 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.83.34 + USER-0015-1944.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.83.35 + 100.64.83.35 + ["Exploiting Host"] + 0.7525 + ["Precinct","Meraki"] + + + HOST + 100.64.83.36 + 100.64.83.36 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + INCIDENT_LINK + 1657976946 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78d22a70-0508-11ed-8762-011b41c4e26e + + + diff --git a/graph/incidents_graphml/7/78d654d0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78d654d0-31d9-11ed-a735-37a95a76e51b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6b3e2bd344e06525ed1a08f20dcc8f9200edca0 --- /dev/null +++ b/graph/incidents_graphml/7/78d654d0-31d9-11ed-a735-37a95a76e51b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.5 + 100.64.34.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1662904562 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78d654d0-31d9-11ed-a735-37a95a76e51b + + + diff --git a/graph/incidents_graphml/7/78d6ade0-f51b-11ec-9c76-edb488c77bbc.graphml b/graph/incidents_graphml/7/78d6ade0-f51b-11ec-9c76-edb488c77bbc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4128699b43873a89732a9b79ee6bdbafbd772999 --- /dev/null +++ b/graph/incidents_graphml/7/78d6ade0-f51b-11ec-9c76-edb488c77bbc.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.185 + 100.64.73.185 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656225888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78d6ade0-f51b-11ec-9c76-edb488c77bbc + + + INCIDENT_LINK + 1656225888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78d6ade0-f51b-11ec-9c76-edb488c77bbc + + + diff --git a/graph/incidents_graphml/7/78dd8420-0451-11ef-82af-f11a2f279dd8.graphml b/graph/incidents_graphml/7/78dd8420-0451-11ef-82af-f11a2f279dd8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cd544dc13f9031d939fe31637f9f2c75db802e2 --- /dev/null +++ b/graph/incidents_graphml/7/78dd8420-0451-11ef-82af-f11a2f279dd8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.31 + 100.64.4.31 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714193343 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 78dd8420-0451-11ef-82af-f11a2f279dd8 + + + diff --git a/graph/incidents_graphml/7/78dfcab0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78dfcab0-31d9-11ed-a735-37a95a76e51b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..23f5d772460d27c3d9556d1bc7c523fe7ff61dae --- /dev/null +++ b/graph/incidents_graphml/7/78dfcab0-31d9-11ed-a735-37a95a76e51b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.34.5 + 100.64.34.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662904562 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 78dfcab0-31d9-11ed-a735-37a95a76e51b + + + diff --git a/graph/incidents_graphml/7/78e4d3c0-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78e4d3c0-31d9-11ed-a735-37a95a76e51b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d41aa25896cc4cff0ca2b50d8cbcf30ff656f579 --- /dev/null +++ b/graph/incidents_graphml/7/78e4d3c0-31d9-11ed-a735-37a95a76e51b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.160 + 100.64.63.160 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662904562 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78e4d3c0-31d9-11ed-a735-37a95a76e51b + + + diff --git a/graph/incidents_graphml/7/78e7dec0-a5a6-11ee-bda8-6b49f5844970.graphml b/graph/incidents_graphml/7/78e7dec0-a5a6-11ee-bda8-6b49f5844970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b3666039a83429e27acc358aaaf332f29bf79e5 --- /dev/null +++ b/graph/incidents_graphml/7/78e7dec0-a5a6-11ee-bda8-6b49f5844970.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"] + + + HOST + 100.64.11.104 + 100.64.11.104 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1703784490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 78e7dec0-a5a6-11ee-bda8-6b49f5844970 + + + diff --git a/graph/incidents_graphml/7/78e85100-106f-11ef-9de3-e13309ab258b.graphml b/graph/incidents_graphml/7/78e85100-106f-11ef-9de3-e13309ab258b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..300c41e212341f5b39786d39faffc48a9c354959 --- /dev/null +++ b/graph/incidents_graphml/7/78e85100-106f-11ef-9de3-e13309ab258b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.118 + 100.64.30.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1715525642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78e85100-106f-11ef-9de3-e13309ab258b + + + diff --git a/graph/incidents_graphml/7/78ebb190-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78ebb190-31d9-11ed-a735-37a95a76e51b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..559c1facd07655dc72a164dfae7a8bb9a59d9f5b --- /dev/null +++ b/graph/incidents_graphml/7/78ebb190-31d9-11ed-a735-37a95a76e51b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.63.160 + 100.64.63.160 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662904562 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 78ebb190-31d9-11ed-a735-37a95a76e51b + + + diff --git a/graph/incidents_graphml/7/78ee4d00-0451-11ef-82af-f11a2f279dd8.graphml b/graph/incidents_graphml/7/78ee4d00-0451-11ef-82af-f11a2f279dd8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..365dc02334a1e66e449cea8e770883577d6881b2 --- /dev/null +++ b/graph/incidents_graphml/7/78ee4d00-0451-11ef-82af-f11a2f279dd8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.189 + 100.64.27.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714193344 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78ee4d00-0451-11ef-82af-f11a2f279dd8 + + + diff --git a/graph/incidents_graphml/7/78eedf20-4f2c-11ee-896d-938683508860.graphml b/graph/incidents_graphml/7/78eedf20-4f2c-11ee-896d-938683508860.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25f4e36ebe0a0c2412edc3f664ea77e38c1ebb72 --- /dev/null +++ b/graph/incidents_graphml/7/78eedf20-4f2c-11ee-896d-938683508860.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.100 + 100.64.43.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694276292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78eedf20-4f2c-11ee-896d-938683508860 + + + diff --git a/graph/incidents_graphml/7/78eff750-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78eff750-31d9-11ed-a735-37a95a76e51b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..615d418065aa52a0809d810785ccfd311eed77b2 --- /dev/null +++ b/graph/incidents_graphml/7/78eff750-31d9-11ed-a735-37a95a76e51b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.29 + 100.64.91.29 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1662904562 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78eff750-31d9-11ed-a735-37a95a76e51b + + + diff --git a/graph/incidents_graphml/7/78f73130-6a83-11ee-8b64-8bde2abad778.graphml b/graph/incidents_graphml/7/78f73130-6a83-11ee-8b64-8bde2abad778.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95b729fda22ecb3c3a20f2e607ecd2dbc6cda3df --- /dev/null +++ b/graph/incidents_graphml/7/78f73130-6a83-11ee-8b64-8bde2abad778.graphml @@ -0,0 +1,279 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.200 + 100.64.26.200 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.248 + 100.64.10.248 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.205 + 100.64.43.205 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.14 + 100.64.9.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.206 + 100.64.43.206 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.99 + 100.64.10.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.230 + 100.64.7.230 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282339 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78f73130-6a83-11ee-8b64-8bde2abad778 + + + diff --git a/graph/incidents_graphml/7/78f737d0-1e3d-11ee-b080-b1f442930522.graphml b/graph/incidents_graphml/7/78f737d0-1e3d-11ee-b080-b1f442930522.graphml new file mode 100644 index 0000000000000000000000000000000000000000..169d3979b6116318287de51983a8d4cee2821b89 --- /dev/null +++ b/graph/incidents_graphml/7/78f737d0-1e3d-11ee-b080-b1f442930522.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.192 + 100.64.21.192 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688895986 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78f737d0-1e3d-11ee-b080-b1f442930522 + + + diff --git a/graph/incidents_graphml/7/78f77160-31d9-11ed-a735-37a95a76e51b.graphml b/graph/incidents_graphml/7/78f77160-31d9-11ed-a735-37a95a76e51b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35a52e63b81107b15682173e8bf7d7101ff0bc17 --- /dev/null +++ b/graph/incidents_graphml/7/78f77160-31d9-11ed-a735-37a95a76e51b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.91.29 + 100.64.91.29 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662904562 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 78f77160-31d9-11ed-a735-37a95a76e51b + + + diff --git a/graph/incidents_graphml/7/78fcd360-f755-11ee-9330-cddc7b6e96b7.graphml b/graph/incidents_graphml/7/78fcd360-f755-11ee-9330-cddc7b6e96b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db3939c3a92f6be088f6d3e181650952e17e4ae4 --- /dev/null +++ b/graph/incidents_graphml/7/78fcd360-f755-11ee-9330-cddc7b6e96b7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.167 + 100.64.4.167 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712765696 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 78fcd360-f755-11ee-9330-cddc7b6e96b7 + + + diff --git a/graph/incidents_graphml/7/78fe6080-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/7/78fe6080-216e-11ee-9e0b-8dcc0a578b7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e18f46738fd638354d50e756261b6b45d72db4eb --- /dev/null +++ b/graph/incidents_graphml/7/78fe6080-216e-11ee-9e0b-8dcc0a578b7b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.250 + 100.64.17.250 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689246885 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78fe6080-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246885 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 78fe6080-216e-11ee-9e0b-8dcc0a578b7b + + + diff --git a/graph/incidents_graphml/7/79006b50-4f2c-11ee-896d-938683508860.graphml b/graph/incidents_graphml/7/79006b50-4f2c-11ee-896d-938683508860.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a757735fba4d7e9537dc9d47d0418e0c469b0b01 --- /dev/null +++ b/graph/incidents_graphml/7/79006b50-4f2c-11ee-896d-938683508860.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.100 + 100.64.43.100 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694276292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 79006b50-4f2c-11ee-896d-938683508860 + + + diff --git a/graph/incidents_graphml/7/79015fd0-0451-11ef-82af-f11a2f279dd8.graphml b/graph/incidents_graphml/7/79015fd0-0451-11ef-82af-f11a2f279dd8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71412b99b8c35fee47a4911eb6b18c51e2cc0a5f --- /dev/null +++ b/graph/incidents_graphml/7/79015fd0-0451-11ef-82af-f11a2f279dd8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.189 + 100.64.27.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714193344 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 79015fd0-0451-11ef-82af-f11a2f279dd8 + + + diff --git a/graph/incidents_graphml/7/7908ff10-277e-11ef-8c37-3d33f474c8fc.graphml b/graph/incidents_graphml/7/7908ff10-277e-11ef-8c37-3d33f474c8fc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2fcacd2b3f6f638d18afb401d52db3d8e360f779 --- /dev/null +++ b/graph/incidents_graphml/7/7908ff10-277e-11ef-8c37-3d33f474c8fc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.46 + 100.64.10.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1718060962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7908ff10-277e-11ef-8c37-3d33f474c8fc + + + diff --git a/graph/incidents_graphml/7/790c6f70-263e-11ee-8f39-83af752ea491.graphml b/graph/incidents_graphml/7/790c6f70-263e-11ee-8f39-83af752ea491.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1612499172804bc08bb02acf1806f9952a437da2 --- /dev/null +++ b/graph/incidents_graphml/7/790c6f70-263e-11ee-8f39-83af752ea491.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.32 + 100.64.64.32 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689776025 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 790c6f70-263e-11ee-8f39-83af752ea491 + + + diff --git a/graph/incidents_graphml/7/790dd8d0-4f2c-11ee-896d-938683508860.graphml b/graph/incidents_graphml/7/790dd8d0-4f2c-11ee-896d-938683508860.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f6220ec4cf01021132a5fa348cb1a791eb1bf38 --- /dev/null +++ b/graph/incidents_graphml/7/790dd8d0-4f2c-11ee-896d-938683508860.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.164 + 100.64.9.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694276292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 790dd8d0-4f2c-11ee-896d-938683508860 + + + diff --git a/graph/incidents_graphml/7/790dea60-f755-11ee-9330-cddc7b6e96b7.graphml b/graph/incidents_graphml/7/790dea60-f755-11ee-9330-cddc7b6e96b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aef11ae90086bf3b6a84b9de80810db61178714f --- /dev/null +++ b/graph/incidents_graphml/7/790dea60-f755-11ee-9330-cddc7b6e96b7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.167 + 100.64.4.167 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712765697 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 790dea60-f755-11ee-9330-cddc7b6e96b7 + + + diff --git a/graph/incidents_graphml/7/791afdc0-ed63-11ec-9115-b3a5268a4818.graphml b/graph/incidents_graphml/7/791afdc0-ed63-11ec-9115-b3a5268a4818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d6c286cbb8d1791cf672923c47b689708ee4b67 --- /dev/null +++ b/graph/incidents_graphml/7/791afdc0-ed63-11ec-9115-b3a5268a4818.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.168 + 100.64.77.168 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.169 + USER-0015-1763.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655377203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 791afdc0-ed63-11ec-9115-b3a5268a4818 + + + INCIDENT_LINK + 1655377203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 791afdc0-ed63-11ec-9115-b3a5268a4818 + + + diff --git a/graph/incidents_graphml/7/79243600-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/79243600-dd81-11ee-bdd6-3b03475da548.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4dc8ec3a946954a60412ed2a27912f3fc8a013a --- /dev/null +++ b/graph/incidents_graphml/7/79243600-dd81-11ee-bdd6-3b03475da548.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.93.255 + 100.64.93.255 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1709925864 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 79243600-dd81-11ee-bdd6-3b03475da548 + + + diff --git a/graph/incidents_graphml/7/7925c1e0-1e3d-11ee-b080-b1f442930522.graphml b/graph/incidents_graphml/7/7925c1e0-1e3d-11ee-b080-b1f442930522.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfda53dac8b36199f09d20b010fc1ba06ffdf0be --- /dev/null +++ b/graph/incidents_graphml/7/7925c1e0-1e3d-11ee-b080-b1f442930522.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.192 + 100.64.21.192 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688895987 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7925c1e0-1e3d-11ee-b080-b1f442930522 + + + diff --git a/graph/incidents_graphml/7/7926bfe0-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7926bfe0-2e2e-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64731c4494c28bc639c82204d92ee476ca0f40a7 --- /dev/null +++ b/graph/incidents_graphml/7/7926bfe0-2e2e-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.235 + 100.64.45.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690648763 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7926bfe0-2e2e-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/7/7929eb90-1889-11ed-b964-8d89086ae0ab.graphml b/graph/incidents_graphml/7/7929eb90-1889-11ed-b964-8d89086ae0ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6195804e5ada54f545f3df1e1f7205b5a9f3d8d --- /dev/null +++ b/graph/incidents_graphml/7/7929eb90-1889-11ed-b964-8d89086ae0ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.118 + 100.64.84.118 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660121424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7929eb90-1889-11ed-b964-8d89086ae0ab + + + diff --git a/graph/incidents_graphml/7/792fe5d0-4462-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/7/792fe5d0-4462-11ee-853f-87a1872d184b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b3f5133ae169b309af61958ccefdb2691dd0a8a --- /dev/null +++ b/graph/incidents_graphml/7/792fe5d0-4462-11ee-853f-87a1872d184b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.219 + 100.64.24.219 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693090022 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 792fe5d0-4462-11ee-853f-87a1872d184b + + + diff --git a/graph/incidents_graphml/7/79368cb0-263e-11ee-8f39-83af752ea491.graphml b/graph/incidents_graphml/7/79368cb0-263e-11ee-8f39-83af752ea491.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbce49ef6c49502e61944bf0a0763fc6a9788a3b --- /dev/null +++ b/graph/incidents_graphml/7/79368cb0-263e-11ee-8f39-83af752ea491.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.34 + 100.64.64.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689776025 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79368cb0-263e-11ee-8f39-83af752ea491 + + + diff --git a/graph/incidents_graphml/7/7941ac30-0718-11ed-b0df-8957a66f2fd5.graphml b/graph/incidents_graphml/7/7941ac30-0718-11ed-b0df-8957a66f2fd5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5264a7a64c38c5e609d6f82d831b2c3066015379 --- /dev/null +++ b/graph/incidents_graphml/7/7941ac30-0718-11ed-b0df-8957a66f2fd5.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.207.11 + 192.168.207.11 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 192.168.151.214 + 192.168.151.214 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658203721 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7941ac30-0718-11ed-b0df-8957a66f2fd5 + + + INCIDENT_LINK + 1658203721 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7941ac30-0718-11ed-b0df-8957a66f2fd5 + + + diff --git a/graph/incidents_graphml/7/7946d2d0-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/7946d2d0-54c1-11ee-8051-4f06835265f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c414612a915939c6b1e8b6b8d6b879b91c6ead2 --- /dev/null +++ b/graph/incidents_graphml/7/7946d2d0-54c1-11ee-8051-4f06835265f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.18 + 100.64.6.18 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694890043 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7946d2d0-54c1-11ee-8051-4f06835265f6 + + + diff --git a/graph/incidents_graphml/7/7948eec0-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/7948eec0-125f-11ee-8a81-b1159645422c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7874cee3b793cad9023584bb9aeee89fbc933ea --- /dev/null +++ b/graph/incidents_graphml/7/7948eec0-125f-11ee-8a81-b1159645422c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.188 + 100.64.47.188 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687591176 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7948eec0-125f-11ee-8a81-b1159645422c + + + diff --git a/graph/incidents_graphml/7/794db700-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/794db700-dd81-11ee-bdd6-3b03475da548.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c2652049ac205c22c3696b3bbd29ee30b8309cb --- /dev/null +++ b/graph/incidents_graphml/7/794db700-dd81-11ee-bdd6-3b03475da548.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.1 + 100.64.94.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1709925865 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 794db700-dd81-11ee-bdd6-3b03475da548 + + + diff --git a/graph/incidents_graphml/7/795215a0-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/795215a0-2e2e-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29195ead7f0d472b773ffdaed6814ac57e395335 --- /dev/null +++ b/graph/incidents_graphml/7/795215a0-2e2e-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.235 + 100.64.45.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690648763 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 795215a0-2e2e-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/7/7953dd60-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7953dd60-04e3-11ed-a6aa-45e3cee3f3d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0645b67ea40fc4d686457a29ce4bb31e4f76a2a --- /dev/null +++ b/graph/incidents_graphml/7/7953dd60-04e3-11ed-a6aa-45e3cee3f3d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.15 + 100.64.76.15 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657961055 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7953dd60-04e3-11ed-a6aa-45e3cee3f3d6 + + + diff --git a/graph/incidents_graphml/7/795774a0-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/795774a0-54c1-11ee-8051-4f06835265f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8fc6a36f9b860a5348d7d3e974e812ad3f4193f7 --- /dev/null +++ b/graph/incidents_graphml/7/795774a0-54c1-11ee-8051-4f06835265f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.18 + 100.64.6.18 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694890043 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 795774a0-54c1-11ee-8051-4f06835265f6 + + + diff --git a/graph/incidents_graphml/7/795ea6f0-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/795ea6f0-dd81-11ee-bdd6-3b03475da548.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dad8505d9e0efc784dc7c39e871f8e2ed712cd33 --- /dev/null +++ b/graph/incidents_graphml/7/795ea6f0-dd81-11ee-bdd6-3b03475da548.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.94.1 + 100.64.94.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709925865 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 795ea6f0-dd81-11ee-bdd6-3b03475da548 + + + diff --git a/graph/incidents_graphml/7/79628360-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/79628360-04e3-11ed-a6aa-45e3cee3f3d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df9f688d2e5b6bd8f2f0f256fde655642b406bf6 --- /dev/null +++ b/graph/incidents_graphml/7/79628360-04e3-11ed-a6aa-45e3cee3f3d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.15 + 100.64.76.15 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657961055 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 79628360-04e3-11ed-a6aa-45e3cee3f3d6 + + + diff --git a/graph/incidents_graphml/7/79699540-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/79699540-2e2e-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80c75ae658280411f570a0289bc97fef1b4cf2fc --- /dev/null +++ b/graph/incidents_graphml/7/79699540-2e2e-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.237 + 100.64.45.237 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690648763 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79699540-2e2e-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/7/796d1890-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/796d1890-125f-11ee-8a81-b1159645422c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1038c85dac8d9a3638057b3d065d66a704739a95 --- /dev/null +++ b/graph/incidents_graphml/7/796d1890-125f-11ee-8a81-b1159645422c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.188 + 100.64.47.188 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687591176 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 796d1890-125f-11ee-8a81-b1159645422c + + + diff --git a/graph/incidents_graphml/7/798eaa50-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/798eaa50-125f-11ee-8a81-b1159645422c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..359ad8bc68d535a0396a2518a7f064d8ebe91484 --- /dev/null +++ b/graph/incidents_graphml/7/798eaa50-125f-11ee-8a81-b1159645422c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.231 + 100.64.26.231 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687591176 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 798eaa50-125f-11ee-8a81-b1159645422c + + + diff --git a/graph/incidents_graphml/7/798ef790-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/798ef790-2e2e-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84e38fbdb16d5b8a0864d846588a1a316c0de134 --- /dev/null +++ b/graph/incidents_graphml/7/798ef790-2e2e-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.237 + 100.64.45.237 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690648763 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 798ef790-2e2e-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/7/79936c30-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79936c30-54c1-11ee-8051-4f06835265f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9400c9c20c6986299947038f18631b12898df177 --- /dev/null +++ b/graph/incidents_graphml/7/79936c30-54c1-11ee-8051-4f06835265f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.26 + 100.64.7.26 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694890044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79936c30-54c1-11ee-8051-4f06835265f6 + + + diff --git a/graph/incidents_graphml/7/79964bd0-12a9-11ee-abf2-25c0fa3f9e2a.graphml b/graph/incidents_graphml/7/79964bd0-12a9-11ee-abf2-25c0fa3f9e2a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50960481f25ffdc55687a115e3c0d5ce958b516f --- /dev/null +++ b/graph/incidents_graphml/7/79964bd0-12a9-11ee-abf2-25c0fa3f9e2a.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.248 + 100.64.19.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.204 + 100.64.80.204 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.248 + 100.64.81.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.7.26 + 100.64.7.26 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687622959 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a + + + INCIDENT_LINK + 1687622959 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a + + + INCIDENT_LINK + 1687622959 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a + + + INCIDENT_LINK + 1687622959 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a + + + INCIDENT_LINK + 1687622959 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a + + + INCIDENT_LINK + 1687622959 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79964bd0-12a9-11ee-abf2-25c0fa3f9e2a + + + diff --git a/graph/incidents_graphml/7/79a18a10-043d-11ee-8693-9b63b760243c.graphml b/graph/incidents_graphml/7/79a18a10-043d-11ee-8693-9b63b760243c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae42ccff154ad7f397ef7e468edfe57bccdc3c42 --- /dev/null +++ b/graph/incidents_graphml/7/79a18a10-043d-11ee-8693-9b63b760243c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.228 + USER-0015-1671.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Umbrella","Meraki","Cisco Meraki Firewall","Stealthwatch","Windows Active Directory"] + + + HOST + 100.64.35.144 + 100.64.35.144 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1686037257 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79a18a10-043d-11ee-8693-9b63b760243c + + + INCIDENT_LINK + 1686037257 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79a18a10-043d-11ee-8693-9b63b760243c + + + diff --git a/graph/incidents_graphml/7/79a398d0-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79a398d0-54c1-11ee-8051-4f06835265f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..762b94fb51b6b239184ebb5552a7893bbecbb7cd --- /dev/null +++ b/graph/incidents_graphml/7/79a398d0-54c1-11ee-8051-4f06835265f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.26 + 100.64.7.26 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694890044 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 79a398d0-54c1-11ee-8051-4f06835265f6 + + + diff --git a/graph/incidents_graphml/7/79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd1011974c7246b153c45ac01a81039b3dc352a9 --- /dev/null +++ b/graph/incidents_graphml/7/79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6.graphml @@ -0,0 +1,727 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.19 + 100.64.76.19 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.226 + USER-0015-1727.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.20 + 100.64.76.20 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.173 + 100.64.72.173 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.221 + 100.64.71.221 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.76.21 + 100.64.76.21 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.76.22 + 100.64.76.22 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.3.85 + 100.64.3.85 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.160 + USER-0015-1654.example.internal + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.30.82 + 100.64.30.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.23 + 100.64.76.23 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.220 + 100.64.74.220 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.24 + 100.64.76.24 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.19.172 + 100.64.19.172 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.151 + 100.64.71.151 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host","Exploiting Target"] + 0.983125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.25 + 100.64.76.25 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.26 + 100.64.76.26 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.76.27 + 100.64.76.27 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.74.114 + 100.64.74.114 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ac5da0-04e3-11ed-a6aa-45e3cee3f3d6 + + + diff --git a/graph/incidents_graphml/7/79ad07c0-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/79ad07c0-125f-11ee-8a81-b1159645422c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6f0a4c5d9a176d69a6b869d04ef17b202e77ccc --- /dev/null +++ b/graph/incidents_graphml/7/79ad07c0-125f-11ee-8a81-b1159645422c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.231 + 100.64.26.231 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687591176 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 79ad07c0-125f-11ee-8a81-b1159645422c + + + diff --git a/graph/incidents_graphml/7/79b23ed0-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79b23ed0-54c1-11ee-8051-4f06835265f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..160d765d30d9d75f836cee1f49cd5428b53da1f1 --- /dev/null +++ b/graph/incidents_graphml/7/79b23ed0-54c1-11ee-8051-4f06835265f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.232 + 100.64.29.232 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694890044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79b23ed0-54c1-11ee-8051-4f06835265f6 + + + diff --git a/graph/incidents_graphml/7/79b70160-038e-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/7/79b70160-038e-11ee-8785-53111c12ea35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd44675317c795d634567a880264690c98d3239c --- /dev/null +++ b/graph/incidents_graphml/7/79b70160-038e-11ee-8785-53111c12ea35.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.244 + 100.64.24.244 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.73.195 + 100.64.73.195 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685962095 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79b70160-038e-11ee-8785-53111c12ea35 + + + INCIDENT_LINK + 1685962095 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79b70160-038e-11ee-8785-53111c12ea35 + + + diff --git a/graph/incidents_graphml/7/79bc3040-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/79bc3040-dd81-11ee-bdd6-3b03475da548.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1926b98e16576f2bda1f7572f19da91385c10a06 --- /dev/null +++ b/graph/incidents_graphml/7/79bc3040-dd81-11ee-bdd6-3b03475da548.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.88 + 100.64.46.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1709925865 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79bc3040-dd81-11ee-bdd6-3b03475da548 + + + diff --git a/graph/incidents_graphml/7/79c02180-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79c02180-54c1-11ee-8051-4f06835265f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85dbe12489d2ed60c3a85dd5d4053d427b863e16 --- /dev/null +++ b/graph/incidents_graphml/7/79c02180-54c1-11ee-8051-4f06835265f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.232 + 100.64.29.232 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694890044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79c02180-54c1-11ee-8051-4f06835265f6 + + + diff --git a/graph/incidents_graphml/7/79c3e120-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/79c3e120-34fb-11ee-9ec4-97bf79cb287b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ace54d56881f06d2ca077ff4b06f203b7624aa0f --- /dev/null +++ b/graph/incidents_graphml/7/79c3e120-34fb-11ee-9ec4-97bf79cb287b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.184 + 100.64.46.184 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691396518 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 79c3e120-34fb-11ee-9ec4-97bf79cb287b + + + diff --git a/graph/incidents_graphml/7/79cf1c00-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/79cf1c00-dd81-11ee-bdd6-3b03475da548.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1de17927090ce06b50ca8057a8e0b765f26af43 --- /dev/null +++ b/graph/incidents_graphml/7/79cf1c00-dd81-11ee-bdd6-3b03475da548.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.46.88 + 100.64.46.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1709925866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 79cf1c00-dd81-11ee-bdd6-3b03475da548 + + + diff --git a/graph/incidents_graphml/7/79dbffd0-106f-11ef-9de3-e13309ab258b.graphml b/graph/incidents_graphml/7/79dbffd0-106f-11ef-9de3-e13309ab258b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..31272c18f12065ff864f4aff2119259eefee4a56 --- /dev/null +++ b/graph/incidents_graphml/7/79dbffd0-106f-11ef-9de3-e13309ab258b.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.19.156 + 100.64.19.156 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1999.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1715525644 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 79dbffd0-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 79dbffd0-106f-11ef-9de3-e13309ab258b + + + diff --git a/graph/incidents_graphml/7/79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e6475deeca77974f0cfa0bba2789d8b88809e0f --- /dev/null +++ b/graph/incidents_graphml/7/79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.94 + 100.64.59.94 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.130 + 100.64.71.130 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657961056 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961056 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79e4abb0-04e3-11ed-a6aa-45e3cee3f3d6 + + + diff --git a/graph/incidents_graphml/7/79e583d0-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79e583d0-54c1-11ee-8051-4f06835265f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05d03617bc7c62131d5d7c4da3c112881722effb --- /dev/null +++ b/graph/incidents_graphml/7/79e583d0-54c1-11ee-8051-4f06835265f6.graphml @@ -0,0 +1,173 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.115 + 100.64.10.115 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694890044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79e583d0-54c1-11ee-8051-4f06835265f6 + + + INCIDENT_LINK + 1694890044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79e583d0-54c1-11ee-8051-4f06835265f6 + + + INCIDENT_LINK + 1694890044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79e583d0-54c1-11ee-8051-4f06835265f6 + + + INCIDENT_LINK + 1694890044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79e583d0-54c1-11ee-8051-4f06835265f6 + + + INCIDENT_LINK + 1694890044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79e583d0-54c1-11ee-8051-4f06835265f6 + + + INCIDENT_LINK + 1694890044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 79e583d0-54c1-11ee-8051-4f06835265f6 + + + diff --git a/graph/incidents_graphml/7/79e85bd0-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/79e85bd0-26d3-11ee-ac10-e7e87ad84b9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9dcfcae293d4cd9bd800c4e760ab18154bc49fe5 --- /dev/null +++ b/graph/incidents_graphml/7/79e85bd0-26d3-11ee-ac10-e7e87ad84b9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.176 + USER-0015-1413.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689840022 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79e85bd0-26d3-11ee-ac10-e7e87ad84b9c + + + diff --git a/graph/incidents_graphml/7/79eca5f0-3f5b-11ee-a7a8-a9c952ce7042.graphml b/graph/incidents_graphml/7/79eca5f0-3f5b-11ee-a7a8-a9c952ce7042.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed671d4a46ba1ce1820e5f5187725d0649981c4b --- /dev/null +++ b/graph/incidents_graphml/7/79eca5f0-3f5b-11ee-a7a8-a9c952ce7042.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1692537261 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79eca5f0-3f5b-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537261 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79eca5f0-3f5b-11ee-a7a8-a9c952ce7042 + + + diff --git a/graph/incidents_graphml/7/79ed63e0-c054-11ed-96c1-674c48144fee.graphml b/graph/incidents_graphml/7/79ed63e0-c054-11ed-96c1-674c48144fee.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36dd6d647367e8a69ca529d37ae4661d5127a65c --- /dev/null +++ b/graph/incidents_graphml/7/79ed63e0-c054-11ed-96c1-674c48144fee.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.234 + 100.64.69.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1678570457 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 79ed63e0-c054-11ed-96c1-674c48144fee + + + diff --git a/graph/incidents_graphml/7/79ee2190-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/79ee2190-04e3-11ed-a6aa-45e3cee3f3d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28cd1337112b3c8cc6f2d944829ea331479850d0 --- /dev/null +++ b/graph/incidents_graphml/7/79ee2190-04e3-11ed-a6aa-45e3cee3f3d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.59.94 + 100.64.59.94 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657961056 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 79ee2190-04e3-11ed-a6aa-45e3cee3f3d6 + + + diff --git a/graph/incidents_graphml/7/79fa6b60-54c1-11ee-8051-4f06835265f6.graphml b/graph/incidents_graphml/7/79fa6b60-54c1-11ee-8051-4f06835265f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a68dd60bdd804df02d1b7ad05ba5ed7a487c700 --- /dev/null +++ b/graph/incidents_graphml/7/79fa6b60-54c1-11ee-8051-4f06835265f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.115 + 100.64.10.115 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694890044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 79fa6b60-54c1-11ee-8051-4f06835265f6 + + + diff --git a/graph/incidents_graphml/7/79fa8440-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/79fa8440-26d3-11ee-ac10-e7e87ad84b9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8efeb067e3a6a46238342c1a85d4efbf1f7680a --- /dev/null +++ b/graph/incidents_graphml/7/79fa8440-26d3-11ee-ac10-e7e87ad84b9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.176 + USER-0015-1413.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689840022 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 79fa8440-26d3-11ee-ac10-e7e87ad84b9c + + + diff --git a/graph/incidents_graphml/7/7a00e060-4ac3-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/7/7a00e060-4ac3-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c99c582e42c2eb84cc1e6285d5db6c44bfc1944 --- /dev/null +++ b/graph/incidents_graphml/7/7a00e060-4ac3-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.228 + 100.64.20.228 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693791392 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a00e060-4ac3-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/7/7a022570-106f-11ef-9de3-e13309ab258b.graphml b/graph/incidents_graphml/7/7a022570-106f-11ef-9de3-e13309ab258b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b61cf19a00e7f8502ce434a911593337795e13f --- /dev/null +++ b/graph/incidents_graphml/7/7a022570-106f-11ef-9de3-e13309ab258b.graphml @@ -0,0 +1,805 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.210 + 100.64.65.210 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.93.97 + 100.64.93.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.93.98 + 100.64.93.98 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.100 + 100.64.17.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.185 + USER-0015-2101.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.99 + 100.64.93.99 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.156 + 100.64.19.156 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.27 + 100.64.56.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.93.100 + 100.64.93.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.7 + 100.64.52.7 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.101 + USER-0015-2102.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.102 + 100.64.93.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.51 + 100.64.7.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.31.54 + 100.64.31.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.103 + 100.64.93.103 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.241 + 100.64.5.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.253 + 100.64.23.253 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.23 + 100.64.2.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.104 + 100.64.93.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + INCIDENT_LINK + 1715525644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a022570-106f-11ef-9de3-e13309ab258b + + + diff --git a/graph/incidents_graphml/7/7a05e090-72c6-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/7/7a05e090-72c6-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88f13e9c3301f2b1e5deb3a0b18aa12e021afa09 --- /dev/null +++ b/graph/incidents_graphml/7/7a05e090-72c6-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.79 + 100.64.46.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1670043229 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a05e090-72c6-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/7/7a08cf30-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/7/7a08cf30-09ab-11ef-a326-59a1bcca7fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e8525c453fc5b48c921de48b7c3f3ad0fd6309c --- /dev/null +++ b/graph/incidents_graphml/7/7a08cf30-09ab-11ef-a326-59a1bcca7fdf.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.28 + 100.64.49.28 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.29 + 100.64.49.29 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.32 + 100.64.22.32 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.30 + 100.64.49.30 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.214 + 100.64.8.214 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.31 + 100.64.49.31 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.32 + 100.64.49.32 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.33 + 100.64.49.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a08cf30-09ab-11ef-a326-59a1bcca7fdf + + + diff --git a/graph/incidents_graphml/7/7a0b37c0-72c6-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/7/7a0b37c0-72c6-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff3f9246fde734757dcfd20c70b0c353f7cd3d55 --- /dev/null +++ b/graph/incidents_graphml/7/7a0b37c0-72c6-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.46.79 + 100.64.46.79 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1670043229 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a0b37c0-72c6-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/7/7a118eb0-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/7a118eb0-26d3-11ee-ac10-e7e87ad84b9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2fa498604c8306a8490bfe914a8d557965c74b81 --- /dev/null +++ b/graph/incidents_graphml/7/7a118eb0-26d3-11ee-ac10-e7e87ad84b9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.178 + 100.64.55.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689840022 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a118eb0-26d3-11ee-ac10-e7e87ad84b9c + + + diff --git a/graph/incidents_graphml/7/7a11f570-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/7/7a11f570-5b2c-11ee-a5b1-e563b721d2c6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a2b69e06cdad4cf485d906f7928475b864e010e --- /dev/null +++ b/graph/incidents_graphml/7/7a11f570-5b2c-11ee-a5b1-e563b721d2c6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.168 + 100.64.68.168 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + INCIDENT_LINK + 1695595707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a11f570-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a11f570-5b2c-11ee-a5b1-e563b721d2c6 + + + diff --git a/graph/incidents_graphml/7/7a1360b0-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/7a1360b0-34fb-11ee-9ec4-97bf79cb287b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86eadd1420de36e8a1d8b64d6701568ef3cd52fa --- /dev/null +++ b/graph/incidents_graphml/7/7a1360b0-34fb-11ee-9ec4-97bf79cb287b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.186 + 100.64.46.186 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691396518 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a1360b0-34fb-11ee-9ec4-97bf79cb287b + + + diff --git a/graph/incidents_graphml/7/7a214620-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/7a214620-26d3-11ee-ac10-e7e87ad84b9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..502f1647e2bd27fd9c22db1fe7786f9ed73f95cc --- /dev/null +++ b/graph/incidents_graphml/7/7a214620-26d3-11ee-ac10-e7e87ad84b9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.178 + 100.64.55.178 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689840022 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a214620-26d3-11ee-ac10-e7e87ad84b9c + + + diff --git a/graph/incidents_graphml/7/7a233130-ea3f-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/7/7a233130-ea3f-11ee-b380-23a0be8babf0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..707645ab0885f433e3a213b8201d8c6878d084e3 --- /dev/null +++ b/graph/incidents_graphml/7/7a233130-ea3f-11ee-b380-23a0be8babf0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.139 + 100.64.16.139 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711326884 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a233130-ea3f-11ee-b380-23a0be8babf0 + + + diff --git a/graph/incidents_graphml/7/7a26aca0-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7a26aca0-3fff-11ef-99da-f9fbcaa4b405.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b634fd68b75b42421ce5299444509ba6cc2edcf7 --- /dev/null +++ b/graph/incidents_graphml/7/7a26aca0-3fff-11ef-99da-f9fbcaa4b405.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.30 + 100.64.53.30 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720755197 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a26aca0-3fff-11ef-99da-f9fbcaa4b405 + + + diff --git a/graph/incidents_graphml/7/7a280e90-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7a280e90-1dac-11ee-a6c7-eb84cfc6792e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c28596a3a191330dc95ca09061ad00f31d3f35d6 --- /dev/null +++ b/graph/incidents_graphml/7/7a280e90-1dac-11ee-a6c7-eb84cfc6792e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.137 + USER-0015-1359.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688833711 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a280e90-1dac-11ee-a6c7-eb84cfc6792e + + + diff --git a/graph/incidents_graphml/7/7a2bc6f0-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7a2bc6f0-23ca-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b22e2f5a21ac949555c103cfc210b6ac16a0230 --- /dev/null +++ b/graph/incidents_graphml/7/7a2bc6f0-23ca-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.206 + 100.64.66.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717653801 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a2bc6f0-23ca-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/7/7a2c9a50-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a2c9a50-8616-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ebaac114b182dfdc5d5130b7f4d3f850ae1f508 --- /dev/null +++ b/graph/incidents_graphml/7/7a2c9a50-8616-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.151 + 100.64.62.151 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700314159 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a2c9a50-8616-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/7/7a2d7860-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/7a2d7860-34fb-11ee-9ec4-97bf79cb287b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..534cb63c0e8a320c2a82b54f49fcecb7efe0b621 --- /dev/null +++ b/graph/incidents_graphml/7/7a2d7860-34fb-11ee-9ec4-97bf79cb287b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.186 + 100.64.46.186 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691396518 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a2d7860-34fb-11ee-9ec4-97bf79cb287b + + + diff --git a/graph/incidents_graphml/7/7a36cd80-928d-11ee-92fb-e74bdedb3c0b.graphml b/graph/incidents_graphml/7/7a36cd80-928d-11ee-92fb-e74bdedb3c0b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d0b2f003e559947a7ff4461ec80e8d55d47988b --- /dev/null +++ b/graph/incidents_graphml/7/7a36cd80-928d-11ee-92fb-e74bdedb3c0b.graphml @@ -0,0 +1,249 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.117 + 100.64.69.117 + ["Exploiting Host"] + 0.6203125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.20 + 100.64.68.20 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.118 + 100.64.69.118 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.119 + 100.64.69.119 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684683 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a36cd80-928d-11ee-92fb-e74bdedb3c0b + + + diff --git a/graph/incidents_graphml/7/7a3af230-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a3af230-8616-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b01c553dfb13537b63ba956963787d888023a36c --- /dev/null +++ b/graph/incidents_graphml/7/7a3af230-8616-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.211 + 100.64.45.211 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700314159 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a3af230-8616-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/7/7a3b7930-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7a3b7930-4a93-11ee-8b5b-ed2e81dcf9e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1752912c01cd49faaaf740a7dd832335b4be04a --- /dev/null +++ b/graph/incidents_graphml/7/7a3b7930-4a93-11ee-8b5b-ed2e81dcf9e7.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.190 + 100.64.95.190 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1693770776 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a3b7930-4a93-11ee-8b5b-ed2e81dcf9e7 + + + INCIDENT_LINK + 1693770776 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a3b7930-4a93-11ee-8b5b-ed2e81dcf9e7 + + + diff --git a/graph/incidents_graphml/7/7a3b7e60-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7a3b7e60-23ca-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79ff35443182c29761de9d3da7d894435b7751f1 --- /dev/null +++ b/graph/incidents_graphml/7/7a3b7e60-23ca-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.242 + 100.64.22.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717653801 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a3b7e60-23ca-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/7/7a400100-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7a400100-3fff-11ef-99da-f9fbcaa4b405.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f15e9481429641e0fefec39e073422250badb6c --- /dev/null +++ b/graph/incidents_graphml/7/7a400100-3fff-11ef-99da-f9fbcaa4b405.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.30 + 100.64.53.30 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720755197 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a400100-3fff-11ef-99da-f9fbcaa4b405 + + + diff --git a/graph/incidents_graphml/7/7a44a150-263e-11ee-8f39-83af752ea491.graphml b/graph/incidents_graphml/7/7a44a150-263e-11ee-8f39-83af752ea491.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45d3c8a27774ee466464b4fb4373a88c8bdb7c3f --- /dev/null +++ b/graph/incidents_graphml/7/7a44a150-263e-11ee-8f39-83af752ea491.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.36 + 100.64.64.36 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689776027 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a44a150-263e-11ee-8f39-83af752ea491 + + + diff --git a/graph/incidents_graphml/7/7a4a5b80-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a4a5b80-8616-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27fc38017a6b55930f1cb1880d23f6dc1da2d798 --- /dev/null +++ b/graph/incidents_graphml/7/7a4a5b80-8616-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.211 + 100.64.45.211 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700314159 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a4a5b80-8616-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/7/7a4b0990-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7a4b0990-4a93-11ee-8b5b-ed2e81dcf9e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9de9f056a1f01c70ddbc0cbe50843f743233d023 --- /dev/null +++ b/graph/incidents_graphml/7/7a4b0990-4a93-11ee-8b5b-ed2e81dcf9e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.95.190 + 100.64.95.190 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693770776 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a4b0990-4a93-11ee-8b5b-ed2e81dcf9e7 + + + diff --git a/graph/incidents_graphml/7/7a4bf920-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7a4bf920-23ca-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e35377409ec3e8fd7b35bc7f873809a924ff3dc4 --- /dev/null +++ b/graph/incidents_graphml/7/7a4bf920-23ca-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.242 + 100.64.22.242 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1717653801 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a4bf920-23ca-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/7/7a531e10-ff1f-11ed-8129-cd2d5cf37ca1.graphml b/graph/incidents_graphml/7/7a531e10-ff1f-11ed-8129-cd2d5cf37ca1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfaed6fbd51944f75009ae86f7b059886c82858f --- /dev/null +++ b/graph/incidents_graphml/7/7a531e10-ff1f-11ed-8129-cd2d5cf37ca1.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.8 + 100.64.9.8 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.9.9 + 100.64.9.9 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.9.10 + 100.64.9.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.11 + 100.64.9.11 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.12 + 100.64.9.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.9.13 + 100.64.9.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.14 + 100.64.9.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.15 + 100.64.9.15 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.16 + 100.64.9.16 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.9.17 + 100.64.9.17 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.18 + 100.64.9.18 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.19 + 100.64.9.19 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.9.20 + 100.64.9.20 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.90 + 100.64.4.90 + ["Exploiting Target","Exploiting Host"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.21 + 100.64.9.21 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.22 + 100.64.9.22 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.23 + 100.64.9.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + INCIDENT_LINK + 1685474618 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a531e10-ff1f-11ed-8129-cd2d5cf37ca1 + + + diff --git a/graph/incidents_graphml/7/7a5698a0-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7a5698a0-1dac-11ee-a6c7-eb84cfc6792e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c783ccaf02760e09a72ef6e49a101cf6d5a67443 --- /dev/null +++ b/graph/incidents_graphml/7/7a5698a0-1dac-11ee-a6c7-eb84cfc6792e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.45.137 + USER-0015-1359.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688833712 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a5698a0-1dac-11ee-a6c7-eb84cfc6792e + + + diff --git a/graph/incidents_graphml/7/7a57f010-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a57f010-8616-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a10b10fd0414e280e4bb69e4201157d6d0ae6bc --- /dev/null +++ b/graph/incidents_graphml/7/7a57f010-8616-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.179 + 100.64.12.179 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700314159 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a57f010-8616-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/7/7a580130-1114-11ee-9311-e18c92d5b3d3.graphml b/graph/incidents_graphml/7/7a580130-1114-11ee-9311-e18c92d5b3d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e14e77fa2f60aa7ea9d7453b431dcfc6244e174 --- /dev/null +++ b/graph/incidents_graphml/7/7a580130-1114-11ee-9311-e18c92d5b3d3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.104 + 100.64.41.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.173 + 100.64.72.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.59.158 + 100.64.59.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687449014 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a580130-1114-11ee-9311-e18c92d5b3d3 + + + INCIDENT_LINK + 1687449014 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a580130-1114-11ee-9311-e18c92d5b3d3 + + + INCIDENT_LINK + 1687449014 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a580130-1114-11ee-9311-e18c92d5b3d3 + + + INCIDENT_LINK + 1687449014 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a580130-1114-11ee-9311-e18c92d5b3d3 + + + diff --git a/graph/incidents_graphml/7/7a5854f0-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/7/7a5854f0-23b7-11ed-a328-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce31819b80e9f1f66dd4f2558c0588519913f591 --- /dev/null +++ b/graph/incidents_graphml/7/7a5854f0-23b7-11ed-a328-9fe2f28e2833.graphml @@ -0,0 +1,775 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.183 + 100.64.85.183 + ["Exploiting Host"] + 0.930390625 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.184 + 100.64.85.184 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.22.152 + 100.64.22.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.185 + 100.64.85.185 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.39.217 + 100.64.39.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.186 + 100.64.85.186 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.187 + 100.64.85.187 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.3.124 + 100.64.3.124 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.188 + 100.64.85.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.217 + 100.64.14.217 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.189 + 100.64.85.189 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.190 + 100.64.85.190 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.143 + 100.64.39.143 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.191 + 100.64.85.191 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.192 + 100.64.85.192 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.202 + 100.64.6.202 + ["Exploiting Host","Exploiting Target"] + 0.983125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350645 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a5854f0-23b7-11ed-a328-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/7/7a5882a0-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7a5882a0-592f-11ee-a8a5-b59feb9cfe2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65a7277dfaa9b1d02978180bb69dd01d9a8792d4 --- /dev/null +++ b/graph/incidents_graphml/7/7a5882a0-592f-11ee-a8a5-b59feb9cfe2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.126 + 100.64.64.126 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695377094 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7a5882a0-592f-11ee-a8a5-b59feb9cfe2c + + + diff --git a/graph/incidents_graphml/7/7a59f1a0-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7a59f1a0-3fff-11ef-99da-f9fbcaa4b405.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb1d3d36946462f1d0bc5cd487ad2aa69bb24ec9 --- /dev/null +++ b/graph/incidents_graphml/7/7a59f1a0-3fff-11ef-99da-f9fbcaa4b405.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.30 + 100.64.53.30 + ["Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720755197 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a59f1a0-3fff-11ef-99da-f9fbcaa4b405 + + + diff --git a/graph/incidents_graphml/7/7a5bf980-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7a5bf980-4a93-11ee-8b5b-ed2e81dcf9e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f89db0d20196c0dca4b164a9ac49e74330768d5 --- /dev/null +++ b/graph/incidents_graphml/7/7a5bf980-4a93-11ee-8b5b-ed2e81dcf9e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.192 + USER-0015-2142.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693770776 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a5bf980-4a93-11ee-8b5b-ed2e81dcf9e7 + + + diff --git a/graph/incidents_graphml/7/7a681cb0-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a681cb0-8616-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3417a9c00adf865de900dedc11705308011e29a8 --- /dev/null +++ b/graph/incidents_graphml/7/7a681cb0-8616-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.179 + 100.64.12.179 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700314159 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a681cb0-8616-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/7/7a7369b0-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7a7369b0-0c38-11ee-9256-6d0394834f57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb347879c6f7b405e8db5c44b8bf9afbf63bd9d2 --- /dev/null +++ b/graph/incidents_graphml/7/7a7369b0-0c38-11ee-9256-6d0394834f57.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.70 + 100.64.36.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.212 + 100.64.3.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.71 + 100.64.36.71 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.72 + 100.64.36.72 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.73 + 100.64.36.73 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.74 + 100.64.36.74 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a7369b0-0c38-11ee-9256-6d0394834f57 + + + diff --git a/graph/incidents_graphml/7/7a75ff60-8616-11ee-aad5-255bef0b512c.graphml b/graph/incidents_graphml/7/7a75ff60-8616-11ee-aad5-255bef0b512c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c25cf8a6ed67fc59373f800d7ebc1de6ac2a76e --- /dev/null +++ b/graph/incidents_graphml/7/7a75ff60-8616-11ee-aad5-255bef0b512c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.201 + 100.64.12.201 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700314159 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7a75ff60-8616-11ee-aad5-255bef0b512c + + + diff --git a/graph/incidents_graphml/7/7a782e80-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7a782e80-0870-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1debc4d7e8969ff014c949a154f244001160a4a3 --- /dev/null +++ b/graph/incidents_graphml/7/7a782e80-0870-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.56 + 100.64.21.56 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686498968 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a782e80-0870-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/7/7a7cc7f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7a7cc7f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea97e3bddcd82dbd6aa287a94c6fa2a0814a8439 --- /dev/null +++ b/graph/incidents_graphml/7/7a7cc7f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.36.15 + 100.64.36.15 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693770777 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a7cc7f0-4a93-11ee-8b5b-ed2e81dcf9e7 + + + diff --git a/graph/incidents_graphml/7/7a9034a0-106f-11ef-9de3-e13309ab258b.graphml b/graph/incidents_graphml/7/7a9034a0-106f-11ef-9de3-e13309ab258b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13c5a32cadd452652e1347f378324f4ff7bd7d7e --- /dev/null +++ b/graph/incidents_graphml/7/7a9034a0-106f-11ef-9de3-e13309ab258b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.46.208 + 172.16.46.208 + ["Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.235 + 100.64.91.235 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1715525645 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a9034a0-106f-11ef-9de3-e13309ab258b + + + diff --git a/graph/incidents_graphml/7/7a917900-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7a917900-0c38-11ee-9256-6d0394834f57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe8ccf2d8460670811f4f53eae31b86647e7f6fa --- /dev/null +++ b/graph/incidents_graphml/7/7a917900-0c38-11ee-9256-6d0394834f57.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.80 + 100.64.36.80 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.81 + 100.64.36.81 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.82 + 100.64.36.82 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.83 + 100.64.36.83 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.84 + 100.64.36.84 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.47 + 100.64.11.47 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914721 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a917900-0c38-11ee-9256-6d0394834f57 + + + diff --git a/graph/incidents_graphml/7/7a968bf0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7a968bf0-0870-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e658159ad525eff11190cf3a5bdf505a548cf671 --- /dev/null +++ b/graph/incidents_graphml/7/7a968bf0-0870-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,135 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.119 + 100.64.7.119 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.58 + 100.64.21.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.105.23.131 + 10.105.23.131 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686498968 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a968bf0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498968 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a968bf0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498968 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a968bf0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498968 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a968bf0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498968 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a968bf0-0870-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/7/7a976740-277e-11ef-8c37-3d33f474c8fc.graphml b/graph/incidents_graphml/7/7a976740-277e-11ef-8c37-3d33f474c8fc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a5a102e8338098ed962447a287c312fb1db167d --- /dev/null +++ b/graph/incidents_graphml/7/7a976740-277e-11ef-8c37-3d33f474c8fc.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.42.189 + 172.31.42.189 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.88.87 + 100.64.88.87 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.1.77 + 100.64.1.77 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.4 + 100.64.87.4 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1718060964 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a976740-277e-11ef-8c37-3d33f474c8fc + + + INCIDENT_LINK + 1718060964 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a976740-277e-11ef-8c37-3d33f474c8fc + + + INCIDENT_LINK + 1718060964 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a976740-277e-11ef-8c37-3d33f474c8fc + + + INCIDENT_LINK + 1718060964 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a976740-277e-11ef-8c37-3d33f474c8fc + + + INCIDENT_LINK + 1718060964 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a976740-277e-11ef-8c37-3d33f474c8fc + + + INCIDENT_LINK + 1718060964 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a976740-277e-11ef-8c37-3d33f474c8fc + + + diff --git a/graph/incidents_graphml/7/7a9d42b0-038e-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/7/7a9d42b0-038e-11ee-8785-53111c12ea35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..23c396b829b71374e921d6af5d90ceefedaf052e --- /dev/null +++ b/graph/incidents_graphml/7/7a9d42b0-038e-11ee-8785-53111c12ea35.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.191 + 100.64.77.191 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.76.37 + 100.64.76.37 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685962097 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a9d42b0-038e-11ee-8785-53111c12ea35 + + + INCIDENT_LINK + 1685962097 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7a9d42b0-038e-11ee-8785-53111c12ea35 + + + diff --git a/graph/incidents_graphml/7/7a9f9230-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7a9f9230-4a93-11ee-8b5b-ed2e81dcf9e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdf8f596190baa629ac6ef68806311e6de55d224 --- /dev/null +++ b/graph/incidents_graphml/7/7a9f9230-4a93-11ee-8b5b-ed2e81dcf9e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.194 + 100.64.95.194 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693770777 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7a9f9230-4a93-11ee-8b5b-ed2e81dcf9e7 + + + diff --git a/graph/incidents_graphml/7/7aa00090-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/7aa00090-dd81-11ee-bdd6-3b03475da548.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abde2a63d1bd57ae5be848489b5f0dd8997a756a --- /dev/null +++ b/graph/incidents_graphml/7/7aa00090-dd81-11ee-bdd6-3b03475da548.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.23.66 + 100.64.23.66 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709925867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7aa00090-dd81-11ee-bdd6-3b03475da548 + + + diff --git a/graph/incidents_graphml/7/7aa4d300-6887-11ee-93c3-d1b25d4a11e4.graphml b/graph/incidents_graphml/7/7aa4d300-6887-11ee-93c3-d1b25d4a11e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b49ba7f465ec7321448a1e9c10ee405c41728fa --- /dev/null +++ b/graph/incidents_graphml/7/7aa4d300-6887-11ee-93c3-d1b25d4a11e4.graphml @@ -0,0 +1,797 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.91 + 100.64.40.91 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.134 + 100.64.40.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.135 + 100.64.40.135 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.136 + 100.64.40.136 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.43 + 100.64.35.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.111 + 100.64.13.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.187 + 100.64.33.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.89 + 100.64.33.89 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.137 + 100.64.40.137 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.138 + 100.64.40.138 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.139 + 100.64.40.139 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.140 + 100.64.40.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.141 + 100.64.40.141 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.142 + 100.64.40.142 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.143 + 100.64.40.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.53 + 100.64.33.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.144 + 100.64.40.144 + ["Exploiting Host"] + 0.7525 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.145 + 100.64.40.145 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.174 + 100.64.13.174 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + INCIDENT_LINK + 1697064158 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7aa4d300-6887-11ee-93c3-d1b25d4a11e4 + + + diff --git a/graph/incidents_graphml/7/7aa838b0-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7aa838b0-3fff-11ef-99da-f9fbcaa4b405.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6009580049fee91a98eee5a6177927913e9ba01a --- /dev/null +++ b/graph/incidents_graphml/7/7aa838b0-3fff-11ef-99da-f9fbcaa4b405.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.30 + 100.64.53.30 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720755198 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7aa838b0-3fff-11ef-99da-f9fbcaa4b405 + + + diff --git a/graph/incidents_graphml/7/7aadf5c0-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/7/7aadf5c0-182d-11ee-88ad-19cfc5af29bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91344bfbf2159518ad6687e9046455c308a24c0f --- /dev/null +++ b/graph/incidents_graphml/7/7aadf5c0-182d-11ee-88ad-19cfc5af29bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.182 + 100.64.77.182 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.77 + 100.64.73.77 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688229410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7aadf5c0-182d-11ee-88ad-19cfc5af29bb + + + diff --git a/graph/incidents_graphml/7/7ab00d10-10e4-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/7/7ab00d10-10e4-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66b7fef40cae2e1215e47d39cedaffde87881d8e --- /dev/null +++ b/graph/incidents_graphml/7/7ab00d10-10e4-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.152 + 100.64.7.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.37 + 100.64.1.37 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687428399 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ab00d10-10e4-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687428399 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ab00d10-10e4-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/7/7ab08b10-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/7ab08b10-34fb-11ee-9ec4-97bf79cb287b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9213194448846e8410e33ca8f2bf771a0131991 --- /dev/null +++ b/graph/incidents_graphml/7/7ab08b10-34fb-11ee-9ec4-97bf79cb287b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.188 + 100.64.46.188 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691396519 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7ab08b10-34fb-11ee-9ec4-97bf79cb287b + + + diff --git a/graph/incidents_graphml/7/7ab0a260-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/7ab0a260-dd81-11ee-bdd6-3b03475da548.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5559b4c25844e718d986591824c2aa099b5af98e --- /dev/null +++ b/graph/incidents_graphml/7/7ab0a260-dd81-11ee-bdd6-3b03475da548.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.36.238 + 100.64.36.238 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1709925867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7ab0a260-dd81-11ee-bdd6-3b03475da548 + + + INCIDENT_LINK + 1709925867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7ab0a260-dd81-11ee-bdd6-3b03475da548 + + + diff --git a/graph/incidents_graphml/7/7ab25c10-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7ab25c10-23ca-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..479b2c8643068df217c827169f007fda1bdc0bf1 --- /dev/null +++ b/graph/incidents_graphml/7/7ab25c10-23ca-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.28 + 100.64.60.28 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717653802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ab25c10-23ca-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/7/7ab362c0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7ab362c0-0870-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be9ba7e052f82555bbeeeaa78d9027eed73b903d --- /dev/null +++ b/graph/incidents_graphml/7/7ab362c0-0870-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.119 + 100.64.7.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686498968 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7ab362c0-0870-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/7/7ab38f60-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7ab38f60-4a93-11ee-8b5b-ed2e81dcf9e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4db45c44fdc97371b42f0578a50e38d33329f94d --- /dev/null +++ b/graph/incidents_graphml/7/7ab38f60-4a93-11ee-8b5b-ed2e81dcf9e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.224 + 100.64.32.224 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1693770777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ab38f60-4a93-11ee-8b5b-ed2e81dcf9e7 + + + diff --git a/graph/incidents_graphml/7/7ab4f4a0-35bb-11ee-95a2-5f9786093780.graphml b/graph/incidents_graphml/7/7ab4f4a0-35bb-11ee-95a2-5f9786093780.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34131fe288cf6c9f9d857a1d9e862aba6b97090a --- /dev/null +++ b/graph/incidents_graphml/7/7ab4f4a0-35bb-11ee-95a2-5f9786093780.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.141 + 100.64.80.141 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1691478983 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ab4f4a0-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691478983 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ab4f4a0-35bb-11ee-95a2-5f9786093780 + + + diff --git a/graph/incidents_graphml/7/7abac700-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/7/7abac700-182d-11ee-88ad-19cfc5af29bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e905dd77c9aed36526014e2f41442f23b4b8d14 --- /dev/null +++ b/graph/incidents_graphml/7/7abac700-182d-11ee-88ad-19cfc5af29bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.77 + 100.64.73.77 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.182 + 100.64.77.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688229410 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7abac700-182d-11ee-88ad-19cfc5af29bb + + + diff --git a/graph/incidents_graphml/7/7ac3bc00-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7ac3bc00-4a93-11ee-8b5b-ed2e81dcf9e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d77ad895ab6415b215d039bdb4110b8c2abddcbb --- /dev/null +++ b/graph/incidents_graphml/7/7ac3bc00-4a93-11ee-8b5b-ed2e81dcf9e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.32.224 + 100.64.32.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693770777 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ac3bc00-4a93-11ee-8b5b-ed2e81dcf9e7 + + + diff --git a/graph/incidents_graphml/7/7ac4e870-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7ac4e870-3fff-11ef-99da-f9fbcaa4b405.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5150f495dbffc07d2050537b3e65385bd8defec1 --- /dev/null +++ b/graph/incidents_graphml/7/7ac4e870-3fff-11ef-99da-f9fbcaa4b405.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.30 + 100.64.53.30 + ["Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720755198 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ac4e870-3fff-11ef-99da-f9fbcaa4b405 + + + diff --git a/graph/incidents_graphml/7/7acbd780-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7acbd780-23ca-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26139c5b8831080ad4184cc60c94d0ad1f67f45b --- /dev/null +++ b/graph/incidents_graphml/7/7acbd780-23ca-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.28 + 100.64.60.28 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717653802 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acbd780-23ca-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/7/7acc7c90-8be4-11ee-9efd-252771b20c20.graphml b/graph/incidents_graphml/7/7acc7c90-8be4-11ee-9efd-252771b20c20.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bb5b9ae1f6e53653863892b8d48118e7c4a3b61 --- /dev/null +++ b/graph/incidents_graphml/7/7acc7c90-8be4-11ee-9efd-252771b20c20.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.127 + 100.64.17.127 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.241 + 100.64.33.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.242 + 100.64.33.242 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.243 + 100.64.33.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.244 + 100.64.33.244 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.245 + 100.64.33.245 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.246 + 100.64.33.246 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.247 + 100.64.33.247 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.36 + 100.64.14.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + INCIDENT_LINK + 1700952392 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7acc7c90-8be4-11ee-9efd-252771b20c20 + + + diff --git a/graph/incidents_graphml/7/7ad107e0-4ec4-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/7/7ad107e0-4ec4-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a30709f6c0f6eef7b263bd4dc505f9f4e1b412a --- /dev/null +++ b/graph/incidents_graphml/7/7ad107e0-4ec4-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.99 + 100.64.11.99 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694231627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ad107e0-4ec4-11ee-81d4-670b4c6897d4 + + + INCIDENT_LINK + 1694231627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ad107e0-4ec4-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/7/7ad5b7d0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7ad5b7d0-0870-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82fe71718846239dc8862ea07bcff0b44b617f33 --- /dev/null +++ b/graph/incidents_graphml/7/7ad5b7d0-0870-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.60 + 100.64.21.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686498968 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ad5b7d0-0870-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/7/7ae68640-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7ae68640-4a93-11ee-8b5b-ed2e81dcf9e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b43850f383a99f80564cd1b500bb458640723d8 --- /dev/null +++ b/graph/incidents_graphml/7/7ae68640-4a93-11ee-8b5b-ed2e81dcf9e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.26.110 + 100.64.26.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693770777 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ae68640-4a93-11ee-8b5b-ed2e81dcf9e7 + + + diff --git a/graph/incidents_graphml/7/7ae71ab0-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7ae71ab0-3517-11ee-9c89-2d8bbcce3119.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aee6223f8fec243aa6428bf626f5df97fbea570c --- /dev/null +++ b/graph/incidents_graphml/7/7ae71ab0-3517-11ee-9c89-2d8bbcce3119.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.210 + 100.64.38.210 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408545 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7ae71ab0-3517-11ee-9c89-2d8bbcce3119 + + + diff --git a/graph/incidents_graphml/7/7afa08b0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7afa08b0-0870-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c47f22913287e83a0be0177e1d5225a5ca63c941 --- /dev/null +++ b/graph/incidents_graphml/7/7afa08b0-0870-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.60 + 100.64.21.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686498969 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7afa08b0-0870-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/7/7afb9410-4ac3-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/7/7afb9410-4ac3-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45c366a2c894db87a700cb85732960d4eab44906 --- /dev/null +++ b/graph/incidents_graphml/7/7afb9410-4ac3-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,475 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.230 + 100.64.20.230 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.30 + 100.64.14.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.208 + 100.64.20.208 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.231 + 100.64.20.231 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.232 + 100.64.20.232 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.233 + 100.64.20.233 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.234 + 100.64.20.234 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.235 + 100.64.20.235 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.236 + 100.64.20.236 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791393 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7afb9410-4ac3-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/7/7b0091e0-3fff-11ef-99da-f9fbcaa4b405.graphml b/graph/incidents_graphml/7/7b0091e0-3fff-11ef-99da-f9fbcaa4b405.graphml new file mode 100644 index 0000000000000000000000000000000000000000..354acb843a1de26328abe5bc2158d178f39b4a63 --- /dev/null +++ b/graph/incidents_graphml/7/7b0091e0-3fff-11ef-99da-f9fbcaa4b405.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.136 + 100.64.5.136 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720755198 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b0091e0-3fff-11ef-99da-f9fbcaa4b405 + + + diff --git a/graph/incidents_graphml/7/7b035540-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7b035540-3517-11ee-9c89-2d8bbcce3119.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0e3898e83a16a9d5b4a0bc65585db65f577d5a3 --- /dev/null +++ b/graph/incidents_graphml/7/7b035540-3517-11ee-9c89-2d8bbcce3119.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.212 + 100.64.38.212 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408546 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b035540-3517-11ee-9c89-2d8bbcce3119 + + + diff --git a/graph/incidents_graphml/7/7b0f6ff0-23b7-11ed-a328-9fe2f28e2833.graphml b/graph/incidents_graphml/7/7b0f6ff0-23b7-11ed-a328-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d607a6dfd026c94a4e5519aa795fd1f3567d320 --- /dev/null +++ b/graph/incidents_graphml/7/7b0f6ff0-23b7-11ed-a328-9fe2f28e2833.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.19.200.161 + 172.19.200.161 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.212 + 100.64.85.212 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661350646 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b0f6ff0-23b7-11ed-a328-9fe2f28e2833 + + + INCIDENT_LINK + 1661350646 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b0f6ff0-23b7-11ed-a328-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/7/7b0ff320-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/7b0ff320-125f-11ee-8a81-b1159645422c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e93a5f18d1e7c04545217f4a910fbf5233d758fb --- /dev/null +++ b/graph/incidents_graphml/7/7b0ff320-125f-11ee-8a81-b1159645422c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.190 + 100.64.47.190 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687591179 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b0ff320-125f-11ee-8a81-b1159645422c + + + diff --git a/graph/incidents_graphml/7/7b1425f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7b1425f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95caa3d07b8fe13dac93eda76e55b90c799d7df8 --- /dev/null +++ b/graph/incidents_graphml/7/7b1425f0-4a93-11ee-8b5b-ed2e81dcf9e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.65.34 + 100.64.65.34 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693770778 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b1425f0-4a93-11ee-8b5b-ed2e81dcf9e7 + + + diff --git a/graph/incidents_graphml/7/7b15c9f0-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7b15c9f0-1dac-11ee-a6c7-eb84cfc6792e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f2ef880fe95b6137da4024405f35241a5f41754 --- /dev/null +++ b/graph/incidents_graphml/7/7b15c9f0-1dac-11ee-a6c7-eb84cfc6792e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.149 + 100.64.56.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688833713 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b15c9f0-1dac-11ee-a6c7-eb84cfc6792e + + + diff --git a/graph/incidents_graphml/7/7b18e010-4ac3-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/7/7b18e010-4ac3-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55ae711f1882c0bcd3f9d678bbc5a6d9daaef61a --- /dev/null +++ b/graph/incidents_graphml/7/7b18e010-4ac3-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.230 + 100.64.20.230 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693791394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b18e010-4ac3-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693791394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b18e010-4ac3-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/7/7b1a0300-6887-11ee-93c3-d1b25d4a11e4.graphml b/graph/incidents_graphml/7/7b1a0300-6887-11ee-93c3-d1b25d4a11e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e51bd90c3675826e46af61cc9be987b3442a02dd --- /dev/null +++ b/graph/incidents_graphml/7/7b1a0300-6887-11ee-93c3-d1b25d4a11e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.158 + 100.64.40.158 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697064159 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b1a0300-6887-11ee-93c3-d1b25d4a11e4 + + + diff --git a/graph/incidents_graphml/7/7b231340-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/7b231340-dd81-11ee-bdd6-3b03475da548.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb1b8f9bcf30ae4237b61ec2e46b91e94e065b7a --- /dev/null +++ b/graph/incidents_graphml/7/7b231340-dd81-11ee-bdd6-3b03475da548.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.84 + 100.64.16.84 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1709925868 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b231340-dd81-11ee-bdd6-3b03475da548 + + + diff --git a/graph/incidents_graphml/7/7b260550-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7b260550-04e3-11ed-a6aa-45e3cee3f3d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c974b1feaba810c7e681ac629c2d5a00525f2f27 --- /dev/null +++ b/graph/incidents_graphml/7/7b260550-04e3-11ed-a6aa-45e3cee3f3d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.30 + USER-0015-1729.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657961058 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b260550-04e3-11ed-a6aa-45e3cee3f3d6 + + + diff --git a/graph/incidents_graphml/7/7b2ab5a0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7b2ab5a0-0870-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61672eb31b0abd19f818d5c0fc7dc3ab3cf17b2a --- /dev/null +++ b/graph/incidents_graphml/7/7b2ab5a0-0870-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,801 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.62 + 100.64.21.62 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.63 + USER-0015-1227.example.internal + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.64 + 100.64.21.64 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.65 + 100.64.21.65 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.66 + 100.64.21.66 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.67 + 100.64.21.67 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.68 + 100.64.21.68 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.110 + 100.64.8.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.69 + 100.64.21.69 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.21 + 100.64.8.21 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.179 + USER-0015-1228.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.70 + 100.64.21.70 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.71 + USER-0015-1229.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.72 + 100.64.21.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + HOST-2906 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498969 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b2ab5a0-0870-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/7/7b2bb640-6887-11ee-93c3-d1b25d4a11e4.graphml b/graph/incidents_graphml/7/7b2bb640-6887-11ee-93c3-d1b25d4a11e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17d6789fe8a26359759f0518838a9d3ab8c8e891 --- /dev/null +++ b/graph/incidents_graphml/7/7b2bb640-6887-11ee-93c3-d1b25d4a11e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.158 + 100.64.40.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697064159 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b2bb640-6887-11ee-93c3-d1b25d4a11e4 + + + diff --git a/graph/incidents_graphml/7/7b2c59f0-eb96-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/7/7b2c59f0-eb96-11ee-8f3a-6b2412cfa52f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27252746e35311a0fe1a931c61a16881d3b76a70 --- /dev/null +++ b/graph/incidents_graphml/7/7b2c59f0-eb96-11ee-8f3a-6b2412cfa52f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.23 + 100.64.70.23 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Okta","PAN NGFW"] + + + INCIDENT_LINK + 1711474203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b2c59f0-eb96-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b2c59f0-eb96-11ee-8f3a-6b2412cfa52f + + + diff --git a/graph/incidents_graphml/7/7b317700-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7b317700-04e3-11ed-a6aa-45e3cee3f3d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..591393a4e46637c38a291ff204e8cae0094aa79c --- /dev/null +++ b/graph/incidents_graphml/7/7b317700-04e3-11ed-a6aa-45e3cee3f3d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.30 + USER-0015-1729.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657961058 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b317700-04e3-11ed-a6aa-45e3cee3f3d6 + + + diff --git a/graph/incidents_graphml/7/7b319130-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7b319130-3517-11ee-9c89-2d8bbcce3119.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51a38eb68f52347b0f8647090efc929348b676b8 --- /dev/null +++ b/graph/incidents_graphml/7/7b319130-3517-11ee-9c89-2d8bbcce3119.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.212 + 100.64.38.212 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408546 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b319130-3517-11ee-9c89-2d8bbcce3119 + + + diff --git a/graph/incidents_graphml/7/7b32d180-4a93-11ee-8b5b-ed2e81dcf9e7.graphml b/graph/incidents_graphml/7/7b32d180-4a93-11ee-8b5b-ed2e81dcf9e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f823c27d8693c402b78f424f42fbd0ffe7b46ab --- /dev/null +++ b/graph/incidents_graphml/7/7b32d180-4a93-11ee-8b5b-ed2e81dcf9e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.196 + 100.64.95.196 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1693770778 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b32d180-4a93-11ee-8b5b-ed2e81dcf9e7 + + + diff --git a/graph/incidents_graphml/7/7b34af30-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/7b34af30-34fb-11ee-9ec4-97bf79cb287b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0bf23ecd2e56b560ee996d087d44f538183a9385 --- /dev/null +++ b/graph/incidents_graphml/7/7b34af30-34fb-11ee-9ec4-97bf79cb287b.graphml @@ -0,0 +1,301 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.21 + 100.64.8.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.190 + 100.64.46.190 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.87 + 100.64.29.87 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.191 + 100.64.46.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.114 + USER-0015-1204.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.68 + 100.64.25.68 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + INCIDENT_LINK + 1691396520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b34af30-34fb-11ee-9ec4-97bf79cb287b + + + diff --git a/graph/incidents_graphml/7/7b365d30-3662-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/7/7b365d30-3662-11ef-b33d-111abc4c57da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83350c1bb4c065746bf232457539c01121fa794d --- /dev/null +++ b/graph/incidents_graphml/7/7b365d30-3662-11ef-b33d-111abc4c57da.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.153 + 100.64.44.153 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719698207 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b365d30-3662-11ef-b33d-111abc4c57da + + + INCIDENT_LINK + 1719698207 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b365d30-3662-11ef-b33d-111abc4c57da + + + diff --git a/graph/incidents_graphml/7/7b3eb190-dd81-11ee-bdd6-3b03475da548.graphml b/graph/incidents_graphml/7/7b3eb190-dd81-11ee-bdd6-3b03475da548.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67375ac6c8911ba0a68e4d65403150ed13cf0529 --- /dev/null +++ b/graph/incidents_graphml/7/7b3eb190-dd81-11ee-bdd6-3b03475da548.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.16.84 + 100.64.16.84 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1709925868 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b3eb190-dd81-11ee-bdd6-3b03475da548 + + + diff --git a/graph/incidents_graphml/7/7b4c8a30-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b4c8a30-7a9a-11ee-bfc5-c9e889c56814.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1279e0d5c3d60430ba9df3071de4a79405d0dbe7 --- /dev/null +++ b/graph/incidents_graphml/7/7b4c8a30-7a9a-11ee-bfc5-c9e889c56814.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.198 + 100.64.47.198 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699051440 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b4c8a30-7a9a-11ee-bfc5-c9e889c56814 + + + INCIDENT_LINK + 1699051440 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b4c8a30-7a9a-11ee-bfc5-c9e889c56814 + + + INCIDENT_LINK + 1699051440 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b4c8a30-7a9a-11ee-bfc5-c9e889c56814 + + + diff --git a/graph/incidents_graphml/7/7b4fe250-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/7b4fe250-125f-11ee-8a81-b1159645422c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3806719a9bcc277467437a0c90f2a2ee0e9630d --- /dev/null +++ b/graph/incidents_graphml/7/7b4fe250-125f-11ee-8a81-b1159645422c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.190 + 100.64.47.190 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687591179 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b4fe250-125f-11ee-8a81-b1159645422c + + + diff --git a/graph/incidents_graphml/7/7b5061f0-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7b5061f0-1dac-11ee-a6c7-eb84cfc6792e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea855223b49fc1e7af22212785db81bb6a587852 --- /dev/null +++ b/graph/incidents_graphml/7/7b5061f0-1dac-11ee-a6c7-eb84cfc6792e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.56.149 + 100.64.56.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688833713 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b5061f0-1dac-11ee-a6c7-eb84cfc6792e + + + diff --git a/graph/incidents_graphml/7/7b50b4f0-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/7/7b50b4f0-216e-11ee-9e0b-8dcc0a578b7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af2d28dede81cca4f861c7b1f3674dbff6e799fa --- /dev/null +++ b/graph/incidents_graphml/7/7b50b4f0-216e-11ee-9e0b-8dcc0a578b7b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.28 + 100.64.82.28 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.254 + 100.64.71.254 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689246889 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b50b4f0-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246889 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b50b4f0-216e-11ee-9e0b-8dcc0a578b7b + + + diff --git a/graph/incidents_graphml/7/7b51f750-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/7/7b51f750-81bf-11ee-967b-47c68907a0bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..374b9df61ee72978fa7d596ce3bf72a1696087f4 --- /dev/null +++ b/graph/incidents_graphml/7/7b51f750-81bf-11ee-967b-47c68907a0bd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.146 + 100.64.31.146 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1699836990 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b51f750-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836990 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b51f750-81bf-11ee-967b-47c68907a0bd + + + diff --git a/graph/incidents_graphml/7/7b56e790-12a9-11ee-abf2-25c0fa3f9e2a.graphml b/graph/incidents_graphml/7/7b56e790-12a9-11ee-abf2-25c0fa3f9e2a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4207cd3a8f2631885f738dcaf487a814d9fadfa9 --- /dev/null +++ b/graph/incidents_graphml/7/7b56e790-12a9-11ee-abf2-25c0fa3f9e2a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.204 + 100.64.41.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.38 + 100.64.73.38 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.249 + 100.64.81.249 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687622962 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b56e790-12a9-11ee-abf2-25c0fa3f9e2a + + + INCIDENT_LINK + 1687622962 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b56e790-12a9-11ee-abf2-25c0fa3f9e2a + + + INCIDENT_LINK + 1687622962 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b56e790-12a9-11ee-abf2-25c0fa3f9e2a + + + INCIDENT_LINK + 1687622962 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b56e790-12a9-11ee-abf2-25c0fa3f9e2a + + + diff --git a/graph/incidents_graphml/7/7b587110-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b587110-7a9a-11ee-bfc5-c9e889c56814.graphml new file mode 100644 index 0000000000000000000000000000000000000000..282ec532b2cbf94480e82fcee2fb6bd32c20cf4d --- /dev/null +++ b/graph/incidents_graphml/7/7b587110-7a9a-11ee-bfc5-c9e889c56814.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.177 + 100.64.62.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699051440 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b587110-7a9a-11ee-bfc5-c9e889c56814 + + + diff --git a/graph/incidents_graphml/7/7b5cc220-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7b5cc220-0870-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2d55c3a5633e7072479ca2a80a555860d53120e --- /dev/null +++ b/graph/incidents_graphml/7/7b5cc220-0870-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.62 + 100.64.21.62 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686498969 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b5cc220-0870-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/7/7b5d9010-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7b5d9010-04e3-11ed-a6aa-45e3cee3f3d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e48cb04303ff537ac772ae450efa6eb4e208aa89 --- /dev/null +++ b/graph/incidents_graphml/7/7b5d9010-04e3-11ed-a6aa-45e3cee3f3d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.31 + 100.64.76.31 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657961059 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b5d9010-04e3-11ed-a6aa-45e3cee3f3d6 + + + diff --git a/graph/incidents_graphml/7/7b66b7d0-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7b66b7d0-04e3-11ed-a6aa-45e3cee3f3d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f3e6b1f138b0ff0eafd73046c33dfe097d10945 --- /dev/null +++ b/graph/incidents_graphml/7/7b66b7d0-04e3-11ed-a6aa-45e3cee3f3d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.31 + 100.64.76.31 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657961059 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b66b7d0-04e3-11ed-a6aa-45e3cee3f3d6 + + + diff --git a/graph/incidents_graphml/7/7b67b350-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b67b350-7a9a-11ee-bfc5-c9e889c56814.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44ba04cc2d834c0aa19b9a92af1debecf6cef710 --- /dev/null +++ b/graph/incidents_graphml/7/7b67b350-7a9a-11ee-bfc5-c9e889c56814.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.177 + 100.64.62.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699051440 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b67b350-7a9a-11ee-bfc5-c9e889c56814 + + + diff --git a/graph/incidents_graphml/7/7b6c0f20-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7b6c0f20-23ca-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57b816fe3094310fa189911c384f2e26804b59bf --- /dev/null +++ b/graph/incidents_graphml/7/7b6c0f20-23ca-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.42 + 100.64.30.42 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717653803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b6c0f20-23ca-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/7/7b6d99e0-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7b6d99e0-32d4-11ee-b53b-dbf4412bf717.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a1037620a3347ccf795a2497dffeed6cb1f5e61 --- /dev/null +++ b/graph/incidents_graphml/7/7b6d99e0-32d4-11ee-b53b-dbf4412bf717.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.230 + 100.64.52.230 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691159868 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b6d99e0-32d4-11ee-b53b-dbf4412bf717 + + + diff --git a/graph/incidents_graphml/7/7b725700-4dbe-11ee-b251-912537db6da9.graphml b/graph/incidents_graphml/7/7b725700-4dbe-11ee-b251-912537db6da9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6924edf305fd152b911e0c9e884de9076842424 --- /dev/null +++ b/graph/incidents_graphml/7/7b725700-4dbe-11ee-b251-912537db6da9.graphml @@ -0,0 +1,207 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.12.189 + 100.64.12.189 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.254 + 100.64.69.254 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.255 + 100.64.69.255 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1694119100 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b725700-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119100 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b725700-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119100 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b725700-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119100 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b725700-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119100 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b725700-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119100 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b725700-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119100 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b725700-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119100 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b725700-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119100 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b725700-4dbe-11ee-b251-912537db6da9 + + + diff --git a/graph/incidents_graphml/7/7b76a770-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b76a770-7a9a-11ee-bfc5-c9e889c56814.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcbf748336b87b2d775cff40db40b24378919329 --- /dev/null +++ b/graph/incidents_graphml/7/7b76a770-7a9a-11ee-bfc5-c9e889c56814.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.191 + 100.64.53.191 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699051441 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b76a770-7a9a-11ee-bfc5-c9e889c56814 + + + diff --git a/graph/incidents_graphml/7/7b7b2e10-34fb-11ee-9ec4-97bf79cb287b.graphml b/graph/incidents_graphml/7/7b7b2e10-34fb-11ee-9ec4-97bf79cb287b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7cb35f71ce15f8efade2d4e169813216557e776a --- /dev/null +++ b/graph/incidents_graphml/7/7b7b2e10-34fb-11ee-9ec4-97bf79cb287b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.137 + USER-0015-1359.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691396520 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b7b2e10-34fb-11ee-9ec4-97bf79cb287b + + + diff --git a/graph/incidents_graphml/7/7b80a890-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7b80a890-23ca-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9a2c4a5576d7bb0c1f53c5f66000292f3e237e3 --- /dev/null +++ b/graph/incidents_graphml/7/7b80a890-23ca-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.42 + 100.64.30.42 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717653803 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b80a890-23ca-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/7/7b820e80-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7b820e80-592f-11ee-a8a5-b59feb9cfe2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4c1ceb24fe7fbd75c79efbd222c6b089c34ae98 --- /dev/null +++ b/graph/incidents_graphml/7/7b820e80-592f-11ee-a8a5-b59feb9cfe2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.128 + 100.64.64.128 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695377096 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b820e80-592f-11ee-a8a5-b59feb9cfe2c + + + diff --git a/graph/incidents_graphml/7/7b826740-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b826740-7a9a-11ee-bfc5-c9e889c56814.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60c81208a271978d48120782496a34ef868f7328 --- /dev/null +++ b/graph/incidents_graphml/7/7b826740-7a9a-11ee-bfc5-c9e889c56814.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.52 + 100.64.16.52 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699051441 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b826740-7a9a-11ee-bfc5-c9e889c56814 + + + diff --git a/graph/incidents_graphml/7/7b8381c0-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7b8381c0-3517-11ee-9c89-2d8bbcce3119.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5bc2c53cad1127f9d39aa14d26d5bc65beffc96 --- /dev/null +++ b/graph/incidents_graphml/7/7b8381c0-3517-11ee-9c89-2d8bbcce3119.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.214 + 100.64.38.214 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408546 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b8381c0-3517-11ee-9c89-2d8bbcce3119 + + + diff --git a/graph/incidents_graphml/7/7b8b0cf0-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7b8b0cf0-32d4-11ee-b53b-dbf4412bf717.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9f0c96b21e83e1788a515d090935d7f082d2897 --- /dev/null +++ b/graph/incidents_graphml/7/7b8b0cf0-32d4-11ee-b53b-dbf4412bf717.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.230 + 100.64.52.230 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691159868 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b8b0cf0-32d4-11ee-b53b-dbf4412bf717 + + + diff --git a/graph/incidents_graphml/7/7b8c3690-038e-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/7/7b8c3690-038e-11ee-8785-53111c12ea35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2fb1b8142fa39a6f2f6bed567f7f5fc753b2c61b --- /dev/null +++ b/graph/incidents_graphml/7/7b8c3690-038e-11ee-8785-53111c12ea35.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.71.221 + 100.64.71.221 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.82.170 + 100.64.82.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685962098 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b8c3690-038e-11ee-8785-53111c12ea35 + + + INCIDENT_LINK + 1685962098 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b8c3690-038e-11ee-8785-53111c12ea35 + + + INCIDENT_LINK + 1685962098 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b8c3690-038e-11ee-8785-53111c12ea35 + + + INCIDENT_LINK + 1685962098 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b8c3690-038e-11ee-8785-53111c12ea35 + + + diff --git a/graph/incidents_graphml/7/7b8ec1c0-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7b8ec1c0-41b6-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5805e18a1b6e26c573aebea250629f438b3bc7a5 --- /dev/null +++ b/graph/incidents_graphml/7/7b8ec1c0-41b6-11ed-ad31-51848920452c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.73.5 + 100.64.73.5 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664648753 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b8ec1c0-41b6-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/7/7b8ec8e0-f755-11ee-9330-cddc7b6e96b7.graphml b/graph/incidents_graphml/7/7b8ec8e0-f755-11ee-9330-cddc7b6e96b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..934819ec6711bc6d79e839bd12c55744591de224 --- /dev/null +++ b/graph/incidents_graphml/7/7b8ec8e0-f755-11ee-9330-cddc7b6e96b7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.160 + 100.64.65.160 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712765701 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b8ec8e0-f755-11ee-9330-cddc7b6e96b7 + + + diff --git a/graph/incidents_graphml/7/7b8f86a0-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7b8f86a0-7a9a-11ee-bfc5-c9e889c56814.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c3a0d50fb08acfdd23b2956950690f5b90de9464 --- /dev/null +++ b/graph/incidents_graphml/7/7b8f86a0-7a9a-11ee-bfc5-c9e889c56814.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.52 + 100.64.16.52 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699051441 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b8f86a0-7a9a-11ee-bfc5-c9e889c56814 + + + diff --git a/graph/incidents_graphml/7/7b926b40-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7b926b40-41b6-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1679bf3ee3aab240afdf017cbe6b7e699bbab57 --- /dev/null +++ b/graph/incidents_graphml/7/7b926b40-41b6-11ed-ad31-51848920452c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.6 + 100.64.73.6 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1664648753 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b926b40-41b6-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/7/7b980780-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7b980780-592f-11ee-a8a5-b59feb9cfe2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..064320b16a50b4d47801e1beed95edc892bfdd2c --- /dev/null +++ b/graph/incidents_graphml/7/7b980780-592f-11ee-a8a5-b59feb9cfe2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.54 + 100.64.39.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695377096 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7b980780-592f-11ee-a8a5-b59feb9cfe2c + + + diff --git a/graph/incidents_graphml/7/7b985eb0-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7b985eb0-41b6-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ceacb1976f72a96ccd819118395de1af107c370 --- /dev/null +++ b/graph/incidents_graphml/7/7b985eb0-41b6-11ed-ad31-51848920452c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.73.6 + 100.64.73.6 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664648753 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7b985eb0-41b6-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/7/7b99cb20-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7b99cb20-0870-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5de5b641875e1479873164fc13d3ddbde3419c09 --- /dev/null +++ b/graph/incidents_graphml/7/7b99cb20-0870-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686498970 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7b99cb20-0870-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/7/7b9db360-3c10-11ee-96ec-5323ee82cf36.graphml b/graph/incidents_graphml/7/7b9db360-3c10-11ee-96ec-5323ee82cf36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08d78b063d5cec4da7f1a3f2c54f611340e809a9 --- /dev/null +++ b/graph/incidents_graphml/7/7b9db360-3c10-11ee-96ec-5323ee82cf36.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.202 + 100.64.68.202 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.20.30 + 100.64.20.30 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692175198 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b9db360-3c10-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692175198 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b9db360-3c10-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692175198 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b9db360-3c10-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692175198 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b9db360-3c10-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692175198 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b9db360-3c10-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692175198 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7b9db360-3c10-11ee-96ec-5323ee82cf36 + + + diff --git a/graph/incidents_graphml/7/7ba132f0-928d-11ee-92fb-e74bdedb3c0b.graphml b/graph/incidents_graphml/7/7ba132f0-928d-11ee-92fb-e74bdedb3c0b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18276869eb603bb19ee819306de2bdf7d8eb9dad --- /dev/null +++ b/graph/incidents_graphml/7/7ba132f0-928d-11ee-92fb-e74bdedb3c0b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.242 + 100.64.12.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1701684685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ba132f0-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ba132f0-928d-11ee-92fb-e74bdedb3c0b + + + diff --git a/graph/incidents_graphml/7/7ba7e600-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7ba7e600-592f-11ee-a8a5-b59feb9cfe2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9649bca34991464ce54038a39ce5d4e32213908 --- /dev/null +++ b/graph/incidents_graphml/7/7ba7e600-592f-11ee-a8a5-b59feb9cfe2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.54 + 100.64.39.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695377096 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ba7e600-592f-11ee-a8a5-b59feb9cfe2c + + + diff --git a/graph/incidents_graphml/7/7bb5c410-043d-11ee-8693-9b63b760243c.graphml b/graph/incidents_graphml/7/7bb5c410-043d-11ee-8693-9b63b760243c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6814f762a83389fda89dece3ddfd258b7aa1906 --- /dev/null +++ b/graph/incidents_graphml/7/7bb5c410-043d-11ee-8693-9b63b760243c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.90 + 100.64.12.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.178 + 100.64.72.178 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1686037261 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7bb5c410-043d-11ee-8693-9b63b760243c + + + INCIDENT_LINK + 1686037261 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7bb5c410-043d-11ee-8693-9b63b760243c + + + diff --git a/graph/incidents_graphml/7/7bc0b1d0-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7bc0b1d0-3517-11ee-9c89-2d8bbcce3119.graphml new file mode 100644 index 0000000000000000000000000000000000000000..47403bddbd9acef3edfedb0d1d98300d56c2befc --- /dev/null +++ b/graph/incidents_graphml/7/7bc0b1d0-3517-11ee-9c89-2d8bbcce3119.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.216 + 100.64.38.216 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408547 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7bc0b1d0-3517-11ee-9c89-2d8bbcce3119 + + + diff --git a/graph/incidents_graphml/7/7bceae60-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7bceae60-2e2e-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9c67571396da8ba074071ceda96ef064cf59d5b --- /dev/null +++ b/graph/incidents_graphml/7/7bceae60-2e2e-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.202 + 100.64.14.202 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690648767 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7bceae60-2e2e-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/7/7bdeaea0-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/7/7bdeaea0-2122-11ee-9a61-05dd24aa353e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..31e4e41e195e4503701b0ddf1404bd6c3c4f8e39 --- /dev/null +++ b/graph/incidents_graphml/7/7bdeaea0-2122-11ee-9a61-05dd24aa353e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.127 + 100.64.69.127 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1689214248 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7bdeaea0-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214248 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7bdeaea0-2122-11ee-9a61-05dd24aa353e + + + diff --git a/graph/incidents_graphml/7/7be26ce0-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7be26ce0-0870-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d65a2757a18a44b8be9289311e1e6e348ab6b8d3 --- /dev/null +++ b/graph/incidents_graphml/7/7be26ce0-0870-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686498970 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7be26ce0-0870-11ee-93d6-d5b5411f7922 + + + INCIDENT_LINK + 1686498970 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7be26ce0-0870-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/7/7be42550-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7be42550-23ca-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db10b72faaed0f60e124156386928b4af83ad446 --- /dev/null +++ b/graph/incidents_graphml/7/7be42550-23ca-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.128 + 100.64.26.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717653804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7be42550-23ca-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/7/7be61d10-9456-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/7/7be61d10-9456-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11009f9dd8acf9e92167aa5b509d9f992367c9e5 --- /dev/null +++ b/graph/incidents_graphml/7/7be61d10-9456-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.65 + 100.64.72.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1673733468 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7be61d10-9456-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/7/7be83700-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7be83700-3517-11ee-9c89-2d8bbcce3119.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1181849c863ab68e6696867eb334be3fe199c52 --- /dev/null +++ b/graph/incidents_graphml/7/7be83700-3517-11ee-9c89-2d8bbcce3119.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.218 + 100.64.38.218 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408547 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7be83700-3517-11ee-9c89-2d8bbcce3119 + + + diff --git a/graph/incidents_graphml/7/7becfed0-04e3-11ed-a6aa-45e3cee3f3d6.graphml b/graph/incidents_graphml/7/7becfed0-04e3-11ed-a6aa-45e3cee3f3d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f26150b3bb631014abdbd3de595c24c8b27f466 --- /dev/null +++ b/graph/incidents_graphml/7/7becfed0-04e3-11ed-a6aa-45e3cee3f3d6.graphml @@ -0,0 +1,803 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.33 + 100.64.76.33 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.233 + 100.64.73.233 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.34 + 100.64.76.34 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.35 + 100.64.76.35 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.51 + 100.64.73.51 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.36 + 100.64.76.36 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.37 + 100.64.76.37 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.38 + 100.64.76.38 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.39 + 100.64.76.39 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.38.73 + 100.64.38.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.40 + 100.64.76.40 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.41 + 100.64.76.41 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.59.60 + 100.64.59.60 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.240 + 100.64.71.240 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.76.42 + 100.64.76.42 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.43 + 100.64.76.43 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.44 + 100.64.76.44 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.93 + 100.64.74.93 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.58.251 + 100.64.58.251 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.21 + 100.64.73.21 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + INCIDENT_LINK + 1657961060 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7becfed0-04e3-11ed-a6aa-45e3cee3f3d6 + + + diff --git a/graph/incidents_graphml/7/7bee2460-e103-11ee-81a0-b5a2af2ec372.graphml b/graph/incidents_graphml/7/7bee2460-e103-11ee-81a0-b5a2af2ec372.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef1efb6ffd58690d413305c5ffca6b3269cad543 --- /dev/null +++ b/graph/incidents_graphml/7/7bee2460-e103-11ee-81a0-b5a2af2ec372.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.160 + 100.64.42.160 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710311557 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7bee2460-e103-11ee-81a0-b5a2af2ec372 + + + diff --git a/graph/incidents_graphml/7/7bf02460-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7bf02460-1dac-11ee-a6c7-eb84cfc6792e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a1b7e57555232b69b17f3a31ca3a42860dd6172 --- /dev/null +++ b/graph/incidents_graphml/7/7bf02460-1dac-11ee-a6c7-eb84cfc6792e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.44.254 + USER-0015-2099.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688833714 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7bf02460-1dac-11ee-a6c7-eb84cfc6792e + + + diff --git a/graph/incidents_graphml/7/7bf039c0-26d3-11ee-ac10-e7e87ad84b9c.graphml b/graph/incidents_graphml/7/7bf039c0-26d3-11ee-ac10-e7e87ad84b9c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..909c22d179907b59f531614f31ac7c0768897516 --- /dev/null +++ b/graph/incidents_graphml/7/7bf039c0-26d3-11ee-ac10-e7e87ad84b9c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.180 + 100.64.55.180 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689840025 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7bf039c0-26d3-11ee-ac10-e7e87ad84b9c + + + diff --git a/graph/incidents_graphml/7/7bf2cf70-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7bf2cf70-32d4-11ee-b53b-dbf4412bf717.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2848f1339ac74fb49b1b9ce9251f0400a54ccdb2 --- /dev/null +++ b/graph/incidents_graphml/7/7bf2cf70-32d4-11ee-b53b-dbf4412bf717.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.232 + 100.64.52.232 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691159869 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7bf2cf70-32d4-11ee-b53b-dbf4412bf717 + + + diff --git a/graph/incidents_graphml/7/7bf65d30-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7bf65d30-41b6-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32f0ef4e4f4f742bf2be8b465320df337a3fd619 --- /dev/null +++ b/graph/incidents_graphml/7/7bf65d30-41b6-11ed-ad31-51848920452c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.8 + 100.64.73.8 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1664648753 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7bf65d30-41b6-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/7/7bf90ce0-23ca-11ef-97fe-b186522e90f1.graphml b/graph/incidents_graphml/7/7bf90ce0-23ca-11ef-97fe-b186522e90f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1736e672cae98553592ac3bb8686741afad0bb28 --- /dev/null +++ b/graph/incidents_graphml/7/7bf90ce0-23ca-11ef-97fe-b186522e90f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.128 + 100.64.26.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717653804 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7bf90ce0-23ca-11ef-97fe-b186522e90f1 + + + diff --git a/graph/incidents_graphml/7/7bf98d20-0c3b-11ee-954b-d57838b91a61.graphml b/graph/incidents_graphml/7/7bf98d20-0c3b-11ee-954b-d57838b91a61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bec69141358b6d0aa491c205dda62076b69f6334 --- /dev/null +++ b/graph/incidents_graphml/7/7bf98d20-0c3b-11ee-954b-d57838b91a61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.1 + USER-0015-1253.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686916011 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7bf98d20-0c3b-11ee-954b-d57838b91a61 + + + diff --git a/graph/incidents_graphml/7/7bfb1590-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7bfb1590-2e2e-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..815a94bfdeda96e0e0fe141a5d25818473cff0ed --- /dev/null +++ b/graph/incidents_graphml/7/7bfb1590-2e2e-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.202 + 100.64.14.202 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690648768 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7bfb1590-2e2e-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/7/7bfdb030-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7bfdb030-41b6-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..740affbd0889b87cee983bf68a2974856fd7172c --- /dev/null +++ b/graph/incidents_graphml/7/7bfdb030-41b6-11ed-ad31-51848920452c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.73.8 + 100.64.73.8 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664648753 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7bfdb030-41b6-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/7/7c051010-0870-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/7/7c051010-0870-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ac48afdc28b97174bf78f53911f283fe1939bb6 --- /dev/null +++ b/graph/incidents_graphml/7/7c051010-0870-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686498970 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c051010-0870-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/7/7c0a9d30-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7c0a9d30-32d4-11ee-b53b-dbf4412bf717.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a15c74625e7411df502366e8a34114772a74cba0 --- /dev/null +++ b/graph/incidents_graphml/7/7c0a9d30-32d4-11ee-b53b-dbf4412bf717.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.232 + 100.64.52.232 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691159869 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c0a9d30-32d4-11ee-b53b-dbf4412bf717 + + + diff --git a/graph/incidents_graphml/7/7c0c3d60-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/7/7c0c3d60-73c2-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c9e25c68048f5a9c939ec672c28f0aa75a9d5d7 --- /dev/null +++ b/graph/incidents_graphml/7/7c0c3d60-73c2-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.137 + 100.64.82.137 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.133 + 100.64.72.133 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1670151466 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c0c3d60-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151466 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c0c3d60-73c2-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/7/7c0edff0-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c0edff0-52b2-11ee-9013-5fc05fa37c8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..691f9ae653555788c9198d9ef8ccba552d036259 --- /dev/null +++ b/graph/incidents_graphml/7/7c0edff0-52b2-11ee-9013-5fc05fa37c8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.106 + 100.64.19.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694663703 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c0edff0-52b2-11ee-9013-5fc05fa37c8b + + + diff --git a/graph/incidents_graphml/7/7c16bb30-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7c16bb30-8462-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..640841c007d3772dbdb10584c121b63c5c39c942 --- /dev/null +++ b/graph/incidents_graphml/7/7c16bb30-8462-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.94 + 100.64.25.94 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700126901 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c16bb30-8462-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/7/7c1c2660-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c1c2660-52b2-11ee-9013-5fc05fa37c8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8784ecf77395441aec0b22ee48dc22faa7b232c8 --- /dev/null +++ b/graph/incidents_graphml/7/7c1c2660-52b2-11ee-9013-5fc05fa37c8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.1 + 100.64.18.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694663703 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c1c2660-52b2-11ee-9013-5fc05fa37c8b + + + diff --git a/graph/incidents_graphml/7/7c1d1c80-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7c1d1c80-2e2e-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e695afd756903ef363c2cee3ee8d69e993e1605 --- /dev/null +++ b/graph/incidents_graphml/7/7c1d1c80-2e2e-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.112 + 100.64.33.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690648768 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7c1d1c80-2e2e-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/7/7c2993e0-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c2993e0-52b2-11ee-9013-5fc05fa37c8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1754599137b466b66d4e887c3181b03d2d775fe5 --- /dev/null +++ b/graph/incidents_graphml/7/7c2993e0-52b2-11ee-9013-5fc05fa37c8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.1 + 100.64.18.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694663703 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c2993e0-52b2-11ee-9013-5fc05fa37c8b + + + diff --git a/graph/incidents_graphml/7/7c365120-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7c365120-8462-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89aa7a50d0b4b0a5632c272c8da5f492e67727d7 --- /dev/null +++ b/graph/incidents_graphml/7/7c365120-8462-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.174 + 100.64.51.174 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700126902 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c365120-8462-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/7/7c372870-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c372870-52b2-11ee-9013-5fc05fa37c8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d74ba72085e0a7b9fa19b068aefc0d0ec9133150 --- /dev/null +++ b/graph/incidents_graphml/7/7c372870-52b2-11ee-9013-5fc05fa37c8b.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.245 + 100.64.13.245 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694663703 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c372870-52b2-11ee-9013-5fc05fa37c8b + + + INCIDENT_LINK + 1694663703 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c372870-52b2-11ee-9013-5fc05fa37c8b + + + diff --git a/graph/incidents_graphml/7/7c3c7180-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7c3c7180-3517-11ee-9c89-2d8bbcce3119.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86251ceaa1be6d1866a9599b03d49d940426eecf --- /dev/null +++ b/graph/incidents_graphml/7/7c3c7180-3517-11ee-9c89-2d8bbcce3119.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.140 + 100.64.23.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c3c7180-3517-11ee-9c89-2d8bbcce3119 + + + diff --git a/graph/incidents_graphml/7/7c3e85f0-c84e-11ed-9476-bf08a649e623.graphml b/graph/incidents_graphml/7/7c3e85f0-c84e-11ed-9476-bf08a649e623.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c277c4d0457b0aa53aa7bbf087c1fc1db4c9b95 --- /dev/null +++ b/graph/incidents_graphml/7/7c3e85f0-c84e-11ed-9476-bf08a649e623.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.230.47 + 172.27.230.47 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.90.106 + 100.64.90.106 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1679447493 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7c3e85f0-c84e-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447493 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7c3e85f0-c84e-11ed-9476-bf08a649e623 + + + diff --git a/graph/incidents_graphml/7/7c45a760-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c45a760-52b2-11ee-9013-5fc05fa37c8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16a442b3fc1373af1766f713b3e9a104b731039b --- /dev/null +++ b/graph/incidents_graphml/7/7c45a760-52b2-11ee-9013-5fc05fa37c8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.245 + 100.64.13.245 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694663703 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c45a760-52b2-11ee-9013-5fc05fa37c8b + + + diff --git a/graph/incidents_graphml/7/7c4b0920-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7c4b0920-26c1-11ee-87ad-dd3f4232b94e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4179de08dffd4979a98ec460f48e44b2fe711a8 --- /dev/null +++ b/graph/incidents_graphml/7/7c4b0920-26c1-11ee-87ad-dd3f4232b94e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.252 + 100.64.9.252 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689832295 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7c4b0920-26c1-11ee-87ad-dd3f4232b94e + + + diff --git a/graph/incidents_graphml/7/7c4b86d0-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7c4b86d0-8462-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8d334d84f3065d1f99facc8e72a63f2baa6eed0 --- /dev/null +++ b/graph/incidents_graphml/7/7c4b86d0-8462-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.174 + 100.64.51.174 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700126902 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c4b86d0-8462-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/7/7c4f29e0-125f-11ee-8a81-b1159645422c.graphml b/graph/incidents_graphml/7/7c4f29e0-125f-11ee-8a81-b1159645422c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..482dc09af45cb80fcff8ae9699baeb34cde70d71 --- /dev/null +++ b/graph/incidents_graphml/7/7c4f29e0-125f-11ee-8a81-b1159645422c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.192 + 100.64.47.192 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687591181 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c4f29e0-125f-11ee-8a81-b1159645422c + + + diff --git a/graph/incidents_graphml/7/7c5766c0-277e-11ef-8c37-3d33f474c8fc.graphml b/graph/incidents_graphml/7/7c5766c0-277e-11ef-8c37-3d33f474c8fc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c15844bc4f609e0b935d32de9f5d20614b9a24a5 --- /dev/null +++ b/graph/incidents_graphml/7/7c5766c0-277e-11ef-8c37-3d33f474c8fc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.226 + 100.64.38.226 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1718060967 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c5766c0-277e-11ef-8c37-3d33f474c8fc + + + diff --git a/graph/incidents_graphml/7/7c5c8b50-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7c5c8b50-1889-11ee-a72c-7b8cdfc9cafd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42206230e8f243d0ed9ebbacd44be2ea8d38bb58 --- /dev/null +++ b/graph/incidents_graphml/7/7c5c8b50-1889-11ee-a72c-7b8cdfc9cafd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.5 + 100.64.91.5 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688268927 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c5c8b50-1889-11ee-a72c-7b8cdfc9cafd + + + diff --git a/graph/incidents_graphml/7/7c5fff10-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7c5fff10-3517-11ee-9c89-2d8bbcce3119.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85ac0eb8feb8a53dc70447aa30d7ef3b8798ce99 --- /dev/null +++ b/graph/incidents_graphml/7/7c5fff10-3517-11ee-9c89-2d8bbcce3119.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.140 + 100.64.23.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7c5fff10-3517-11ee-9c89-2d8bbcce3119 + + + diff --git a/graph/incidents_graphml/7/7c727070-1f30-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/7/7c727070-1f30-11ee-9e2e-57c890ee02a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fe3bb35ef1b1114c6c6a73b79275bbbb4a21d4e --- /dev/null +++ b/graph/incidents_graphml/7/7c727070-1f30-11ee-9e2e-57c890ee02a2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.107 + 100.64.13.107 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689000360 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c727070-1f30-11ee-9e2e-57c890ee02a2 + + + diff --git a/graph/incidents_graphml/7/7c75eb40-277e-11ef-8c37-3d33f474c8fc.graphml b/graph/incidents_graphml/7/7c75eb40-277e-11ef-8c37-3d33f474c8fc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ae87752e27378000e6c19aa1502a2e87272e112 --- /dev/null +++ b/graph/incidents_graphml/7/7c75eb40-277e-11ef-8c37-3d33f474c8fc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.38.226 + 100.64.38.226 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718060968 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c75eb40-277e-11ef-8c37-3d33f474c8fc + + + diff --git a/graph/incidents_graphml/7/7c7775e0-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7c7775e0-5f20-11ee-9598-b95b2a00646d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a573ce8a30d97e9a3be3b13beed4ba3bebb7ccd7 --- /dev/null +++ b/graph/incidents_graphml/7/7c7775e0-5f20-11ee-9598-b95b2a00646d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696030362 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c7775e0-5f20-11ee-9598-b95b2a00646d + + + diff --git a/graph/incidents_graphml/7/7c7f1fd0-3517-11ee-9c89-2d8bbcce3119.graphml b/graph/incidents_graphml/7/7c7f1fd0-3517-11ee-9c89-2d8bbcce3119.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f94ba68a2d59cd0366b52e312a129c7f90a0ac3 --- /dev/null +++ b/graph/incidents_graphml/7/7c7f1fd0-3517-11ee-9c89-2d8bbcce3119.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.220 + 100.64.38.220 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691408548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c7f1fd0-3517-11ee-9c89-2d8bbcce3119 + + + diff --git a/graph/incidents_graphml/7/7c892750-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7c892750-41b6-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3223474488f835a272af1cd95cd36e4510fc216 --- /dev/null +++ b/graph/incidents_graphml/7/7c892750-41b6-11ed-ad31-51848920452c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.12 + 100.64.73.12 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1664648754 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c892750-41b6-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/7/7c8a2a70-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c8a2a70-52b2-11ee-9013-5fc05fa37c8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e276d84408cb27830328d08de81d6541405ce61 --- /dev/null +++ b/graph/incidents_graphml/7/7c8a2a70-52b2-11ee-9013-5fc05fa37c8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.128 + 100.64.30.128 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694663704 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c8a2a70-52b2-11ee-9013-5fc05fa37c8b + + + diff --git a/graph/incidents_graphml/7/7c8e83f0-1f30-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/7/7c8e83f0-1f30-11ee-9e2e-57c890ee02a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..378e667c96849f64a154492b87c67ed7d0933d71 --- /dev/null +++ b/graph/incidents_graphml/7/7c8e83f0-1f30-11ee-9e2e-57c890ee02a2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.107 + 100.64.13.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689000360 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c8e83f0-1f30-11ee-9e2e-57c890ee02a2 + + + diff --git a/graph/incidents_graphml/7/7c8fde10-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7c8fde10-41b6-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e062c01eaeb4236edfd8ee79f8fd7ac37ea93d72 --- /dev/null +++ b/graph/incidents_graphml/7/7c8fde10-41b6-11ed-ad31-51848920452c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.73.12 + 100.64.73.12 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664648754 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c8fde10-41b6-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/7/7c96a570-ff1f-11ed-8129-cd2d5cf37ca1.graphml b/graph/incidents_graphml/7/7c96a570-ff1f-11ed-8129-cd2d5cf37ca1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62d3de22e0f079a263bdedf78b323e96b8a5788d --- /dev/null +++ b/graph/incidents_graphml/7/7c96a570-ff1f-11ed-8129-cd2d5cf37ca1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.9.40 + 100.64.9.40 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685474621 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7c96a570-ff1f-11ed-8129-cd2d5cf37ca1 + + + diff --git a/graph/incidents_graphml/7/7c9b1a60-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7c9b1a60-52b2-11ee-9013-5fc05fa37c8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8cede8f6572aa0b26bf6f7ec7a08415c820ebda --- /dev/null +++ b/graph/incidents_graphml/7/7c9b1a60-52b2-11ee-9013-5fc05fa37c8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.128 + 100.64.30.128 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694663704 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c9b1a60-52b2-11ee-9013-5fc05fa37c8b + + + diff --git a/graph/incidents_graphml/7/7c9b2790-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7c9b2790-4131-11ee-8e35-ab7460ef679b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53e1b2f85149a6024640e4a46d93963da98614db --- /dev/null +++ b/graph/incidents_graphml/7/7c9b2790-4131-11ee-8e35-ab7460ef679b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.237 + 100.64.55.237 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692739129 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7c9b2790-4131-11ee-8e35-ab7460ef679b + + + diff --git a/graph/incidents_graphml/7/7c9f2910-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7c9f2910-1dac-11ee-a6c7-eb84cfc6792e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ec34a9c403899ed30855048b744ebdcb32dd2e1 --- /dev/null +++ b/graph/incidents_graphml/7/7c9f2910-1dac-11ee-a6c7-eb84cfc6792e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.17.122 + USER-0015-1214.example.internal + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688833715 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7c9f2910-1dac-11ee-a6c7-eb84cfc6792e + + + diff --git a/graph/incidents_graphml/7/7ca6e420-4462-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/7/7ca6e420-4462-11ee-853f-87a1872d184b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66c3387afe6c6bbc8c07252cee6fb317d5c54280 --- /dev/null +++ b/graph/incidents_graphml/7/7ca6e420-4462-11ee-853f-87a1872d184b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.221 + 100.64.24.221 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693090028 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ca6e420-4462-11ee-853f-87a1872d184b + + + diff --git a/graph/incidents_graphml/7/7ca8e9c0-1f30-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/7/7ca8e9c0-1f30-11ee-9e2e-57c890ee02a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b760d3b281071199b61650c2b57a3783d19d04a --- /dev/null +++ b/graph/incidents_graphml/7/7ca8e9c0-1f30-11ee-9e2e-57c890ee02a2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.109 + 100.64.13.109 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689000360 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ca8e9c0-1f30-11ee-9e2e-57c890ee02a2 + + + diff --git a/graph/incidents_graphml/7/7ca9e770-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7ca9e770-52b2-11ee-9013-5fc05fa37c8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0e7f6d782a7c51c8d6f4cfab93327f205f6c04b --- /dev/null +++ b/graph/incidents_graphml/7/7ca9e770-52b2-11ee-9013-5fc05fa37c8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.202 + 100.64.6.202 + ["Exploiting Target","Exploiting Host"] + 0.983125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694663704 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ca9e770-52b2-11ee-9013-5fc05fa37c8b + + + diff --git a/graph/incidents_graphml/7/7caa1180-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7caa1180-32d4-11ee-b53b-dbf4412bf717.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b307aaf93a85276ba5fea7af6911f4e81136292c --- /dev/null +++ b/graph/incidents_graphml/7/7caa1180-32d4-11ee-b53b-dbf4412bf717.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.239 + 100.64.31.239 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691159870 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7caa1180-32d4-11ee-b53b-dbf4412bf717 + + + diff --git a/graph/incidents_graphml/7/7caab7f0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7caab7f0-4131-11ee-8e35-ab7460ef679b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..73a9135c07586e9a5a8cde3b9f6f1b0e5a3920fc --- /dev/null +++ b/graph/incidents_graphml/7/7caab7f0-4131-11ee-8e35-ab7460ef679b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.237 + 100.64.55.237 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692739129 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7caab7f0-4131-11ee-8e35-ab7460ef679b + + + diff --git a/graph/incidents_graphml/7/7cac36a0-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7cac36a0-592f-11ee-a8a5-b59feb9cfe2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e82adf7fcf0e00cb79a6a96edc10a7b1cca8852 --- /dev/null +++ b/graph/incidents_graphml/7/7cac36a0-592f-11ee-a8a5-b59feb9cfe2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.96 + 100.64.64.96 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695377098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7cac36a0-592f-11ee-a8a5-b59feb9cfe2c + + + diff --git a/graph/incidents_graphml/7/7cb737d0-4462-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/7/7cb737d0-4462-11ee-853f-87a1872d184b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32086f43aac179cb57f54ca8406df634056eb952 --- /dev/null +++ b/graph/incidents_graphml/7/7cb737d0-4462-11ee-853f-87a1872d184b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.221 + 100.64.24.221 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693090028 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7cb737d0-4462-11ee-853f-87a1872d184b + + + diff --git a/graph/incidents_graphml/7/7cb936e0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7cb936e0-4131-11ee-8e35-ab7460ef679b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abbacaff28c6621db9f5da168ce5887d30540dd3 --- /dev/null +++ b/graph/incidents_graphml/7/7cb936e0-4131-11ee-8e35-ab7460ef679b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.239 + 100.64.55.239 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692739129 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7cb936e0-4131-11ee-8e35-ab7460ef679b + + + diff --git a/graph/incidents_graphml/7/7cbcb160-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7cbcb160-592f-11ee-a8a5-b59feb9cfe2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d70295b232e91bee86e5c25adbe9c5501bf04471 --- /dev/null +++ b/graph/incidents_graphml/7/7cbcb160-592f-11ee-a8a5-b59feb9cfe2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.96 + 100.64.64.96 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695377098 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7cbcb160-592f-11ee-a8a5-b59feb9cfe2c + + + diff --git a/graph/incidents_graphml/7/7cc498f0-29c1-11ee-92d3-75b14f8be714.graphml b/graph/incidents_graphml/7/7cc498f0-29c1-11ee-92d3-75b14f8be714.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2513ffda35974918b0df27d2915d7d710b5e91e --- /dev/null +++ b/graph/incidents_graphml/7/7cc498f0-29c1-11ee-92d3-75b14f8be714.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.83 + 100.64.7.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690162149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7cc498f0-29c1-11ee-92d3-75b14f8be714 + + + diff --git a/graph/incidents_graphml/7/7cc53aa0-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7cc53aa0-32d4-11ee-b53b-dbf4412bf717.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d410386372e68dd153b62816db51d0f1166de82 --- /dev/null +++ b/graph/incidents_graphml/7/7cc53aa0-32d4-11ee-b53b-dbf4412bf717.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.239 + 100.64.31.239 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691159870 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7cc53aa0-32d4-11ee-b53b-dbf4412bf717 + + + diff --git a/graph/incidents_graphml/7/7cc9a500-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7cc9a500-1889-11ee-a72c-7b8cdfc9cafd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..690a3ecb395711b10cb3781cf8fe9a4edd6da120 --- /dev/null +++ b/graph/incidents_graphml/7/7cc9a500-1889-11ee-a72c-7b8cdfc9cafd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.199 + USER-0015-2054.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688268927 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cc9a500-1889-11ee-a72c-7b8cdfc9cafd + + + diff --git a/graph/incidents_graphml/7/7ccc70c0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7ccc70c0-4131-11ee-8e35-ab7460ef679b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee7a91f1ee8870a5f22cfb485a4ea390fb81581c --- /dev/null +++ b/graph/incidents_graphml/7/7ccc70c0-4131-11ee-8e35-ab7460ef679b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.239 + 100.64.55.239 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692739129 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ccc70c0-4131-11ee-8e35-ab7460ef679b + + + diff --git a/graph/incidents_graphml/7/7cd59b70-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7cd59b70-5f20-11ee-9598-b95b2a00646d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a3ddad216e8c733fae8eea9c8997f6de978f395 --- /dev/null +++ b/graph/incidents_graphml/7/7cd59b70-5f20-11ee-9598-b95b2a00646d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.70 + 100.64.86.70 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1696030363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7cd59b70-5f20-11ee-9598-b95b2a00646d + + + diff --git a/graph/incidents_graphml/7/7cd653d0-4dbe-11ee-b251-912537db6da9.graphml b/graph/incidents_graphml/7/7cd653d0-4dbe-11ee-b251-912537db6da9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..372d40471ae9701013b228a916cc341ab3f895c2 --- /dev/null +++ b/graph/incidents_graphml/7/7cd653d0-4dbe-11ee-b251-912537db6da9.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1694119102 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cd653d0-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119102 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cd653d0-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119102 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cd653d0-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119102 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cd653d0-4dbe-11ee-b251-912537db6da9 + + + diff --git a/graph/incidents_graphml/7/7cdd13b0-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7cdd13b0-41b6-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edcb16cf5c1f145bbb2782bed0e406b98d35111f --- /dev/null +++ b/graph/incidents_graphml/7/7cdd13b0-41b6-11ed-ad31-51848920452c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.15 + 100.64.73.15 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.80 + 100.64.71.80 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7cdd13b0-41b6-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/7/7cde22f0-277e-11ef-8c37-3d33f474c8fc.graphml b/graph/incidents_graphml/7/7cde22f0-277e-11ef-8c37-3d33f474c8fc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82856a5d2c9046f2bafe628f2d518c51ba5257a3 --- /dev/null +++ b/graph/incidents_graphml/7/7cde22f0-277e-11ef-8c37-3d33f474c8fc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.88 + 100.64.88.88 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1718060968 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cde22f0-277e-11ef-8c37-3d33f474c8fc + + + diff --git a/graph/incidents_graphml/7/7ce12710-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7ce12710-32d4-11ee-b53b-dbf4412bf717.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a0d31e023c78cf86bac5db1d55778f5a17dffeb --- /dev/null +++ b/graph/incidents_graphml/7/7ce12710-32d4-11ee-b53b-dbf4412bf717.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.234 + 100.64.52.234 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691159870 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce12710-32d4-11ee-b53b-dbf4412bf717 + + + diff --git a/graph/incidents_graphml/7/7ce16fc0-29c1-11ee-92d3-75b14f8be714.graphml b/graph/incidents_graphml/7/7ce16fc0-29c1-11ee-92d3-75b14f8be714.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca5ff7bcd959cd493321234ffa14f592a63cabaa --- /dev/null +++ b/graph/incidents_graphml/7/7ce16fc0-29c1-11ee-92d3-75b14f8be714.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.83 + 100.64.7.83 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690162149 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ce16fc0-29c1-11ee-92d3-75b14f8be714 + + + diff --git a/graph/incidents_graphml/7/7ce2b900-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7ce2b900-41b6-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87a0dc720cd43b97b93f48e5aab48b5103d79eed --- /dev/null +++ b/graph/incidents_graphml/7/7ce2b900-41b6-11ed-ad31-51848920452c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.80 + 100.64.71.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.15 + 100.64.73.15 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664648755 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ce2b900-41b6-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/7/7ce44170-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7ce44170-5f20-11ee-9598-b95b2a00646d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a1487d2c46cf859898565ab8f2400d3ec594bd4 --- /dev/null +++ b/graph/incidents_graphml/7/7ce44170-5f20-11ee-9598-b95b2a00646d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.86.70 + 100.64.86.70 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696030363 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ce44170-5f20-11ee-9598-b95b2a00646d + + + diff --git a/graph/incidents_graphml/7/7ce57820-41b6-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/7/7ce57820-41b6-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..135435681ae2c0606155258f8aa21da8ad68b340 --- /dev/null +++ b/graph/incidents_graphml/7/7ce57820-41b6-11ed-ad31-51848920452c.graphml @@ -0,0 +1,785 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.16 + 100.64.73.16 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.65 + 100.64.72.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.73.17 + 100.64.73.17 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.18 + 100.64.73.18 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.19 + 100.64.73.19 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.20 + 100.64.73.20 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.38.63 + 100.64.38.63 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.156 + 100.64.71.156 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.69.2 + 100.64.69.2 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.130 + 100.64.71.130 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.34.5 + 100.64.34.5 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.240 + 100.64.1.240 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.73.21 + 100.64.73.21 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.22 + 100.64.73.22 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.23 + 100.64.73.23 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.28 + 100.64.1.28 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.73.24 + 100.64.73.24 + [] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.25 + 100.64.73.25 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.26 + 100.64.73.26 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.27 + 100.64.73.27 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.28 + 100.64.73.28 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.147 + 100.64.72.147 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.29 + 100.64.73.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664648755 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7ce57820-41b6-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/7/7ce76630-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7ce76630-1889-11ee-a72c-7b8cdfc9cafd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57387c7ec75ceb7a03686b81eca0394efc88e46d --- /dev/null +++ b/graph/incidents_graphml/7/7ce76630-1889-11ee-a72c-7b8cdfc9cafd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.25.199 + USER-0015-2054.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688268928 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ce76630-1889-11ee-a72c-7b8cdfc9cafd + + + diff --git a/graph/incidents_graphml/7/7cee0250-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/7/7cee0250-2ff5-11ee-b00f-c1ca007fb916.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c94650fcf8f647460dbc457840971922465c45c --- /dev/null +++ b/graph/incidents_graphml/7/7cee0250-2ff5-11ee-b00f-c1ca007fb916.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.172 + 100.64.69.172 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1690844190 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7cee0250-2ff5-11ee-b00f-c1ca007fb916 + + + diff --git a/graph/incidents_graphml/7/7cf1ecf0-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7cf1ecf0-52b2-11ee-9013-5fc05fa37c8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5939be770e14f0bb56ac31108b75132fa6dfebea --- /dev/null +++ b/graph/incidents_graphml/7/7cf1ecf0-52b2-11ee-9013-5fc05fa37c8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.12 + 100.64.9.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694663704 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7cf1ecf0-52b2-11ee-9013-5fc05fa37c8b + + + diff --git a/graph/incidents_graphml/7/7cfae610-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/7/7cfae610-09ab-11ef-a326-59a1bcca7fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0cc3b449de4926c1487752eb0f0a478338d41520 --- /dev/null +++ b/graph/incidents_graphml/7/7cfae610-09ab-11ef-a326-59a1bcca7fdf.graphml @@ -0,0 +1,473 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.40 + 100.64.49.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.41 + 100.64.49.41 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.28 + 100.64.49.28 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.29 + 100.64.49.29 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.32 + 100.64.22.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.30 + 100.64.49.30 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.214 + 100.64.8.214 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.31 + 100.64.49.31 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.32 + 100.64.49.32 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.33 + 100.64.49.33 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781761 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7cfae610-09ab-11ef-a326-59a1bcca7fdf + + + diff --git a/graph/incidents_graphml/7/7cfb65d0-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7cfb65d0-32d4-11ee-b53b-dbf4412bf717.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e16715c0db835f4ba48b5def2ca732a48c71116 --- /dev/null +++ b/graph/incidents_graphml/7/7cfb65d0-32d4-11ee-b53b-dbf4412bf717.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.234 + 100.64.52.234 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691159870 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7cfb65d0-32d4-11ee-b53b-dbf4412bf717 + + + diff --git a/graph/incidents_graphml/7/7cfe7d10-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/7/7cfe7d10-2ff5-11ee-b00f-c1ca007fb916.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a56b9faf909c11cb05a6cc71f19a1f492fc708a --- /dev/null +++ b/graph/incidents_graphml/7/7cfe7d10-2ff5-11ee-b00f-c1ca007fb916.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.172 + 100.64.69.172 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690844190 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7cfe7d10-2ff5-11ee-b00f-c1ca007fb916 + + + diff --git a/graph/incidents_graphml/7/7d012fc0-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7d012fc0-1889-11ee-a72c-7b8cdfc9cafd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f38652b61baae567ab3954c039da455c5fb288d8 --- /dev/null +++ b/graph/incidents_graphml/7/7d012fc0-1889-11ee-a72c-7b8cdfc9cafd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.7 + 100.64.91.7 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688268928 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d012fc0-1889-11ee-a72c-7b8cdfc9cafd + + + diff --git a/graph/incidents_graphml/7/7d0fb350-e2ab-11ee-bd91-33ef6009cb64.graphml b/graph/incidents_graphml/7/7d0fb350-e2ab-11ee-bd91-33ef6009cb64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10b1b8c014b71c8c3ade4ea00a19ed88738f17cc --- /dev/null +++ b/graph/incidents_graphml/7/7d0fb350-e2ab-11ee-bd91-33ef6009cb64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.198 + 100.64.11.198 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710493666 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d0fb350-e2ab-11ee-bd91-33ef6009cb64 + + + diff --git a/graph/incidents_graphml/7/7d0fda40-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/7/7d0fda40-9fd7-11ee-a827-c14dee966e17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2610f0c9b0374ab8e2b3fcb602c50554e099c133 --- /dev/null +++ b/graph/incidents_graphml/7/7d0fda40-9fd7-11ee-a827-c14dee966e17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.19 + 100.64.62.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703145836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d0fda40-9fd7-11ee-a827-c14dee966e17 + + + diff --git a/graph/incidents_graphml/7/7d108480-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7d108480-8462-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8b8e22b2e2616c23e168a3cfb0c6ef1b3adf1a5 --- /dev/null +++ b/graph/incidents_graphml/7/7d108480-8462-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.176 + 100.64.51.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700126903 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d108480-8462-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/7/7d14e140-32d4-11ee-b53b-dbf4412bf717.graphml b/graph/incidents_graphml/7/7d14e140-32d4-11ee-b53b-dbf4412bf717.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5543d996aa3af22c8aa1b6a895f4c98b3901d027 --- /dev/null +++ b/graph/incidents_graphml/7/7d14e140-32d4-11ee-b53b-dbf4412bf717.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691159870 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d14e140-32d4-11ee-b53b-dbf4412bf717 + + + diff --git a/graph/incidents_graphml/7/7d1972b0-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7d1972b0-1889-11ee-a72c-7b8cdfc9cafd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78997010b33dd3169ebd2772dc1bf6c6258f1c58 --- /dev/null +++ b/graph/incidents_graphml/7/7d1972b0-1889-11ee-a72c-7b8cdfc9cafd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.7 + 100.64.91.7 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688268928 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d1972b0-1889-11ee-a72c-7b8cdfc9cafd + + + diff --git a/graph/incidents_graphml/7/7d199800-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/7/7d199800-2435-11ee-bc29-cfb067a56058.graphml new file mode 100644 index 0000000000000000000000000000000000000000..000942fb3f97b5c4f74126e14c159b342be5c5db --- /dev/null +++ b/graph/incidents_graphml/7/7d199800-2435-11ee-bc29-cfb067a56058.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1689552264 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d199800-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552264 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d199800-2435-11ee-bc29-cfb067a56058 + + + diff --git a/graph/incidents_graphml/7/7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a.graphml b/graph/incidents_graphml/7/7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9efa319552a6516bfaa0c5b1356a319b968ea91 --- /dev/null +++ b/graph/incidents_graphml/7/7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.102 + 100.64.16.102 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.215 + 100.64.72.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.250 + 100.64.81.250 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687622965 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a + + + INCIDENT_LINK + 1687622965 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a + + + INCIDENT_LINK + 1687622965 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a + + + INCIDENT_LINK + 1687622965 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d1bf020-12a9-11ee-abf2-25c0fa3f9e2a + + + diff --git a/graph/incidents_graphml/7/7d21e9a0-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7d21e9a0-8462-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e34f154ca86d94e6462f229c896199324641492c --- /dev/null +++ b/graph/incidents_graphml/7/7d21e9a0-8462-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.176 + 100.64.51.176 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700126903 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d21e9a0-8462-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/7/7d229ef0-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/7/7d229ef0-9fd7-11ee-a827-c14dee966e17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50649ba46c00dbbc493a204c459735c752f0f408 --- /dev/null +++ b/graph/incidents_graphml/7/7d229ef0-9fd7-11ee-a827-c14dee966e17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.19 + 100.64.62.19 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703145836 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d229ef0-9fd7-11ee-a827-c14dee966e17 + + + diff --git a/graph/incidents_graphml/7/7d2a40e0-0367-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/7/7d2a40e0-0367-11ee-bce7-dffdb32a6ba9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17f8fe6230ffdd7f990ecde06b6ca22f1edfa4e9 --- /dev/null +++ b/graph/incidents_graphml/7/7d2a40e0-0367-11ee-bce7-dffdb32a6ba9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.65 + 100.64.80.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.91 + 100.64.72.91 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685945351 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d2a40e0-0367-11ee-bce7-dffdb32a6ba9 + + + INCIDENT_LINK + 1685945351 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d2a40e0-0367-11ee-bce7-dffdb32a6ba9 + + + diff --git a/graph/incidents_graphml/7/7d2b59a0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7d2b59a0-4131-11ee-8e35-ab7460ef679b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5caa6b04a3c56fb741b4487271171e4c0ee966b --- /dev/null +++ b/graph/incidents_graphml/7/7d2b59a0-4131-11ee-8e35-ab7460ef679b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.241 + 100.64.55.241 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692739130 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d2b59a0-4131-11ee-8e35-ab7460ef679b + + + diff --git a/graph/incidents_graphml/7/7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/7/7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc06fd8eff627d5212b64ed13e444f04147636d1 --- /dev/null +++ b/graph/incidents_graphml/7/7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.219 + 100.64.69.219 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1702389921 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c + + + INCIDENT_LINK + 1702389921 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c + + + INCIDENT_LINK + 1702389921 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c + + + INCIDENT_LINK + 1702389921 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d2c8dc0-98f7-11ee-8096-1db1b3bdcb7c + + + diff --git a/graph/incidents_graphml/7/7d2e90e0-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7d2e90e0-5f20-11ee-9598-b95b2a00646d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ca90a3e92dd737f271b674ed4337238214c6fa1 --- /dev/null +++ b/graph/incidents_graphml/7/7d2e90e0-5f20-11ee-9598-b95b2a00646d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.187 + 100.64.7.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696030363 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d2e90e0-5f20-11ee-9598-b95b2a00646d + + + diff --git a/graph/incidents_graphml/7/7d2f7320-4896-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/7/7d2f7320-4896-11ee-a737-6b545b426b37.graphml new file mode 100644 index 0000000000000000000000000000000000000000..431894af577e0b31543136112da2195db7207a04 --- /dev/null +++ b/graph/incidents_graphml/7/7d2f7320-4896-11ee-a737-6b545b426b37.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.64 + 100.64.64.64 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693552167 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d2f7320-4896-11ee-a737-6b545b426b37 + + + diff --git a/graph/incidents_graphml/7/7d30d670-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7d30d670-2e2e-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f67f77edeba8a33b9e44ef8b38812bf65805be78 --- /dev/null +++ b/graph/incidents_graphml/7/7d30d670-2e2e-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.239 + 100.64.45.239 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690648770 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d30d670-2e2e-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/7/7d3b8930-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7d3b8930-5f20-11ee-9598-b95b2a00646d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b612c8473d0dbcbf66ed9ed30ea1b554571a245a --- /dev/null +++ b/graph/incidents_graphml/7/7d3b8930-5f20-11ee-9598-b95b2a00646d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.7.187 + 100.64.7.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696030364 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d3b8930-5f20-11ee-9598-b95b2a00646d + + + diff --git a/graph/incidents_graphml/7/7d3c2c60-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7d3c2c60-1dac-11ee-a6c7-eb84cfc6792e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0c8a08256250904767ead76fc961fd8fe69fcce --- /dev/null +++ b/graph/incidents_graphml/7/7d3c2c60-1dac-11ee-a6c7-eb84cfc6792e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.66 + USER-0015-2100.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688833717 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d3c2c60-1dac-11ee-a6c7-eb84cfc6792e + + + diff --git a/graph/incidents_graphml/7/7d3cac30-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7d3cac30-3553-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d79fac0a44f1f15d33c3feb10185a9ab22d6443b --- /dev/null +++ b/graph/incidents_graphml/7/7d3cac30-3553-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.127 + 100.64.23.127 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691434319 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d3cac30-3553-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/7/7d3e4030-4896-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/7/7d3e4030-4896-11ee-a737-6b545b426b37.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1399079b8209445042d0b8bc5086903b8aeaa35b --- /dev/null +++ b/graph/incidents_graphml/7/7d3e4030-4896-11ee-a737-6b545b426b37.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.64 + 100.64.64.64 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693552167 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d3e4030-4896-11ee-a737-6b545b426b37 + + + diff --git a/graph/incidents_graphml/7/7d432760-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7d432760-4131-11ee-8e35-ab7460ef679b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..75ac430679b676b4cebe17a9bddae4d213c99246 --- /dev/null +++ b/graph/incidents_graphml/7/7d432760-4131-11ee-8e35-ab7460ef679b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.241 + 100.64.55.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692739130 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d432760-4131-11ee-8e35-ab7460ef679b + + + diff --git a/graph/incidents_graphml/7/7d4d7b00-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7d4d7b00-1889-11ee-a72c-7b8cdfc9cafd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a496d8c62aaa2c754251266ec79bc31cbd0c63aa --- /dev/null +++ b/graph/incidents_graphml/7/7d4d7b00-1889-11ee-a72c-7b8cdfc9cafd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.181 + USER-0015-1529.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688268928 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d4d7b00-1889-11ee-a72c-7b8cdfc9cafd + + + diff --git a/graph/incidents_graphml/7/7d53e6c0-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7d53e6c0-53e9-11ee-bfe4-c36dfe104f88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb5cb9e0ad90696e210ef6844c5f2cba565bb504 --- /dev/null +++ b/graph/incidents_graphml/7/7d53e6c0-53e9-11ee-bfe4-c36dfe104f88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.97.151 + 100.64.97.151 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694797279 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d53e6c0-53e9-11ee-bfe4-c36dfe104f88 + + + diff --git a/graph/incidents_graphml/7/7d59e3b0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7d59e3b0-4131-11ee-8e35-ab7460ef679b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cc7ec4eb4a5e40c86d6221179016192fd00c1a1 --- /dev/null +++ b/graph/incidents_graphml/7/7d59e3b0-4131-11ee-8e35-ab7460ef679b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692739130 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7d59e3b0-4131-11ee-8e35-ab7460ef679b + + + diff --git a/graph/incidents_graphml/7/7d6a8f60-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7d6a8f60-1dac-11ee-a6c7-eb84cfc6792e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8df0bda6a46402dded02d8e84a2cf1878e359c3 --- /dev/null +++ b/graph/incidents_graphml/7/7d6a8f60-1dac-11ee-a6c7-eb84cfc6792e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.66 + USER-0015-2100.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688833717 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d6a8f60-1dac-11ee-a6c7-eb84cfc6792e + + + diff --git a/graph/incidents_graphml/7/7d6dfb50-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7d6dfb50-1889-11ee-a72c-7b8cdfc9cafd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09d1bc8d08dee2bc65c1717c43deb9fb894def36 --- /dev/null +++ b/graph/incidents_graphml/7/7d6dfb50-1889-11ee-a72c-7b8cdfc9cafd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.69.181 + USER-0015-1529.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688268929 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d6dfb50-1889-11ee-a72c-7b8cdfc9cafd + + + diff --git a/graph/incidents_graphml/7/7d6f1960-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7d6f1960-4131-11ee-8e35-ab7460ef679b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a2cd04d84275f7c7d4c8d2577339eda5cb3f908 --- /dev/null +++ b/graph/incidents_graphml/7/7d6f1960-4131-11ee-8e35-ab7460ef679b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.243 + 100.64.55.243 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692739130 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d6f1960-4131-11ee-8e35-ab7460ef679b + + + diff --git a/graph/incidents_graphml/7/7d738500-7baf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/7/7d738500-7baf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ad40ce2aa0284bd61bf652532816c0da465f2ca --- /dev/null +++ b/graph/incidents_graphml/7/7d738500-7baf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.97.25 + 100.64.97.25 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699170414 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d738500-7baf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/7/7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/7/7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..024485e8c9128fb545c9894918c91b28ddb2f783 --- /dev/null +++ b/graph/incidents_graphml/7/7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.17.136.40 + 172.17.136.40 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.87.74 + 100.64.87.74 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.75 + 100.64.87.75 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.76 + 100.64.87.76 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.77 + 100.64.87.77 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.78 + 100.64.87.78 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677495433 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495433 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495433 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495433 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495433 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495433 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495433 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495433 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495433 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495433 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d7b4cf0-b68d-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/7/7d7e7580-52b2-11ee-9013-5fc05fa37c8b.graphml b/graph/incidents_graphml/7/7d7e7580-52b2-11ee-9013-5fc05fa37c8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b80cdc26648a0e962a69d9fc253f1a9d1fc6dfb0 --- /dev/null +++ b/graph/incidents_graphml/7/7d7e7580-52b2-11ee-9013-5fc05fa37c8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.130 + 100.64.30.130 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694663705 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d7e7580-52b2-11ee-9013-5fc05fa37c8b + + + diff --git a/graph/incidents_graphml/7/7d7f92f0-7baf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/7/7d7f92f0-7baf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..22d3393ef6682d9d6d874984addfe36eac7ac84e --- /dev/null +++ b/graph/incidents_graphml/7/7d7f92f0-7baf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.20.132.195 + 172.20.132.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"] + + + HOST + 100.64.97.27 + 100.64.97.27 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699170415 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d7f92f0-7baf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/7/7d7f9420-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7d7f9420-4131-11ee-8e35-ab7460ef679b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ba5fdef5ad9fec0406bcdb0068e0365c194fba7 --- /dev/null +++ b/graph/incidents_graphml/7/7d7f9420-4131-11ee-8e35-ab7460ef679b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.245 + 100.64.55.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692739131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d7f9420-4131-11ee-8e35-ab7460ef679b + + + diff --git a/graph/incidents_graphml/7/7d811950-2e2e-11ee-be2e-730d4c543b4a.graphml b/graph/incidents_graphml/7/7d811950-2e2e-11ee-be2e-730d4c543b4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d4ab24e7ef9a1cd63d95e626609bf8e6e9895ee --- /dev/null +++ b/graph/incidents_graphml/7/7d811950-2e2e-11ee-be2e-730d4c543b4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.241 + 100.64.45.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690648770 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d811950-2e2e-11ee-be2e-730d4c543b4a + + + diff --git a/graph/incidents_graphml/7/7d825630-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7d825630-5f20-11ee-9598-b95b2a00646d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c42470f643cbba58cca2ca97904aa43ad3ff57da --- /dev/null +++ b/graph/incidents_graphml/7/7d825630-5f20-11ee-9598-b95b2a00646d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.236 + 100.64.52.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696030364 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d825630-5f20-11ee-9598-b95b2a00646d + + + diff --git a/graph/incidents_graphml/7/7d879ee0-1067-11ee-aaa6-7f821bc3777a.graphml b/graph/incidents_graphml/7/7d879ee0-1067-11ee-aaa6-7f821bc3777a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7905995965853dae8149abd006b787331d9f9b3c --- /dev/null +++ b/graph/incidents_graphml/7/7d879ee0-1067-11ee-aaa6-7f821bc3777a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.2 + 100.64.59.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687374717 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d879ee0-1067-11ee-aaa6-7f821bc3777a + + + diff --git a/graph/incidents_graphml/7/7d87bf90-1329-11ef-aba1-33e212db0be8.graphml b/graph/incidents_graphml/7/7d87bf90-1329-11ef-aba1-33e212db0be8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9465c6908e6e36087b62af187f45287b96407ddf --- /dev/null +++ b/graph/incidents_graphml/7/7d87bf90-1329-11ef-aba1-33e212db0be8.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.170 + 100.64.55.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.63 + 100.64.23.63 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.171 + 100.64.55.171 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.66 + 100.64.18.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.1 + 100.64.27.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715825439 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d87bf90-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825439 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d87bf90-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825439 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d87bf90-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825439 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d87bf90-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825439 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d87bf90-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825439 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d87bf90-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825439 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d87bf90-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825439 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d87bf90-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825439 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d87bf90-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825439 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7d87bf90-1329-11ef-aba1-33e212db0be8 + + + diff --git a/graph/incidents_graphml/7/7d8df320-e560-11ee-be14-8bb84b2c14a8.graphml b/graph/incidents_graphml/7/7d8df320-e560-11ee-be14-8bb84b2c14a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3f2ea47a5102ee9f82311a7730c5bff4903a6ad --- /dev/null +++ b/graph/incidents_graphml/7/7d8df320-e560-11ee-be14-8bb84b2c14a8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.93 + 100.64.68.93 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","CASB","Protect"] + + + INCIDENT_LINK + 1710791308 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d8df320-e560-11ee-be14-8bb84b2c14a8 + + + INCIDENT_LINK + 1710791308 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d8df320-e560-11ee-be14-8bb84b2c14a8 + + + diff --git a/graph/incidents_graphml/7/7d902f30-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/7/7d902f30-2122-11ee-9a61-05dd24aa353e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c0568c5d868b51a4a26807d06d0c817857ffd2a --- /dev/null +++ b/graph/incidents_graphml/7/7d902f30-2122-11ee-9a61-05dd24aa353e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.53 + 100.64.29.53 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1689214251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d902f30-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7d902f30-2122-11ee-9a61-05dd24aa353e + + + diff --git a/graph/incidents_graphml/7/7d905ff0-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/7/7d905ff0-5f20-11ee-9598-b95b2a00646d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cef5882374e0952942ec740d1e0a786357a59945 --- /dev/null +++ b/graph/incidents_graphml/7/7d905ff0-5f20-11ee-9598-b95b2a00646d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.52.236 + 100.64.52.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696030364 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7d905ff0-5f20-11ee-9598-b95b2a00646d + + + diff --git a/graph/incidents_graphml/7/7d908860-866f-11ee-8f03-878f88d78f03.graphml b/graph/incidents_graphml/7/7d908860-866f-11ee-8f03-878f88d78f03.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a4334ff3f9ed240ecaa614e415e3595251b8265 --- /dev/null +++ b/graph/incidents_graphml/7/7d908860-866f-11ee-8f03-878f88d78f03.graphml @@ -0,0 +1,659 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.34 + 100.64.18.34 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.193 + 100.64.69.193 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.194 + 100.64.69.194 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.22.246 + 100.64.22.246 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.26.110 + 100.64.26.110 + ["Exploiting Host","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.189 + 100.64.69.189 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.37.97 + 100.64.37.97 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.58.133 + 100.64.58.133 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.26.139 + 100.64.26.139 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.190 + 100.64.69.190 + ["Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.69.195 + 100.64.69.195 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.59.226 + 100.64.59.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352390 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 7d908860-866f-11ee-8f03-878f88d78f03 + + + diff --git a/graph/incidents_graphml/7/7da49cc0-1067-11ee-aaa6-7f821bc3777a.graphml b/graph/incidents_graphml/7/7da49cc0-1067-11ee-aaa6-7f821bc3777a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd1328d3efcfea3a0651fb9001cd3111eff95746 --- /dev/null +++ b/graph/incidents_graphml/7/7da49cc0-1067-11ee-aaa6-7f821bc3777a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.2 + 100.64.59.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687374717 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7da49cc0-1067-11ee-aaa6-7f821bc3777a + + + diff --git a/graph/incidents_graphml/7/7db287c0-9eb7-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/7/7db287c0-9eb7-11ee-9861-037a800baf91.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70df8ab7228600776b25246bb964e5552dfea774 --- /dev/null +++ b/graph/incidents_graphml/7/7db287c0-9eb7-11ee-9861-037a800baf91.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.90.132 + 100.64.90.132 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703022142 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7db287c0-9eb7-11ee-9861-037a800baf91 + + + diff --git a/graph/incidents_graphml/7/7db3ff10-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7db3ff10-3553-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2051f12f46ef4124d30e99f54dd609c706a967c --- /dev/null +++ b/graph/incidents_graphml/7/7db3ff10-3553-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.129 + 100.64.23.129 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691434320 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7db3ff10-3553-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/7/7dc961c0-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7dc961c0-1889-11ee-a72c-7b8cdfc9cafd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..124befc2ae2577fad88b26f84dcc83b648567b44 --- /dev/null +++ b/graph/incidents_graphml/7/7dc961c0-1889-11ee-a72c-7b8cdfc9cafd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.10 + 100.64.91.10 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688268929 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7dc961c0-1889-11ee-a72c-7b8cdfc9cafd + + + diff --git a/graph/incidents_graphml/7/7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/7/7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90f2e33aab33c8502e50f345968dc2ae0bd2ff14 --- /dev/null +++ b/graph/incidents_graphml/7/7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.138 + 100.64.82.138 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.127 + 100.64.72.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.82.139 + 100.64.82.139 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1670151469 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151469 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151469 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151469 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7dcbc7b0-73c2-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/7/7dd638a0-221a-11ef-a5a3-b5bcb77a69cd.graphml b/graph/incidents_graphml/7/7dd638a0-221a-11ef-a5a3-b5bcb77a69cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a5639e20eea346d53734ea8004a82ac62f4af88 --- /dev/null +++ b/graph/incidents_graphml/7/7dd638a0-221a-11ef-a5a3-b5bcb77a69cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.37 + 100.64.15.37 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717468264 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7dd638a0-221a-11ef-a5a3-b5bcb77a69cd + + + diff --git a/graph/incidents_graphml/7/7de581e0-4131-11ee-8e35-ab7460ef679b.graphml b/graph/incidents_graphml/7/7de581e0-4131-11ee-8e35-ab7460ef679b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ccca0b71c8030a92c926525edf360ee78714e866 --- /dev/null +++ b/graph/incidents_graphml/7/7de581e0-4131-11ee-8e35-ab7460ef679b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.151 + 100.64.11.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692739131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7de581e0-4131-11ee-8e35-ab7460ef679b + + + diff --git a/graph/incidents_graphml/7/7deb44c0-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7deb44c0-53e9-11ee-bfe4-c36dfe104f88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58faafc1a4ad58fbd525f494c220ba85fe14865a --- /dev/null +++ b/graph/incidents_graphml/7/7deb44c0-53e9-11ee-bfe4-c36dfe104f88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.153 + 100.64.97.153 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694797280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7deb44c0-53e9-11ee-bfe4-c36dfe104f88 + + + diff --git a/graph/incidents_graphml/7/7debcd50-1dac-11ee-a6c7-eb84cfc6792e.graphml b/graph/incidents_graphml/7/7debcd50-1dac-11ee-a6c7-eb84cfc6792e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ef311f0b7e0fd3fe981f4921ea7025b15df4288 --- /dev/null +++ b/graph/incidents_graphml/7/7debcd50-1dac-11ee-a6c7-eb84cfc6792e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.68 + 100.64.93.68 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1688833718 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7debcd50-1dac-11ee-a6c7-eb84cfc6792e + + + diff --git a/graph/incidents_graphml/7/7dee27d0-1889-11ee-a72c-7b8cdfc9cafd.graphml b/graph/incidents_graphml/7/7dee27d0-1889-11ee-a72c-7b8cdfc9cafd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bdbf02c9f97ce356ad036aa7b40f8b7816c1d045 --- /dev/null +++ b/graph/incidents_graphml/7/7dee27d0-1889-11ee-a72c-7b8cdfc9cafd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.91.12 + 100.64.91.12 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688268929 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7dee27d0-1889-11ee-a72c-7b8cdfc9cafd + + + diff --git a/graph/incidents_graphml/7/7dee9720-5b9f-11ee-95ea-792d2008bff3.graphml b/graph/incidents_graphml/7/7dee9720-5b9f-11ee-95ea-792d2008bff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e665fb37cf0a937244c426c03be7ec1f9d1c28d1 --- /dev/null +++ b/graph/incidents_graphml/7/7dee9720-5b9f-11ee-95ea-792d2008bff3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.135.182 + 172.25.135.182 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.95.153 + 100.64.95.153 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.202 + 100.64.95.202 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695645106 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7dee9720-5b9f-11ee-95ea-792d2008bff3 + + + INCIDENT_LINK + 1695645106 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7dee9720-5b9f-11ee-95ea-792d2008bff3 + + + INCIDENT_LINK + 1695645106 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7dee9720-5b9f-11ee-95ea-792d2008bff3 + + + INCIDENT_LINK + 1695645106 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7dee9720-5b9f-11ee-95ea-792d2008bff3 + + + diff --git a/graph/incidents_graphml/7/7def44b0-7baf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/7/7def44b0-7baf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..340f947b997344c6e68fb9277b85b26a55268cd2 --- /dev/null +++ b/graph/incidents_graphml/7/7def44b0-7baf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.103.13 + 192.168.103.13 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.97.28 + 100.64.97.28 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699170415 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7def44b0-7baf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/7/7df24090-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7df24090-3553-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ecb1318b638b6af2426fd9b42f5c398c1bdb155 --- /dev/null +++ b/graph/incidents_graphml/7/7df24090-3553-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.129 + 100.64.23.129 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691434320 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7df24090-3553-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/7/7dfb9870-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7dfb9870-53e9-11ee-bfe4-c36dfe104f88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..219bd313dc44dd60d05819664935f4323fb856a1 --- /dev/null +++ b/graph/incidents_graphml/7/7dfb9870-53e9-11ee-bfe4-c36dfe104f88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.153 + 100.64.97.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694797280 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7dfb9870-53e9-11ee-bfe4-c36dfe104f88 + + + diff --git a/graph/incidents_graphml/7/7dff3440-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7dff3440-1617-11ee-a9fc-9ffb4847312b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f0c9469af097b97d136669acc0690d777b5410e --- /dev/null +++ b/graph/incidents_graphml/7/7dff3440-1617-11ee-a9fc-9ffb4847312b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7dff3440-1617-11ee-a9fc-9ffb4847312b + + + diff --git a/graph/incidents_graphml/7/7e022f00-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7e022f00-26c1-11ee-87ad-dd3f4232b94e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2402aadbd0579014e3ca8fea6ad20cb0e0304bb2 --- /dev/null +++ b/graph/incidents_graphml/7/7e022f00-26c1-11ee-87ad-dd3f4232b94e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.250 + 100.64.12.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689832298 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7e022f00-26c1-11ee-87ad-dd3f4232b94e + + + diff --git a/graph/incidents_graphml/7/7e07aeb0-7baf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/7/7e07aeb0-7baf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..878b7fd1b57abe1fec2e1edaa965d80b4175b725 --- /dev/null +++ b/graph/incidents_graphml/7/7e07aeb0-7baf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.181.72.179 + 10.181.72.179 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 172.16.59.105 + 172.16.59.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Stealthwatch","Barracuda WAF"] + + + INCIDENT_LINK + 1699170415 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7e07aeb0-7baf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/7/7e0e3c50-9eb7-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/7/7e0e3c50-9eb7-11ee-9861-037a800baf91.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67b9a2b3e6631137ba4beafa68e37ef6e3605d55 --- /dev/null +++ b/graph/incidents_graphml/7/7e0e3c50-9eb7-11ee-9861-037a800baf91.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.90.136 + 100.64.90.136 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703022142 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7e0e3c50-9eb7-11ee-9861-037a800baf91 + + + diff --git a/graph/incidents_graphml/7/7e19fcc0-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7e19fcc0-26c1-11ee-87ad-dd3f4232b94e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..687ce18d79dec3ac3241d4d69386b3a28007573f --- /dev/null +++ b/graph/incidents_graphml/7/7e19fcc0-26c1-11ee-87ad-dd3f4232b94e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.250 + 100.64.12.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689832298 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7e19fcc0-26c1-11ee-87ad-dd3f4232b94e + + + diff --git a/graph/incidents_graphml/7/7e1ddfd0-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7e1ddfd0-1617-11ee-a9fc-9ffb4847312b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b6a1a2cd7e9f6857c8a2acd43bef3fd6f27444d --- /dev/null +++ b/graph/incidents_graphml/7/7e1ddfd0-1617-11ee-a9fc-9ffb4847312b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7e1ddfd0-1617-11ee-a9fc-9ffb4847312b + + + diff --git a/graph/incidents_graphml/7/7e207420-f7ff-11ec-9c0d-cfd14a23bdb2.graphml b/graph/incidents_graphml/7/7e207420-f7ff-11ec-9c0d-cfd14a23bdb2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc36d815a0ceae2c6c6bf350da187dc9cf241132 --- /dev/null +++ b/graph/incidents_graphml/7/7e207420-f7ff-11ec-9c0d-cfd14a23bdb2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.211 + 100.64.81.211 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.217 + 100.64.73.217 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.1 + 100.64.71.1 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656543724 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7e207420-f7ff-11ec-9c0d-cfd14a23bdb2 + + + INCIDENT_LINK + 1656543724 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7e207420-f7ff-11ec-9c0d-cfd14a23bdb2 + + + INCIDENT_LINK + 1656543724 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7e207420-f7ff-11ec-9c0d-cfd14a23bdb2 + + + INCIDENT_LINK + 1656543724 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7e207420-f7ff-11ec-9c0d-cfd14a23bdb2 + + + diff --git a/graph/incidents_graphml/7/7e242600-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7e242600-3553-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf2bb7165cac4278750ba9588f83aa6528eb07d1 --- /dev/null +++ b/graph/incidents_graphml/7/7e242600-3553-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.131 + 100.64.23.131 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691434321 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e242600-3553-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/7/7e291530-eb52-11ec-9c3b-83765024aa2d.graphml b/graph/incidents_graphml/7/7e291530-eb52-11ec-9c3b-83765024aa2d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a87d111cecd21ee28136d5e5bebc48f07aaed035 --- /dev/null +++ b/graph/incidents_graphml/7/7e291530-eb52-11ec-9c3b-83765024aa2d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.241 + USER-0015-1880.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655150007 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e291530-eb52-11ec-9c3b-83765024aa2d + + + diff --git a/graph/incidents_graphml/7/7e312fb0-7baf-11ee-b624-7d3a11587cf9.graphml b/graph/incidents_graphml/7/7e312fb0-7baf-11ee-b624-7d3a11587cf9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19a055cf75053f97bdf87fa7547a431b13caa9be --- /dev/null +++ b/graph/incidents_graphml/7/7e312fb0-7baf-11ee-b624-7d3a11587cf9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.170 + USER-0015-2163.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + HOST-17780 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1699170416 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e312fb0-7baf-11ee-b624-7d3a11587cf9 + + + diff --git a/graph/incidents_graphml/7/7e323fb0-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7e323fb0-26c1-11ee-87ad-dd3f4232b94e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3009c02404672bced4d305d9f9e83589c5edb107 --- /dev/null +++ b/graph/incidents_graphml/7/7e323fb0-26c1-11ee-87ad-dd3f4232b94e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.12 + 100.64.55.12 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689832298 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e323fb0-26c1-11ee-87ad-dd3f4232b94e + + + diff --git a/graph/incidents_graphml/7/7e39de40-4896-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/7/7e39de40-4896-11ee-a737-6b545b426b37.graphml new file mode 100644 index 0000000000000000000000000000000000000000..247675ce4511d9b06cc7f0efc5099f049fb6a482 --- /dev/null +++ b/graph/incidents_graphml/7/7e39de40-4896-11ee-a737-6b545b426b37.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.123 + 100.64.13.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693552169 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e39de40-4896-11ee-a737-6b545b426b37 + + + diff --git a/graph/incidents_graphml/7/7e3b5890-df6a-11ee-b599-d5300ed6974c.graphml b/graph/incidents_graphml/7/7e3b5890-df6a-11ee-b599-d5300ed6974c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9fa370a7c9f342ff54ec187b37ddf02cdfc53395 --- /dev/null +++ b/graph/incidents_graphml/7/7e3b5890-df6a-11ee-b599-d5300ed6974c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.24 + 100.64.67.24 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710135897 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7e3b5890-df6a-11ee-b599-d5300ed6974c + + + diff --git a/graph/incidents_graphml/7/7e419f30-13cc-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/7/7e419f30-13cc-11ee-918c-e193118b03e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d10cc2938ff3ce80301ec1c600b7465835349b4 --- /dev/null +++ b/graph/incidents_graphml/7/7e419f30-13cc-11ee-918c-e193118b03e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.214 + 100.64.9.214 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687747950 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7e419f30-13cc-11ee-918c-e193118b03e7 + + + diff --git a/graph/incidents_graphml/7/7e4615d0-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7e4615d0-26c1-11ee-87ad-dd3f4232b94e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7bf18459678d6641be689022a9db4379066e29c1 --- /dev/null +++ b/graph/incidents_graphml/7/7e4615d0-26c1-11ee-87ad-dd3f4232b94e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.12 + 100.64.55.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689832298 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7e4615d0-26c1-11ee-87ad-dd3f4232b94e + + + diff --git a/graph/incidents_graphml/7/7e4a8010-4896-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/7/7e4a8010-4896-11ee-a737-6b545b426b37.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0d687ee09779f4b716d7976160b2c8e5520cf54 --- /dev/null +++ b/graph/incidents_graphml/7/7e4a8010-4896-11ee-a737-6b545b426b37.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.123 + 100.64.13.123 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693552169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7e4a8010-4896-11ee-a737-6b545b426b37 + + + diff --git a/graph/incidents_graphml/7/7e501910-df6a-11ee-b599-d5300ed6974c.graphml b/graph/incidents_graphml/7/7e501910-df6a-11ee-b599-d5300ed6974c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8022448456b1ebf2d2c430dcadd02354251ee2b --- /dev/null +++ b/graph/incidents_graphml/7/7e501910-df6a-11ee-b599-d5300ed6974c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.24 + 100.64.67.24 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710135897 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7e501910-df6a-11ee-b599-d5300ed6974c + + + diff --git a/graph/incidents_graphml/7/7e5479a0-ea51-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/7/7e5479a0-ea51-11ee-a5b0-ebb549372bba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bd58ed46292dfb3e4b8086fe73d498d30d43c17 --- /dev/null +++ b/graph/incidents_graphml/7/7e5479a0-ea51-11ee-a5b0-ebb549372bba.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.164 + 100.64.10.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1711334622 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5479a0-ea51-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711334622 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5479a0-ea51-11ee-a5b0-ebb549372bba + + + diff --git a/graph/incidents_graphml/7/7e5945e0-13cc-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/7/7e5945e0-13cc-11ee-918c-e193118b03e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..713b82d42c8224bf470718387d1edc9e582ade19 --- /dev/null +++ b/graph/incidents_graphml/7/7e5945e0-13cc-11ee-918c-e193118b03e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.222 + 100.64.9.222 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687747950 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7e5945e0-13cc-11ee-918c-e193118b03e7 + + + diff --git a/graph/incidents_graphml/7/7e5d8a90-fbd8-11ec-820d-995ce05c6788.graphml b/graph/incidents_graphml/7/7e5d8a90-fbd8-11ec-820d-995ce05c6788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e934c4e449e2c46805773e1e08a8f822a9fa9cac --- /dev/null +++ b/graph/incidents_graphml/7/7e5d8a90-fbd8-11ec-820d-995ce05c6788.graphml @@ -0,0 +1,639 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.99 + 100.64.71.99 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.100 + USER-0015-1617.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.11.114 + USER-0015-1204.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.101 + 100.64.71.101 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.228 + 100.64.70.228 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.102 + 100.64.71.102 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.103 + 100.64.71.103 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.104 + 100.64.71.104 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.33 + USER-0015-1618.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.105 + 100.64.71.105 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.106 + 100.64.71.106 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.107 + 100.64.71.107 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.250 + 100.64.70.250 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.108 + 100.64.71.108 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.109 + 100.64.71.109 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.110 + 100.64.71.110 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.53 + 100.64.1.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.111 + 100.64.71.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + INCIDENT_LINK + 1656966779 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e5d8a90-fbd8-11ec-820d-995ce05c6788 + + + diff --git a/graph/incidents_graphml/7/7e65e9f0-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7e65e9f0-3553-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5738dcbd5c092abc44416f4c473c7f8b90a3b30a --- /dev/null +++ b/graph/incidents_graphml/7/7e65e9f0-3553-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.131 + 100.64.23.131 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691434321 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e65e9f0-3553-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/7/7e68f840-df6a-11ee-b599-d5300ed6974c.graphml b/graph/incidents_graphml/7/7e68f840-df6a-11ee-b599-d5300ed6974c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d023bb8695c3f377bbcb04174bb35240899133f --- /dev/null +++ b/graph/incidents_graphml/7/7e68f840-df6a-11ee-b599-d5300ed6974c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.26 + 100.64.67.26 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710135897 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e68f840-df6a-11ee-b599-d5300ed6974c + + + diff --git a/graph/incidents_graphml/7/7e6ef0c0-13cc-11ee-918c-e193118b03e7.graphml b/graph/incidents_graphml/7/7e6ef0c0-13cc-11ee-918c-e193118b03e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..357f5e76bf62ce905b0e6e84edc9571a3fbb59f0 --- /dev/null +++ b/graph/incidents_graphml/7/7e6ef0c0-13cc-11ee-918c-e193118b03e7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.222 + 100.64.9.222 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687747951 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7e6ef0c0-13cc-11ee-918c-e193118b03e7 + + + diff --git a/graph/incidents_graphml/7/7e732bc0-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7e732bc0-1617-11ee-a9fc-9ffb4847312b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5c06ecfb90a493fec3d60457c09e9fd23483a68 --- /dev/null +++ b/graph/incidents_graphml/7/7e732bc0-1617-11ee-a9fc-9ffb4847312b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.207 + 100.64.35.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e732bc0-1617-11ee-a9fc-9ffb4847312b + + + diff --git a/graph/incidents_graphml/7/7e7400e0-eb52-11ec-9c3b-83765024aa2d.graphml b/graph/incidents_graphml/7/7e7400e0-eb52-11ec-9c3b-83765024aa2d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd89739feed20ea320b9d79dd3cd0567cf429818 --- /dev/null +++ b/graph/incidents_graphml/7/7e7400e0-eb52-11ec-9c3b-83765024aa2d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.241 + USER-0015-1880.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655150008 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7e7400e0-eb52-11ec-9c3b-83765024aa2d + + + diff --git a/graph/incidents_graphml/7/7e7d6aa0-df6a-11ee-b599-d5300ed6974c.graphml b/graph/incidents_graphml/7/7e7d6aa0-df6a-11ee-b599-d5300ed6974c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ec8de4cf95c310f16205ec1c47d33d6a6b0b30c --- /dev/null +++ b/graph/incidents_graphml/7/7e7d6aa0-df6a-11ee-b599-d5300ed6974c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.26 + 100.64.67.26 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710135897 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7e7d6aa0-df6a-11ee-b599-d5300ed6974c + + + diff --git a/graph/incidents_graphml/7/7e856a40-368f-11ee-b546-fb0db7567997.graphml b/graph/incidents_graphml/7/7e856a40-368f-11ee-b546-fb0db7567997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca25cb39b647dc05a1416a5f4c3c1a60c52d99af --- /dev/null +++ b/graph/incidents_graphml/7/7e856a40-368f-11ee-b546-fb0db7567997.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.120 + 100.64.48.120 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691570042 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e856a40-368f-11ee-b546-fb0db7567997 + + + diff --git a/graph/incidents_graphml/7/7e95ded0-0367-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/7/7e95ded0-0367-11ee-bce7-dffdb32a6ba9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13286ba3361ab64146f9d5e9243041a438a70b60 --- /dev/null +++ b/graph/incidents_graphml/7/7e95ded0-0367-11ee-bce7-dffdb32a6ba9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.250 + 100.64.17.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685945353 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7e95ded0-0367-11ee-bce7-dffdb32a6ba9 + + + diff --git a/graph/incidents_graphml/7/7ea5ad70-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7ea5ad70-1617-11ee-a9fc-9ffb4847312b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61fc268787602d9599febbb96781f46f7a69b00c --- /dev/null +++ b/graph/incidents_graphml/7/7ea5ad70-1617-11ee-a9fc-9ffb4847312b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.207 + 100.64.35.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000066 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7ea5ad70-1617-11ee-a9fc-9ffb4847312b + + + diff --git a/graph/incidents_graphml/7/7eaa1260-45bb-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/7/7eaa1260-45bb-11ee-853f-87a1872d184b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81219019c741e879609603090210757b473d3e96 --- /dev/null +++ b/graph/incidents_graphml/7/7eaa1260-45bb-11ee-853f-87a1872d184b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.114 + 100.64.24.114 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693238208 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7eaa1260-45bb-11ee-853f-87a1872d184b + + + INCIDENT_LINK + 1693238208 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7eaa1260-45bb-11ee-853f-87a1872d184b + + + diff --git a/graph/incidents_graphml/7/7eb6fd50-eb52-11ec-9c3b-83765024aa2d.graphml b/graph/incidents_graphml/7/7eb6fd50-eb52-11ec-9c3b-83765024aa2d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29d984bc819f102993e258a558cdd2a548964583 --- /dev/null +++ b/graph/incidents_graphml/7/7eb6fd50-eb52-11ec-9c3b-83765024aa2d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.132 + USER-0015-1922.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655150008 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7eb6fd50-eb52-11ec-9c3b-83765024aa2d + + + diff --git a/graph/incidents_graphml/7/7eb86a40-45bb-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/7/7eb86a40-45bb-11ee-853f-87a1872d184b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..533317edfc8d72ba03350bab6d757f0a2a422ba0 --- /dev/null +++ b/graph/incidents_graphml/7/7eb86a40-45bb-11ee-853f-87a1872d184b.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.116 + 100.64.24.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.117 + USER-0015-1250.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.118 + 100.64.24.118 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693238208 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7eb86a40-45bb-11ee-853f-87a1872d184b + + + INCIDENT_LINK + 1693238208 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7eb86a40-45bb-11ee-853f-87a1872d184b + + + INCIDENT_LINK + 1693238208 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7eb86a40-45bb-11ee-853f-87a1872d184b + + + INCIDENT_LINK + 1693238208 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7eb86a40-45bb-11ee-853f-87a1872d184b + + + INCIDENT_LINK + 1693238208 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7eb86a40-45bb-11ee-853f-87a1872d184b + + + INCIDENT_LINK + 1693238208 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7eb86a40-45bb-11ee-853f-87a1872d184b + + + diff --git a/graph/incidents_graphml/7/7ebc4760-5b9f-11ee-95ea-792d2008bff3.graphml b/graph/incidents_graphml/7/7ebc4760-5b9f-11ee-95ea-792d2008bff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48ccf31292ce4c9c2945c49d6305b1969d7e7d0f --- /dev/null +++ b/graph/incidents_graphml/7/7ebc4760-5b9f-11ee-95ea-792d2008bff3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.17.244 + 172.25.17.244 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.95.203 + 100.64.95.203 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695645107 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ebc4760-5b9f-11ee-95ea-792d2008bff3 + + + INCIDENT_LINK + 1695645107 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ebc4760-5b9f-11ee-95ea-792d2008bff3 + + + diff --git a/graph/incidents_graphml/7/7ec63c20-c054-11ed-96c1-674c48144fee.graphml b/graph/incidents_graphml/7/7ec63c20-c054-11ed-96c1-674c48144fee.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0af86e8a291be6ea309c0c35f8cb85c7167713aa --- /dev/null +++ b/graph/incidents_graphml/7/7ec63c20-c054-11ed-96c1-674c48144fee.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.235 + 100.64.69.235 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + INCIDENT_LINK + 1678570465 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Unprocessed + 7ec63c20-c054-11ed-96c1-674c48144fee + + + diff --git a/graph/incidents_graphml/7/7edbb190-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7edbb190-1617-11ee-a9fc-9ffb4847312b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c9e3e2f6f849605bad576214bef294c4e8914cf --- /dev/null +++ b/graph/incidents_graphml/7/7edbb190-1617-11ee-a9fc-9ffb4847312b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.209 + 100.64.35.209 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000066 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7edbb190-1617-11ee-a9fc-9ffb4847312b + + + diff --git a/graph/incidents_graphml/7/7edc88d0-0c3b-11ee-954b-d57838b91a61.graphml b/graph/incidents_graphml/7/7edc88d0-0c3b-11ee-954b-d57838b91a61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a35e5def18edae8b9cf4a5d55558599b3366f538 --- /dev/null +++ b/graph/incidents_graphml/7/7edc88d0-0c3b-11ee-954b-d57838b91a61.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.3 + 100.64.25.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686916016 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7edc88d0-0c3b-11ee-954b-d57838b91a61 + + + INCIDENT_LINK + 1686916016 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7edc88d0-0c3b-11ee-954b-d57838b91a61 + + + diff --git a/graph/incidents_graphml/7/7eea4470-0c3b-11ee-954b-d57838b91a61.graphml b/graph/incidents_graphml/7/7eea4470-0c3b-11ee-954b-d57838b91a61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..358e69dbb0740de61b4e79c0e9e0737d6c6c06c5 --- /dev/null +++ b/graph/incidents_graphml/7/7eea4470-0c3b-11ee-954b-d57838b91a61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.3 + 100.64.25.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686916016 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7eea4470-0c3b-11ee-954b-d57838b91a61 + + + diff --git a/graph/incidents_graphml/7/7eea9610-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7eea9610-51a9-11ee-8616-91cf6f807a5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..069c96f4b5903bc02f1b27349a50e78fb59b3e5e --- /dev/null +++ b/graph/incidents_graphml/7/7eea9610-51a9-11ee-8616-91cf6f807a5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.127 + 100.64.38.127 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694549891 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7eea9610-51a9-11ee-8616-91cf6f807a5f + + + diff --git a/graph/incidents_graphml/7/7ef1e760-b68d-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/7/7ef1e760-b68d-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9490c7f6c1110ca52475e5d89b224d14bedd5674 --- /dev/null +++ b/graph/incidents_graphml/7/7ef1e760-b68d-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,207 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.79 + 100.64.87.79 + ["Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.238.61 + 172.30.238.61 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.13.44 + 100.64.13.44 + ["Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.80 + 100.64.87.80 + ["Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.173 + 100.64.47.173 + ["Exploiting Host","Exploiting Target"] + 0.859375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.81 + 100.64.87.81 + ["Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677495435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677495435 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7ef1e760-b68d-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/7/7ef8d680-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7ef8d680-1617-11ee-a9fc-9ffb4847312b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b7c9f68a7993ac51c5badc346c6fb4610f5fc5f --- /dev/null +++ b/graph/incidents_graphml/7/7ef8d680-1617-11ee-a9fc-9ffb4847312b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.209 + 100.64.35.209 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000066 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ef8d680-1617-11ee-a9fc-9ffb4847312b + + + diff --git a/graph/incidents_graphml/7/7efa2670-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7efa2670-51a9-11ee-8616-91cf6f807a5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e02aa5971f48fc09c5da97d845240bdb2408e96 --- /dev/null +++ b/graph/incidents_graphml/7/7efa2670-51a9-11ee-8616-91cf6f807a5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.127 + 100.64.38.127 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694549891 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7efa2670-51a9-11ee-8616-91cf6f807a5f + + + diff --git a/graph/incidents_graphml/7/7efb7410-23a1-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/7/7efb7410-23a1-11ef-8910-2ffbcbe646c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f604f2cd9f633cbea66db383b89281d83626084 --- /dev/null +++ b/graph/incidents_graphml/7/7efb7410-23a1-11ef-8910-2ffbcbe646c0.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.112 + 100.64.16.112 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.99 + 100.64.20.99 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.100 + 100.64.20.100 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.181 + 100.64.17.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.101 + 100.64.20.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.102 + 100.64.20.102 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.103 + 100.64.20.103 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.104 + 100.64.20.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.105 + 100.64.20.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.106 + 100.64.20.106 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.107 + 100.64.20.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.108 + 100.64.20.108 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.109 + 100.64.20.109 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.110 + 100.64.20.110 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.111 + 100.64.20.111 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.112 + 100.64.20.112 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.113 + 100.64.20.113 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.85 + 100.64.11.85 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636199 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7efb7410-23a1-11ef-8910-2ffbcbe646c0 + + + diff --git a/graph/incidents_graphml/7/7f083030-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7f083030-51a9-11ee-8616-91cf6f807a5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e1b6af557886278e537c2616ebf30f3ffe0b714 --- /dev/null +++ b/graph/incidents_graphml/7/7f083030-51a9-11ee-8616-91cf6f807a5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.129 + 100.64.38.129 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694549891 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f083030-51a9-11ee-8616-91cf6f807a5f + + + diff --git a/graph/incidents_graphml/7/7f0dc2b0-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7f0dc2b0-3553-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9b25ef94efd957feb056d9ad71268a80f43af08 --- /dev/null +++ b/graph/incidents_graphml/7/7f0dc2b0-3553-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.133 + 100.64.23.133 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691434322 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f0dc2b0-3553-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/7/7f0ff2c0-eb52-11ec-9c3b-83765024aa2d.graphml b/graph/incidents_graphml/7/7f0ff2c0-eb52-11ec-9c3b-83765024aa2d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c596102eb56c3e6b2bbe8c50a51bc1fe561e0db --- /dev/null +++ b/graph/incidents_graphml/7/7f0ff2c0-eb52-11ec-9c3b-83765024aa2d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.132 + USER-0015-1922.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655150009 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f0ff2c0-eb52-11ec-9c3b-83765024aa2d + + + diff --git a/graph/incidents_graphml/7/7f1e5040-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7f1e5040-51a9-11ee-8616-91cf6f807a5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb0347d534037b4a6f4a22b2ec0f4fd5e6e94583 --- /dev/null +++ b/graph/incidents_graphml/7/7f1e5040-51a9-11ee-8616-91cf6f807a5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.129 + 100.64.38.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694549891 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f1e5040-51a9-11ee-8616-91cf6f807a5f + + + diff --git a/graph/incidents_graphml/7/7f1e86f0-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7f1e86f0-1617-11ee-a9fc-9ffb4847312b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b02a7855612e9e0235ff5ff1f7c7dd29d8bcd292 --- /dev/null +++ b/graph/incidents_graphml/7/7f1e86f0-1617-11ee-a9fc-9ffb4847312b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.211 + 100.64.35.211 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000066 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f1e86f0-1617-11ee-a9fc-9ffb4847312b + + + diff --git a/graph/incidents_graphml/7/7f255ac0-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7f255ac0-8462-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87045f283729984fcb696e5e790700240d2104dc --- /dev/null +++ b/graph/incidents_graphml/7/7f255ac0-8462-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.178 + 100.64.51.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700126907 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f255ac0-8462-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/7/7f2cf640-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7f2cf640-51a9-11ee-8616-91cf6f807a5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34fc8710a345ce4a382a435de993968b66bbfd81 --- /dev/null +++ b/graph/incidents_graphml/7/7f2cf640-51a9-11ee-8616-91cf6f807a5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.131 + 100.64.38.131 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694549892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f2cf640-51a9-11ee-8616-91cf6f807a5f + + + diff --git a/graph/incidents_graphml/7/7f32d140-0a46-11ef-8e53-fb0f959aa93f.graphml b/graph/incidents_graphml/7/7f32d140-0a46-11ef-8e53-fb0f959aa93f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72ddfab01f00ad91ac58a6d3db20590b4402ecbb --- /dev/null +++ b/graph/incidents_graphml/7/7f32d140-0a46-11ef-8e53-fb0f959aa93f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.161 + 100.64.17.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714848337 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f32d140-0a46-11ef-8e53-fb0f959aa93f + + + diff --git a/graph/incidents_graphml/7/7f36e6f0-8462-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/7/7f36e6f0-8462-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15b67476ae5fe01ba6661d698297bbb3097534e5 --- /dev/null +++ b/graph/incidents_graphml/7/7f36e6f0-8462-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.178 + 100.64.51.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700126907 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f36e6f0-8462-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/7/7f3b45f0-592f-11ee-a8a5-b59feb9cfe2c.graphml b/graph/incidents_graphml/7/7f3b45f0-592f-11ee-a8a5-b59feb9cfe2c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee2b935189142b4711f5eb5cab12841cc80830d7 --- /dev/null +++ b/graph/incidents_graphml/7/7f3b45f0-592f-11ee-a8a5-b59feb9cfe2c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.126 + 100.64.64.126 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695377102 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f3b45f0-592f-11ee-a8a5-b59feb9cfe2c + + + diff --git a/graph/incidents_graphml/7/7f3d80a0-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7f3d80a0-1617-11ee-a9fc-9ffb4847312b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1fa47556c328f81d329b2c854f627561b96d0182 --- /dev/null +++ b/graph/incidents_graphml/7/7f3d80a0-1617-11ee-a9fc-9ffb4847312b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.211 + 100.64.35.211 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000067 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f3d80a0-1617-11ee-a9fc-9ffb4847312b + + + diff --git a/graph/incidents_graphml/7/7f3dbf20-51a9-11ee-8616-91cf6f807a5f.graphml b/graph/incidents_graphml/7/7f3dbf20-51a9-11ee-8616-91cf6f807a5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d1ec629b5ca5d052c61dbf4c761edd498abaa51 --- /dev/null +++ b/graph/incidents_graphml/7/7f3dbf20-51a9-11ee-8616-91cf6f807a5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.131 + 100.64.38.131 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694549892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f3dbf20-51a9-11ee-8616-91cf6f807a5f + + + diff --git a/graph/incidents_graphml/7/7f439a20-0a46-11ef-8e53-fb0f959aa93f.graphml b/graph/incidents_graphml/7/7f439a20-0a46-11ef-8e53-fb0f959aa93f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8dc247bf298e8b517441c7f99be64c24710c9ee3 --- /dev/null +++ b/graph/incidents_graphml/7/7f439a20-0a46-11ef-8e53-fb0f959aa93f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.161 + 100.64.17.161 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714848337 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f439a20-0a46-11ef-8e53-fb0f959aa93f + + + diff --git a/graph/incidents_graphml/7/7f44f570-d773-11ed-b131-97a6b3859c17.graphml b/graph/incidents_graphml/7/7f44f570-d773-11ed-b131-97a6b3859c17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a4f2d8fec0c24cc6583f47d9cf5d0e4202d3f50 --- /dev/null +++ b/graph/incidents_graphml/7/7f44f570-d773-11ed-b131-97a6b3859c17.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.11 + 100.64.17.11 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.12 + 100.64.17.12 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1681112657 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f44f570-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112657 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f44f570-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112657 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f44f570-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112657 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f44f570-d773-11ed-b131-97a6b3859c17 + + + diff --git a/graph/incidents_graphml/7/7f4dc3f0-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f4dc3f0-1fe8-11ed-98ff-21bdae0ea557.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0b894e10ed45611bd0db012d2f5db5ead64db0c --- /dev/null +++ b/graph/incidents_graphml/7/7f4dc3f0-1fe8-11ed-98ff-21bdae0ea557.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.105 + 100.64.73.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f4dc3f0-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f4dc3f0-1fe8-11ed-98ff-21bdae0ea557 + + + diff --git a/graph/incidents_graphml/7/7f4dd8f0-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/7/7f4dd8f0-3553-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7aa541fbf1dee8cdd5918643fb568673519a166 --- /dev/null +++ b/graph/incidents_graphml/7/7f4dd8f0-3553-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.133 + 100.64.23.133 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691434323 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f4dd8f0-3553-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/7/7f520e50-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7f520e50-0c38-11ee-9256-6d0394834f57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d138a26d8ebb9cf75d64b1eb020c4b2a3a7cf51 --- /dev/null +++ b/graph/incidents_graphml/7/7f520e50-0c38-11ee-9256-6d0394834f57.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.115 + 100.64.33.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.18 + 100.64.4.18 + ["Exploiting Host","Exploiting Target"] + 0.83125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.92 + 100.64.36.92 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.93 + 100.64.36.93 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.225 + 100.64.34.225 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.94 + 100.64.36.94 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f520e50-0c38-11ee-9256-6d0394834f57 + + + diff --git a/graph/incidents_graphml/7/7f58d010-63a3-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/7/7f58d010-63a3-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b03c1bde109dcace55ed01060696ad2c2e7fc8d0 --- /dev/null +++ b/graph/incidents_graphml/7/7f58d010-63a3-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.43 + 100.64.9.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696526436 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f58d010-63a3-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/7/7f5d0630-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f5d0630-1fe8-11ed-98ff-21bdae0ea557.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98cfc6f723de0377a8a3edd9b912e967c7cc735e --- /dev/null +++ b/graph/incidents_graphml/7/7f5d0630-1fe8-11ed-98ff-21bdae0ea557.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.161 + 100.64.72.161 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.254 + 100.64.78.254 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.78.255 + 100.64.78.255 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.79.1 + 100.64.79.1 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f5d0630-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f5d0630-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f5d0630-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f5d0630-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f5d0630-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f5d0630-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f5d0630-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f5d0630-1fe8-11ed-98ff-21bdae0ea557 + + + diff --git a/graph/incidents_graphml/7/7f63e400-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f63e400-1fe8-11ed-98ff-21bdae0ea557.graphml new file mode 100644 index 0000000000000000000000000000000000000000..574d5a47c406db356b5f467fc41e356de90f63a1 --- /dev/null +++ b/graph/incidents_graphml/7/7f63e400-1fe8-11ed-98ff-21bdae0ea557.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.21.26.128 + 10.21.26.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.1 + 100.64.79.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 10.81.190.183 + 10.81.190.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660931894 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f63e400-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931894 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f63e400-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931894 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f63e400-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931894 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f63e400-1fe8-11ed-98ff-21bdae0ea557 + + + diff --git a/graph/incidents_graphml/7/7f66ced0-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7f66ced0-0c38-11ee-9256-6d0394834f57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e34aeedb6490ae4d558dbaf6dbbf92bf9eef30b --- /dev/null +++ b/graph/incidents_graphml/7/7f66ced0-0c38-11ee-9256-6d0394834f57.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.98 + 100.64.36.98 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.93 + 100.64.35.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.99 + 100.64.36.99 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.100 + 100.64.36.100 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f66ced0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f66ced0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f66ced0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f66ced0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f66ced0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f66ced0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f66ced0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f66ced0-0c38-11ee-9256-6d0394834f57 + + + diff --git a/graph/incidents_graphml/7/7f6850d0-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f6850d0-1fe8-11ed-98ff-21bdae0ea557.graphml new file mode 100644 index 0000000000000000000000000000000000000000..624aeda4af8707a9985650bb8414c1949642ba53 --- /dev/null +++ b/graph/incidents_graphml/7/7f6850d0-1fe8-11ed-98ff-21bdae0ea557.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.153 + 100.64.73.153 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f6850d0-1fe8-11ed-98ff-21bdae0ea557 + + + diff --git a/graph/incidents_graphml/7/7f6c31c0-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7f6c31c0-1617-11ee-a9fc-9ffb4847312b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4edb29eaa065b4a3556214cae2a5b1bf7b8e8409 --- /dev/null +++ b/graph/incidents_graphml/7/7f6c31c0-1617-11ee-a9fc-9ffb4847312b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.192 + 100.64.14.192 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000067 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f6c31c0-1617-11ee-a9fc-9ffb4847312b + + + diff --git a/graph/incidents_graphml/7/7f73e990-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f73e990-1fe8-11ed-98ff-21bdae0ea557.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1fe0d62c9647d05f1bd82693c380f8309fbb683d --- /dev/null +++ b/graph/incidents_graphml/7/7f73e990-1fe8-11ed-98ff-21bdae0ea557.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.153 + 100.64.73.153 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f73e990-1fe8-11ed-98ff-21bdae0ea557 + + + diff --git a/graph/incidents_graphml/7/7f792420-7c1f-11ee-8eb9-57773318f728.graphml b/graph/incidents_graphml/7/7f792420-7c1f-11ee-8eb9-57773318f728.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a15e332ec2acaaaa344c8ae379ecd342ef54f421 --- /dev/null +++ b/graph/incidents_graphml/7/7f792420-7c1f-11ee-8eb9-57773318f728.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.158 + 100.64.35.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699218522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f792420-7c1f-11ee-8eb9-57773318f728 + + + diff --git a/graph/incidents_graphml/7/7f797db0-23a1-11ef-8910-2ffbcbe646c0.graphml b/graph/incidents_graphml/7/7f797db0-23a1-11ef-8910-2ffbcbe646c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f0ee262192215c17f2f4d8b595233e19200dc7f --- /dev/null +++ b/graph/incidents_graphml/7/7f797db0-23a1-11ef-8910-2ffbcbe646c0.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.133 + 100.64.20.133 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.240 + 100.64.9.240 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.134 + 100.64.20.134 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.250 + 100.64.7.250 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.135 + 100.64.20.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.45 + 100.64.15.45 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.136 + 100.64.20.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.20.137 + 100.64.20.137 + [] + 0.25 + ["Precinct"] + + + HOST + 100.64.20.138 + 100.64.20.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.63 + 100.64.8.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.20.139 + 100.64.20.139 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.140 + 100.64.20.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.141 + 100.64.20.141 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.142 + 100.64.20.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.143 + 100.64.20.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.144 + 100.64.20.144 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + INCIDENT_LINK + 1717636200 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f797db0-23a1-11ef-8910-2ffbcbe646c0 + + + diff --git a/graph/incidents_graphml/7/7f79b5f0-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f79b5f0-1fe8-11ed-98ff-21bdae0ea557.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d0d4ad5bb71a2d2532f21e22bb0323224f3f9e7 --- /dev/null +++ b/graph/incidents_graphml/7/7f79b5f0-1fe8-11ed-98ff-21bdae0ea557.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.253 + 100.64.78.253 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660931894 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f79b5f0-1fe8-11ed-98ff-21bdae0ea557 + + + diff --git a/graph/incidents_graphml/7/7f7cb8b0-52c1-11ee-92d3-651405d7002c.graphml b/graph/incidents_graphml/7/7f7cb8b0-52c1-11ee-92d3-651405d7002c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec1500754c0d7987ee2814a464303e7c057ee393 --- /dev/null +++ b/graph/incidents_graphml/7/7f7cb8b0-52c1-11ee-92d3-651405d7002c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.173 + 100.64.8.173 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694670151 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f7cb8b0-52c1-11ee-92d3-651405d7002c + + + diff --git a/graph/incidents_graphml/7/7f7d5a90-eb52-11ec-9c3b-83765024aa2d.graphml b/graph/incidents_graphml/7/7f7d5a90-eb52-11ec-9c3b-83765024aa2d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f24c83c9768988a7117e9c07cc6d47ac30027b84 --- /dev/null +++ b/graph/incidents_graphml/7/7f7d5a90-eb52-11ec-9c3b-83765024aa2d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.140 + USER-0015-1923.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.25 + USER-0015-1893.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655150010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f7d5a90-eb52-11ec-9c3b-83765024aa2d + + + diff --git a/graph/incidents_graphml/7/7f7e2760-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7f7e2760-0c38-11ee-9256-6d0394834f57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48edea6250eb3fd3eef4444b212e57a73b7d9f16 --- /dev/null +++ b/graph/incidents_graphml/7/7f7e2760-0c38-11ee-9256-6d0394834f57.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.104 + USER-0015-1307.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.105 + 100.64.36.105 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.106 + 100.64.36.106 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.107 + 100.64.36.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f7e2760-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f7e2760-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f7e2760-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f7e2760-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f7e2760-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f7e2760-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f7e2760-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f7e2760-0c38-11ee-9256-6d0394834f57 + + + diff --git a/graph/incidents_graphml/7/7f828f90-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f828f90-1fe8-11ed-98ff-21bdae0ea557.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1690c6272013e47a748a3beabba785b9db80c610 --- /dev/null +++ b/graph/incidents_graphml/7/7f828f90-1fe8-11ed-98ff-21bdae0ea557.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.253 + 100.64.78.253 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660931895 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f828f90-1fe8-11ed-98ff-21bdae0ea557 + + + diff --git a/graph/incidents_graphml/7/7f87bfb0-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f87bfb0-1fe8-11ed-98ff-21bdae0ea557.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce95dae32128f95554f913848e9f2ac363ddb1cb --- /dev/null +++ b/graph/incidents_graphml/7/7f87bfb0-1fe8-11ed-98ff-21bdae0ea557.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.156 + 100.64.71.156 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.12.25 + 100.64.12.25 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.157 + 100.64.71.157 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660931895 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f87bfb0-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931895 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f87bfb0-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931895 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f87bfb0-1fe8-11ed-98ff-21bdae0ea557 + + + INCIDENT_LINK + 1660931895 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f87bfb0-1fe8-11ed-98ff-21bdae0ea557 + + + diff --git a/graph/incidents_graphml/7/7f88db90-7c1f-11ee-8eb9-57773318f728.graphml b/graph/incidents_graphml/7/7f88db90-7c1f-11ee-8eb9-57773318f728.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dedf9b9c72255ef722c0cc24677ba6f35d8b2d16 --- /dev/null +++ b/graph/incidents_graphml/7/7f88db90-7c1f-11ee-8eb9-57773318f728.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.158 + 100.64.35.158 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699218522 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7f88db90-7c1f-11ee-8eb9-57773318f728 + + + diff --git a/graph/incidents_graphml/7/7f8f7130-1617-11ee-a9fc-9ffb4847312b.graphml b/graph/incidents_graphml/7/7f8f7130-1617-11ee-a9fc-9ffb4847312b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b95937f61d9bc0d823c890b40cad57830476134 --- /dev/null +++ b/graph/incidents_graphml/7/7f8f7130-1617-11ee-a9fc-9ffb4847312b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.114 + USER-0015-1204.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000067 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7f8f7130-1617-11ee-a9fc-9ffb4847312b + + + diff --git a/graph/incidents_graphml/7/7f8faef0-1fe8-11ed-98ff-21bdae0ea557.graphml b/graph/incidents_graphml/7/7f8faef0-1fe8-11ed-98ff-21bdae0ea557.graphml new file mode 100644 index 0000000000000000000000000000000000000000..692d379931675bbbb9623ee4573c13161fc2b6fa --- /dev/null +++ b/graph/incidents_graphml/7/7f8faef0-1fe8-11ed-98ff-21bdae0ea557.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.124 + USER-0015-1799.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660931895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f8faef0-1fe8-11ed-98ff-21bdae0ea557 + + + diff --git a/graph/incidents_graphml/7/7f995080-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/7/7f995080-0c38-11ee-9256-6d0394834f57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6320293127489cb66ed8ac147d599111826cde91 --- /dev/null +++ b/graph/incidents_graphml/7/7f995080-0c38-11ee-9256-6d0394834f57.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.112 + 100.64.36.112 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686914729 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f995080-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914729 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7f995080-0c38-11ee-9256-6d0394834f57 + + + diff --git a/graph/incidents_graphml/7/7f9d6190-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7f9d6190-53e9-11ee-bfe4-c36dfe104f88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b03aaa6ab3110116c6a5b96844b1f4dce9dc8465 --- /dev/null +++ b/graph/incidents_graphml/7/7f9d6190-53e9-11ee-bfe4-c36dfe104f88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.58 + USER-0015-2171.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694797282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7f9d6190-53e9-11ee-bfe4-c36dfe104f88 + + + diff --git a/graph/incidents_graphml/7/7fae5180-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7fae5180-53e9-11ee-bfe4-c36dfe104f88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0454948b83568863a75692d7b5899be77dab2adf --- /dev/null +++ b/graph/incidents_graphml/7/7fae5180-53e9-11ee-bfe4-c36dfe104f88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.54.58 + USER-0015-2171.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694797283 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7fae5180-53e9-11ee-bfe4-c36dfe104f88 + + + diff --git a/graph/incidents_graphml/7/7fbb70e0-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7fbb70e0-53e9-11ee-bfe4-c36dfe104f88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..532b3f2acdcf730abbac50b05798c0525269c62f --- /dev/null +++ b/graph/incidents_graphml/7/7fbb70e0-53e9-11ee-bfe4-c36dfe104f88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.196 + 100.64.31.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694797283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7fbb70e0-53e9-11ee-bfe4-c36dfe104f88 + + + diff --git a/graph/incidents_graphml/7/7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/7/7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..defaf184fcd563f0e37337f25e3b5c28e9559577 --- /dev/null +++ b/graph/incidents_graphml/7/7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.29 + 100.64.82.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Meraki"] + + + HOST + 100.64.71.237 + 100.64.71.237 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.233 + 100.64.71.233 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689246896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7fbd84f0-216e-11ee-9e0b-8dcc0a578b7b + + + diff --git a/graph/incidents_graphml/7/7fc8be30-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7fc8be30-26c1-11ee-87ad-dd3f4232b94e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09f90b85d032e2231ca8c406103d6d0f641f5e4b --- /dev/null +++ b/graph/incidents_graphml/7/7fc8be30-26c1-11ee-87ad-dd3f4232b94e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689832301 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 7fc8be30-26c1-11ee-87ad-dd3f4232b94e + + + diff --git a/graph/incidents_graphml/7/7fc9c8c0-53e9-11ee-bfe4-c36dfe104f88.graphml b/graph/incidents_graphml/7/7fc9c8c0-53e9-11ee-bfe4-c36dfe104f88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad9504fbaacf8680c76e292e0587a76988c3f494 --- /dev/null +++ b/graph/incidents_graphml/7/7fc9c8c0-53e9-11ee-bfe4-c36dfe104f88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.31.196 + 100.64.31.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694797283 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7fc9c8c0-53e9-11ee-bfe4-c36dfe104f88 + + + diff --git a/graph/incidents_graphml/7/7fd6e6a0-52c1-11ee-92d3-651405d7002c.graphml b/graph/incidents_graphml/7/7fd6e6a0-52c1-11ee-92d3-651405d7002c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10720e3cbda1586bd8a0d049cacd5fa548ca058d --- /dev/null +++ b/graph/incidents_graphml/7/7fd6e6a0-52c1-11ee-92d3-651405d7002c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.211 + 100.64.13.211 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694670152 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7fd6e6a0-52c1-11ee-92d3-651405d7002c + + + diff --git a/graph/incidents_graphml/7/7fdbd100-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/7/7fdbd100-26c1-11ee-87ad-dd3f4232b94e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9f23e17a7b78b540d5196d6e8801ea058de3c58 --- /dev/null +++ b/graph/incidents_graphml/7/7fdbd100-26c1-11ee-87ad-dd3f4232b94e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689832301 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7fdbd100-26c1-11ee-87ad-dd3f4232b94e + + + diff --git a/graph/incidents_graphml/7/7fe58ca0-52c1-11ee-92d3-651405d7002c.graphml b/graph/incidents_graphml/7/7fe58ca0-52c1-11ee-92d3-651405d7002c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c198935395e694fc7266747f617b57f9cade4c7 --- /dev/null +++ b/graph/incidents_graphml/7/7fe58ca0-52c1-11ee-92d3-651405d7002c.graphml @@ -0,0 +1,833 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.213 + 100.64.13.213 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.214 + 100.64.13.214 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.215 + 100.64.13.215 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.216 + 100.64.13.216 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.16 + 100.64.9.16 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.217 + 100.64.13.217 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.218 + 100.64.13.218 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.219 + 100.64.13.219 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.220 + 100.64.13.220 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.140 + 100.64.5.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.221 + 100.64.13.221 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.250 + 100.64.7.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.222 + 100.64.13.222 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.223 + 100.64.13.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.232 + 100.64.9.232 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.231 + 100.64.10.231 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.224 + 100.64.13.224 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.225 + 100.64.13.225 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + INCIDENT_LINK + 1694670152 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 7fe58ca0-52c1-11ee-92d3-651405d7002c + + + diff --git a/graph/incidents_graphml/7/7ff4b580-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/7/7ff4b580-7a9a-11ee-bfc5-c9e889c56814.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03327b6cdf6320acedce3646fcc0993084b1d057 --- /dev/null +++ b/graph/incidents_graphml/7/7ff4b580-7a9a-11ee-bfc5-c9e889c56814.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.179 + 100.64.62.179 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699051448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 7ff4b580-7a9a-11ee-bfc5-c9e889c56814 + + + diff --git a/graph/incidents_graphml/7/7ff54410-52c1-11ee-92d3-651405d7002c.graphml b/graph/incidents_graphml/7/7ff54410-52c1-11ee-92d3-651405d7002c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af16e55e33b5e97b2f50636f914db540c6b56556 --- /dev/null +++ b/graph/incidents_graphml/7/7ff54410-52c1-11ee-92d3-651405d7002c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.213 + 100.64.13.213 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694670152 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 7ff54410-52c1-11ee-92d3-651405d7002c + + + diff --git a/graph/incidents_graphml/8/80087930-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/80087930-0dfd-11ee-a017-1387949db3a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ad1756d8a609d8ef2e21954b8e16cf0b772f64b --- /dev/null +++ b/graph/incidents_graphml/8/80087930-0dfd-11ee-a017-1387949db3a7.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687109292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80087930-0dfd-11ee-a017-1387949db3a7 + + + INCIDENT_LINK + 1687109292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80087930-0dfd-11ee-a017-1387949db3a7 + + + INCIDENT_LINK + 1687109292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80087930-0dfd-11ee-a017-1387949db3a7 + + + diff --git a/graph/incidents_graphml/8/8011cf10-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/8011cf10-4ed7-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f8a8a2daac4d99d394bff68cf615ef3d8db7e12 --- /dev/null +++ b/graph/incidents_graphml/8/8011cf10-4ed7-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.78 + 100.64.57.78 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694239796 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 8011cf10-4ed7-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/8/801816b0-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/8/801816b0-26c1-11ee-87ad-dd3f4232b94e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cf5c730e9d5b929cb7afcad5739cc50f43eab1f --- /dev/null +++ b/graph/incidents_graphml/8/801816b0-26c1-11ee-87ad-dd3f4232b94e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.167 + 100.64.41.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689832301 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 801816b0-26c1-11ee-87ad-dd3f4232b94e + + + diff --git a/graph/incidents_graphml/8/801a65f0-7a9a-11ee-bfc5-c9e889c56814.graphml b/graph/incidents_graphml/8/801a65f0-7a9a-11ee-bfc5-c9e889c56814.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ddcbce1a522e6eaa7376937dd3dc2c2fc81a7cba --- /dev/null +++ b/graph/incidents_graphml/8/801a65f0-7a9a-11ee-bfc5-c9e889c56814.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.104 + USER-0015-1241.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699051448 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 801a65f0-7a9a-11ee-bfc5-c9e889c56814 + + + diff --git a/graph/incidents_graphml/8/80233430-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80233430-4ed7-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcef18782e175718788be4e0336bd58f4e4e3af2 --- /dev/null +++ b/graph/incidents_graphml/8/80233430-4ed7-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.78 + 100.64.57.78 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694239797 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80233430-4ed7-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/8/80246130-1114-11ee-9311-e18c92d5b3d3.graphml b/graph/incidents_graphml/8/80246130-1114-11ee-9311-e18c92d5b3d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55816684005163fc8723d2df5fd1298c1e959fea --- /dev/null +++ b/graph/incidents_graphml/8/80246130-1114-11ee-9311-e18c92d5b3d3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.226.203 + 192.168.226.203 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.80.198 + 100.64.80.198 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687449024 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80246130-1114-11ee-9311-e18c92d5b3d3 + + + INCIDENT_LINK + 1687449024 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80246130-1114-11ee-9311-e18c92d5b3d3 + + + diff --git a/graph/incidents_graphml/8/80280f20-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/80280f20-0dfd-11ee-a017-1387949db3a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbce9e224eec8876e72819a60dedf8f0e7438912 --- /dev/null +++ b/graph/incidents_graphml/8/80280f20-0dfd-11ee-a017-1387949db3a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687109292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 80280f20-0dfd-11ee-a017-1387949db3a7 + + + diff --git a/graph/incidents_graphml/8/802b7850-2819-11ee-b06f-b17f5f626799.graphml b/graph/incidents_graphml/8/802b7850-2819-11ee-b06f-b17f5f626799.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52c12391dd4d622f58e16f0f4cca70fea58ff46b --- /dev/null +++ b/graph/incidents_graphml/8/802b7850-2819-11ee-b06f-b17f5f626799.graphml @@ -0,0 +1,459 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.151 + 100.64.39.151 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.13 + 100.64.44.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.46 + 100.64.21.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.109 + 100.64.8.109 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.250 + 100.64.13.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.119 + 100.64.65.119 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.120 + 100.64.65.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.121 + 100.64.65.121 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.73 + 100.64.7.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + INCIDENT_LINK + 1689980048 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802b7850-2819-11ee-b06f-b17f5f626799 + + + diff --git a/graph/incidents_graphml/8/802d6e10-e2ab-11ee-bd91-33ef6009cb64.graphml b/graph/incidents_graphml/8/802d6e10-e2ab-11ee-bd91-33ef6009cb64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d18a505d7622d2e8446573079a10ad4ee0b2f30e --- /dev/null +++ b/graph/incidents_graphml/8/802d6e10-e2ab-11ee-bd91-33ef6009cb64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.200 + 100.64.11.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710493671 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 802d6e10-e2ab-11ee-bd91-33ef6009cb64 + + + diff --git a/graph/incidents_graphml/8/802f4830-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/8/802f4830-26c1-11ee-87ad-dd3f4232b94e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61740bffdf38583cb486534f83856c41f3ca0cf8 --- /dev/null +++ b/graph/incidents_graphml/8/802f4830-26c1-11ee-87ad-dd3f4232b94e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.167 + 100.64.41.167 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689832301 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 802f4830-26c1-11ee-87ad-dd3f4232b94e + + + diff --git a/graph/incidents_graphml/8/803ecb70-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/803ecb70-0dfd-11ee-a017-1387949db3a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..789396d2e46ee4bb8bbfb16654a15a54a8b68295 --- /dev/null +++ b/graph/incidents_graphml/8/803ecb70-0dfd-11ee-a017-1387949db3a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.205 + 100.64.67.205 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687109292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 803ecb70-0dfd-11ee-a017-1387949db3a7 + + + diff --git a/graph/incidents_graphml/8/80404f40-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/8/80404f40-3553-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc713156bb3d183aec59dd91d8abad630fb6817a --- /dev/null +++ b/graph/incidents_graphml/8/80404f40-3553-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691434324 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 80404f40-3553-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/8/8041dcd0-fb32-11ed-9187-67e5cded34a2.graphml b/graph/incidents_graphml/8/8041dcd0-fb32-11ed-9187-67e5cded34a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de52f872137be904356f24a831e72555d6d696a6 --- /dev/null +++ b/graph/incidents_graphml/8/8041dcd0-fb32-11ed-9187-67e5cded34a2.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.21.75 + 100.64.21.75 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.60.156 + 100.64.60.156 + ["Exploiting Host","Exploiting Target","Ransomware Target"] + 0.25 + ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"] + + + INCIDENT_LINK + 1685042983 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Unprocessed + 8041dcd0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042983 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Unprocessed + 8041dcd0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042983 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Unprocessed + 8041dcd0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042983 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Unprocessed + 8041dcd0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042983 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Unprocessed + 8041dcd0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042983 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Unprocessed + 8041dcd0-fb32-11ed-9187-67e5cded34a2 + + + diff --git a/graph/incidents_graphml/8/80427cb0-e2ab-11ee-bd91-33ef6009cb64.graphml b/graph/incidents_graphml/8/80427cb0-e2ab-11ee-bd91-33ef6009cb64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d458dcb4fc71fa24ec8a3cdd6dbbff9b9ed82c9 --- /dev/null +++ b/graph/incidents_graphml/8/80427cb0-e2ab-11ee-bd91-33ef6009cb64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.200 + 100.64.11.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710493671 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 80427cb0-e2ab-11ee-bd91-33ef6009cb64 + + + diff --git a/graph/incidents_graphml/8/804e9bc0-3582-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/8/804e9bc0-3582-11ee-a01e-93ea9ac7eb39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8b92e7d6c05fb962c746ff8410b804c4e561ab4 --- /dev/null +++ b/graph/incidents_graphml/8/804e9bc0-3582-11ee-a01e-93ea9ac7eb39.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.45 + 100.64.39.45 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691454511 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 804e9bc0-3582-11ee-a01e-93ea9ac7eb39 + + + diff --git a/graph/incidents_graphml/8/80534590-e2ab-11ee-bd91-33ef6009cb64.graphml b/graph/incidents_graphml/8/80534590-e2ab-11ee-bd91-33ef6009cb64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..744b29421d9061954348c1eb41e81fb7da6095a5 --- /dev/null +++ b/graph/incidents_graphml/8/80534590-e2ab-11ee-bd91-33ef6009cb64.graphml @@ -0,0 +1,503 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.202 + 100.64.11.202 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.203 + 100.64.11.203 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.204 + 100.64.11.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.205 + 100.64.11.205 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.206 + 100.64.11.206 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.207 + 100.64.11.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.208 + 100.64.11.208 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.209 + 100.64.11.209 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.210 + 100.64.11.210 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.211 + 100.64.11.211 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + INCIDENT_LINK + 1710493671 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80534590-e2ab-11ee-bd91-33ef6009cb64 + + + diff --git a/graph/incidents_graphml/8/805cab40-0a46-11ef-8e53-fb0f959aa93f.graphml b/graph/incidents_graphml/8/805cab40-0a46-11ef-8e53-fb0f959aa93f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42c72e94a50be1873b8a8771f4769884eab4ee88 --- /dev/null +++ b/graph/incidents_graphml/8/805cab40-0a46-11ef-8e53-fb0f959aa93f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.43 + 100.64.33.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714848339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 805cab40-0a46-11ef-8e53-fb0f959aa93f + + + diff --git a/graph/incidents_graphml/8/805d9e10-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/805d9e10-0dfd-11ee-a017-1387949db3a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a976713e35fcbb24d4f76f7b8841fa2a9f3585ba --- /dev/null +++ b/graph/incidents_graphml/8/805d9e10-0dfd-11ee-a017-1387949db3a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.205 + 100.64.67.205 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687109292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 805d9e10-0dfd-11ee-a017-1387949db3a7 + + + diff --git a/graph/incidents_graphml/8/8060df80-26c1-11ee-87ad-dd3f4232b94e.graphml b/graph/incidents_graphml/8/8060df80-26c1-11ee-87ad-dd3f4232b94e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11bff7495d243de7a8e3fe39b1d9243fbde69188 --- /dev/null +++ b/graph/incidents_graphml/8/8060df80-26c1-11ee-87ad-dd3f4232b94e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689832302 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 8060df80-26c1-11ee-87ad-dd3f4232b94e + + + diff --git a/graph/incidents_graphml/8/8067b7f0-e2ab-11ee-bd91-33ef6009cb64.graphml b/graph/incidents_graphml/8/8067b7f0-e2ab-11ee-bd91-33ef6009cb64.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bcd03d125bc30e288e090b8d1540538000fdb7e4 --- /dev/null +++ b/graph/incidents_graphml/8/8067b7f0-e2ab-11ee-bd91-33ef6009cb64.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.202 + 100.64.11.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710493671 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 8067b7f0-e2ab-11ee-bd91-33ef6009cb64 + + + diff --git a/graph/incidents_graphml/8/806eaca0-0a46-11ef-8e53-fb0f959aa93f.graphml b/graph/incidents_graphml/8/806eaca0-0a46-11ef-8e53-fb0f959aa93f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5bc4e28cea9223b84eb2326d5f15f28544e8498 --- /dev/null +++ b/graph/incidents_graphml/8/806eaca0-0a46-11ef-8e53-fb0f959aa93f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.43 + 100.64.33.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714848339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 806eaca0-0a46-11ef-8e53-fb0f959aa93f + + + diff --git a/graph/incidents_graphml/8/8088dc50-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/8/8088dc50-2ff5-11ee-b00f-c1ca007fb916.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa3339da3fb2aaa84d47a6826daeda979807b95d --- /dev/null +++ b/graph/incidents_graphml/8/8088dc50-2ff5-11ee-b00f-c1ca007fb916.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1690844196 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 8088dc50-2ff5-11ee-b00f-c1ca007fb916 + + + diff --git a/graph/incidents_graphml/8/808aa370-35bb-11ee-95a2-5f9786093780.graphml b/graph/incidents_graphml/8/808aa370-35bb-11ee-95a2-5f9786093780.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66ec7dd2b75d015e68c52be7aa8d5da3119e09cd --- /dev/null +++ b/graph/incidents_graphml/8/808aa370-35bb-11ee-95a2-5f9786093780.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.142 + 100.64.80.142 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.137 + 100.64.74.137 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.143 + 100.64.80.143 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1691478992 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 808aa370-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691478992 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 808aa370-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691478992 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 808aa370-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691478992 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 808aa370-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691478992 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 808aa370-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691478992 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 808aa370-35bb-11ee-95a2-5f9786093780 + + + diff --git a/graph/incidents_graphml/8/808ddce0-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/808ddce0-4ed7-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..601d9fc7205de5e3f81664c80b116fb7414f1d99 --- /dev/null +++ b/graph/incidents_graphml/8/808ddce0-4ed7-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.140 + 100.64.37.140 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694239797 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 808ddce0-4ed7-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/8/808e6320-f51b-11ec-9c76-edb488c77bbc.graphml b/graph/incidents_graphml/8/808e6320-f51b-11ec-9c76-edb488c77bbc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33ba7746eb966442fe9123f5b9162b8058ecdce3 --- /dev/null +++ b/graph/incidents_graphml/8/808e6320-f51b-11ec-9c76-edb488c77bbc.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.21 + 100.64.16.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.72 + USER-0015-1725.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656225901 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 808e6320-f51b-11ec-9c76-edb488c77bbc + + + INCIDENT_LINK + 1656225901 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 808e6320-f51b-11ec-9c76-edb488c77bbc + + + diff --git a/graph/incidents_graphml/8/808e6450-7211-11ee-bd8d-9bab1f3513c7.graphml b/graph/incidents_graphml/8/808e6450-7211-11ee-bd8d-9bab1f3513c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d40d23587d67bccb8f976e7f9fbed156ff1f512 --- /dev/null +++ b/graph/incidents_graphml/8/808e6450-7211-11ee-bd8d-9bab1f3513c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.133 + 100.64.58.133 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698112999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 808e6450-7211-11ee-bd8d-9bab1f3513c7 + + + diff --git a/graph/incidents_graphml/8/80919830-3582-11ee-a01e-93ea9ac7eb39.graphml b/graph/incidents_graphml/8/80919830-3582-11ee-a01e-93ea9ac7eb39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57d247c942937c41bca5477b623be94d035cebde --- /dev/null +++ b/graph/incidents_graphml/8/80919830-3582-11ee-a01e-93ea9ac7eb39.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.45 + 100.64.39.45 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691454511 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 80919830-3582-11ee-a01e-93ea9ac7eb39 + + + diff --git a/graph/incidents_graphml/8/8091aa90-1067-11ee-aaa6-7f821bc3777a.graphml b/graph/incidents_graphml/8/8091aa90-1067-11ee-aaa6-7f821bc3777a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1b30dcead39fccc05d2736ac12bcb36b3b0bced --- /dev/null +++ b/graph/incidents_graphml/8/8091aa90-1067-11ee-aaa6-7f821bc3777a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.4 + 100.64.59.4 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687374722 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 8091aa90-1067-11ee-aaa6-7f821bc3777a + + + diff --git a/graph/incidents_graphml/8/809bdcc0-3553-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/8/809bdcc0-3553-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1dfbcbfaf9f760c088247bc79f76eb037b4f362 --- /dev/null +++ b/graph/incidents_graphml/8/809bdcc0-3553-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691434325 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 809bdcc0-3553-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/8/80a101f0-7211-11ee-bd8d-9bab1f3513c7.graphml b/graph/incidents_graphml/8/80a101f0-7211-11ee-bd8d-9bab1f3513c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..615860b0a250a27e3c95b42985a83e2ea6f603b0 --- /dev/null +++ b/graph/incidents_graphml/8/80a101f0-7211-11ee-bd8d-9bab1f3513c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.29 + 100.64.12.29 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698112999 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 80a101f0-7211-11ee-bd8d-9bab1f3513c7 + + + diff --git a/graph/incidents_graphml/8/80a8b7e0-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80a8b7e0-4ed7-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7dc3e15754bff26c2c58ecf51a23ac7e0bdee82 --- /dev/null +++ b/graph/incidents_graphml/8/80a8b7e0-4ed7-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.80 + 100.64.57.80 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694239797 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80a8b7e0-4ed7-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/8/80a97420-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/80a97420-0dfd-11ee-a017-1387949db3a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94b18a2a7d8dd44d0ff4bdbfe5bdffdf743f8500 --- /dev/null +++ b/graph/incidents_graphml/8/80a97420-0dfd-11ee-a017-1387949db3a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.73 + USER-0015-1490.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687109293 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 80a97420-0dfd-11ee-a017-1387949db3a7 + + + diff --git a/graph/incidents_graphml/8/80aed450-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/8/80aed450-2122-11ee-9a61-05dd24aa353e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f7b25cb5da74f8565f54aba3c6e582313126551 --- /dev/null +++ b/graph/incidents_graphml/8/80aed450-2122-11ee-9a61-05dd24aa353e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.128 + 100.64.69.128 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1689214256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 80aed450-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 80aed450-2122-11ee-9a61-05dd24aa353e + + + diff --git a/graph/incidents_graphml/8/80b0ca60-1007-11ef-b866-697ee3663480.graphml b/graph/incidents_graphml/8/80b0ca60-1007-11ef-b866-697ee3663480.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b86dca0176737a5cb4a763d963dd919bebfedc12 --- /dev/null +++ b/graph/incidents_graphml/8/80b0ca60-1007-11ef-b866-697ee3663480.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.103 + 100.64.18.103 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715480988 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80b0ca60-1007-11ef-b866-697ee3663480 + + + diff --git a/graph/incidents_graphml/8/80b6e8b0-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80b6e8b0-4ed7-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f262c51d8bc189024f8b77e43adb05e82078190 --- /dev/null +++ b/graph/incidents_graphml/8/80b6e8b0-4ed7-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.80 + 100.64.57.80 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694239798 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 80b6e8b0-4ed7-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/8/80c4a450-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80c4a450-4ed7-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b745fd49e722ce9ad0dc5211a101911eda611063 --- /dev/null +++ b/graph/incidents_graphml/8/80c4a450-4ed7-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.120 + 100.64.46.120 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694239798 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 80c4a450-4ed7-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/8/80c5d300-5b9f-11ee-95ea-792d2008bff3.graphml b/graph/incidents_graphml/8/80c5d300-5b9f-11ee-95ea-792d2008bff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab09a486dc020ac14cee4e238e285123e7a5e184 --- /dev/null +++ b/graph/incidents_graphml/8/80c5d300-5b9f-11ee-95ea-792d2008bff3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.204 + 100.64.95.204 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695645111 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 80c5d300-5b9f-11ee-95ea-792d2008bff3 + + + diff --git a/graph/incidents_graphml/8/80ccdaa0-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/80ccdaa0-0dfd-11ee-a017-1387949db3a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7e50c13e3e7e325e2c896c629d25a36566feaf3 --- /dev/null +++ b/graph/incidents_graphml/8/80ccdaa0-0dfd-11ee-a017-1387949db3a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.73 + USER-0015-1490.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687109293 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 80ccdaa0-0dfd-11ee-a017-1387949db3a7 + + + diff --git a/graph/incidents_graphml/8/80d2ae10-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80d2ae10-4ed7-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7770e54230d1a7739b030bd21d4ce5a8c372087e --- /dev/null +++ b/graph/incidents_graphml/8/80d2ae10-4ed7-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.120 + 100.64.46.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694239798 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 80d2ae10-4ed7-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/8/80d5bc00-4dbe-11ee-b251-912537db6da9.graphml b/graph/incidents_graphml/8/80d5bc00-4dbe-11ee-b251-912537db6da9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba0439460cbe49787fab3c8eac9a9e964041da7d --- /dev/null +++ b/graph/incidents_graphml/8/80d5bc00-4dbe-11ee-b251-912537db6da9.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.1 + 100.64.70.1 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1694119109 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 80d5bc00-4dbe-11ee-b251-912537db6da9 + + + INCIDENT_LINK + 1694119109 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 80d5bc00-4dbe-11ee-b251-912537db6da9 + + + diff --git a/graph/incidents_graphml/8/80e34fe0-4ed7-11ee-b44c-ffbac85a0b7c.graphml b/graph/incidents_graphml/8/80e34fe0-4ed7-11ee-b44c-ffbac85a0b7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83ca51a593699508aa4de44c8e944ba98d88f22a --- /dev/null +++ b/graph/incidents_graphml/8/80e34fe0-4ed7-11ee-b44c-ffbac85a0b7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.219 + 100.64.17.219 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694239798 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 80e34fe0-4ed7-11ee-b44c-ffbac85a0b7c + + + diff --git a/graph/incidents_graphml/8/80ead590-5f20-11ee-9598-b95b2a00646d.graphml b/graph/incidents_graphml/8/80ead590-5f20-11ee-9598-b95b2a00646d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50207549fa05bad8709c63208dce1e34a5670178 --- /dev/null +++ b/graph/incidents_graphml/8/80ead590-5f20-11ee-9598-b95b2a00646d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.21.172 + USER-0015-1977.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696030370 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 80ead590-5f20-11ee-9598-b95b2a00646d + + + diff --git a/graph/incidents_graphml/8/80ee9370-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/80ee9370-0dfd-11ee-a017-1387949db3a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29610c95a1c3e0032a1a8315cd20186646f9a06a --- /dev/null +++ b/graph/incidents_graphml/8/80ee9370-0dfd-11ee-a017-1387949db3a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.68 + 100.64.21.68 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687109293 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 80ee9370-0dfd-11ee-a017-1387949db3a7 + + + diff --git a/graph/incidents_graphml/8/81072b80-0b98-11ef-bee4-2118ac552c06.graphml b/graph/incidents_graphml/8/81072b80-0b98-11ef-bee4-2118ac552c06.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e70d72e6e453b5e6adf0cfe245a0c69bda8d3e8d --- /dev/null +++ b/graph/incidents_graphml/8/81072b80-0b98-11ef-bee4-2118ac552c06.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.57 + 100.64.38.57 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714993510 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 81072b80-0b98-11ef-bee4-2118ac552c06 + + + diff --git a/graph/incidents_graphml/8/810f88f0-0dfd-11ee-a017-1387949db3a7.graphml b/graph/incidents_graphml/8/810f88f0-0dfd-11ee-a017-1387949db3a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..224d8e655abe2e21312d6e145dd4517235b05fc9 --- /dev/null +++ b/graph/incidents_graphml/8/810f88f0-0dfd-11ee-a017-1387949db3a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.68 + 100.64.21.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687109293 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 810f88f0-0dfd-11ee-a017-1387949db3a7 + + + diff --git a/graph/incidents_graphml/8/811d21a0-fb32-11ed-9187-67e5cded34a2.graphml b/graph/incidents_graphml/8/811d21a0-fb32-11ed-9187-67e5cded34a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d8b02eaf07922c60546a46bb2c6fca52bddcfe1 --- /dev/null +++ b/graph/incidents_graphml/8/811d21a0-fb32-11ed-9187-67e5cded34a2.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.28.242 + 100.64.28.242 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + 0.6625 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","Azure Security","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.30.59 + 100.64.30.59 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.8.78 + 100.64.8.78 + ["Exploiting Host","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.220 + 100.64.68.220 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.221 + 100.64.68.221 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.222 + 100.64.68.222 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.223 + 100.64.68.223 + ["Exploiting Host","Exploiting Target","Ransomware Target"] + 0.746875 + ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.18.74 + 100.64.18.74 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + 0.6625 + ["Precinct","Okta","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.224 + 100.64.68.224 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042985 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 811d21a0-fb32-11ed-9187-67e5cded34a2 + + + diff --git a/graph/incidents_graphml/8/81203ac0-dcd2-11ee-877f-c1ac29d0ce14.graphml b/graph/incidents_graphml/8/81203ac0-dcd2-11ee-877f-c1ac29d0ce14.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a69728ff6194bce91e83da9f06d65407bdc8b042 --- /dev/null +++ b/graph/incidents_graphml/8/81203ac0-dcd2-11ee-877f-c1ac29d0ce14.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.61 + 100.64.23.61 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709850716 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 81203ac0-dcd2-11ee-877f-c1ac29d0ce14 + + + diff --git a/graph/incidents_graphml/8/812b1980-7211-11ee-bd8d-9bab1f3513c7.graphml b/graph/incidents_graphml/8/812b1980-7211-11ee-bd8d-9bab1f3513c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1dea29115ba531a4287eb198ce041d77ea58e32 --- /dev/null +++ b/graph/incidents_graphml/8/812b1980-7211-11ee-bd8d-9bab1f3513c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.76 + 100.64.18.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698113000 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 812b1980-7211-11ee-bd8d-9bab1f3513c7 + + + diff --git a/graph/incidents_graphml/8/81393440-1007-11ef-b866-697ee3663480.graphml b/graph/incidents_graphml/8/81393440-1007-11ef-b866-697ee3663480.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c11b79bd2684cdc7c9081b2472f13bf3c9e59e2 --- /dev/null +++ b/graph/incidents_graphml/8/81393440-1007-11ef-b866-697ee3663480.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.105 + 100.64.18.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715480989 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 81393440-1007-11ef-b866-697ee3663480 + + + diff --git a/graph/incidents_graphml/8/8139e690-7211-11ee-bd8d-9bab1f3513c7.graphml b/graph/incidents_graphml/8/8139e690-7211-11ee-bd8d-9bab1f3513c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f01414b832962e89cb1183c81d06c9162769281 --- /dev/null +++ b/graph/incidents_graphml/8/8139e690-7211-11ee-bd8d-9bab1f3513c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.76 + 100.64.18.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698113000 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 8139e690-7211-11ee-bd8d-9bab1f3513c7 + + + diff --git a/graph/incidents_graphml/8/813b5e90-10ff-11ed-87b3-2f5c2a8265d8.graphml b/graph/incidents_graphml/8/813b5e90-10ff-11ed-87b3-2f5c2a8265d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4088aba4599c945ebcea40885bf54c45b792c173 --- /dev/null +++ b/graph/incidents_graphml/8/813b5e90-10ff-11ed-87b3-2f5c2a8265d8.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.13 + 100.64.39.13 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.119 + 100.64.71.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.109 + 100.64.1.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.22.229 + 100.64.22.229 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.179 + 100.64.71.179 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659292508 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 813b5e90-10ff-11ed-87b3-2f5c2a8265d8 + + + INCIDENT_LINK + 1659292508 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 813b5e90-10ff-11ed-87b3-2f5c2a8265d8 + + + INCIDENT_LINK + 1659292508 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 813b5e90-10ff-11ed-87b3-2f5c2a8265d8 + + + INCIDENT_LINK + 1659292508 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 813b5e90-10ff-11ed-87b3-2f5c2a8265d8 + + + INCIDENT_LINK + 1659292508 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 813b5e90-10ff-11ed-87b3-2f5c2a8265d8 + + + INCIDENT_LINK + 1659292508 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 813b5e90-10ff-11ed-87b3-2f5c2a8265d8 + + + INCIDENT_LINK + 1659292508 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 813b5e90-10ff-11ed-87b3-2f5c2a8265d8 + + + INCIDENT_LINK + 1659292508 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 813b5e90-10ff-11ed-87b3-2f5c2a8265d8 + + + diff --git a/graph/incidents_graphml/8/81436870-df6a-11ee-b599-d5300ed6974c.graphml b/graph/incidents_graphml/8/81436870-df6a-11ee-b599-d5300ed6974c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bc76e13ce86ebfaa15ce7aae9f46196e12f2742 --- /dev/null +++ b/graph/incidents_graphml/8/81436870-df6a-11ee-b599-d5300ed6974c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.180 + 100.64.8.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710135902 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 81436870-df6a-11ee-b599-d5300ed6974c + + + diff --git a/graph/incidents_graphml/8/814960e0-1007-11ef-b866-697ee3663480.graphml b/graph/incidents_graphml/8/814960e0-1007-11ef-b866-697ee3663480.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c8b7333c3b255b98d4e875502367050ad65e940 --- /dev/null +++ b/graph/incidents_graphml/8/814960e0-1007-11ef-b866-697ee3663480.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.105 + 100.64.18.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715480989 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 814960e0-1007-11ef-b866-697ee3663480 + + + diff --git a/graph/incidents_graphml/8/81502460-dcd2-11ee-877f-c1ac29d0ce14.graphml b/graph/incidents_graphml/8/81502460-dcd2-11ee-877f-c1ac29d0ce14.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17b09f0f824f341ff27563d17605ef2804af9927 --- /dev/null +++ b/graph/incidents_graphml/8/81502460-dcd2-11ee-877f-c1ac29d0ce14.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.120 + 100.64.8.120 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709850716 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 81502460-dcd2-11ee-877f-c1ac29d0ce14 + + + INCIDENT_LINK + 1709850716 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 81502460-dcd2-11ee-877f-c1ac29d0ce14 + + + INCIDENT_LINK + 1709850716 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 81502460-dcd2-11ee-877f-c1ac29d0ce14 + + +