Upload per-incident GraphML sharded batch 8/27
Browse filesThis view is limited to 50 files because it contains too many changes. See raw diff
- graph/incidents_graphml/4/48ef54a0-6d11-11ee-9911-f50eb88c1287.graphml +797 -0
- graph/incidents_graphml/4/48fb4580-850d-11ee-89b4-37c02fa13bd9.graphml +63 -0
- graph/incidents_graphml/4/48ff9730-631f-11ee-b6b8-b9a4d865fde2.graphml +63 -0
- graph/incidents_graphml/4/49001890-efa8-11ec-88e9-cd157aceabd3.graphml +63 -0
- graph/incidents_graphml/4/49048aa0-2270-11ee-9fd4-59af0d5e8a32.graphml +63 -0
- graph/incidents_graphml/4/490670c0-30fe-11ef-82e2-b166e7a5de57.graphml +185 -0
- graph/incidents_graphml/4/49077fb0-5909-11ee-a459-5b20d657705e.graphml +63 -0
- graph/incidents_graphml/4/49096700-2cc0-11ee-9ea2-17c9a8b72baa.graphml +489 -0
- graph/incidents_graphml/4/49098040-d383-11ee-8aee-79d3d013c637.graphml +63 -0
- graph/incidents_graphml/4/490a89e0-6fe7-11ee-bec7-efacac475e54.graphml +63 -0
- graph/incidents_graphml/4/490bfd10-676e-11ee-acda-6b17f6d60989.graphml +841 -0
- graph/incidents_graphml/4/490d46e0-850d-11ee-89b4-37c02fa13bd9.graphml +63 -0
- graph/incidents_graphml/4/490f9cc0-631f-11ee-b6b8-b9a4d865fde2.graphml +63 -0
- graph/incidents_graphml/4/4914ee10-331d-11ed-b7a7-43dc40721942.graphml +63 -0
- graph/incidents_graphml/4/49151a40-0836-11ee-b8d0-013dce35746a.graphml +63 -0
- graph/incidents_graphml/4/49171290-30fe-11ef-82e2-b166e7a5de57.graphml +221 -0
- graph/incidents_graphml/4/491932f0-5909-11ee-a459-5b20d657705e.graphml +63 -0
- graph/incidents_graphml/4/491b6370-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
- graph/incidents_graphml/4/491d0f50-be91-11ed-9416-c54055a72e53.graphml +77 -0
- graph/incidents_graphml/4/491d3150-631f-11ee-b6b8-b9a4d865fde2.graphml +63 -0
- graph/incidents_graphml/4/491fa930-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
- graph/incidents_graphml/4/49221150-d383-11ee-8aee-79d3d013c637.graphml +63 -0
- graph/incidents_graphml/4/49222900-1f34-11ee-bd83-b52c9cbf0232.graphml +113 -0
- graph/incidents_graphml/4/49236a80-f286-11ec-babd-d5ed2eda1ac6.graphml +805 -0
- graph/incidents_graphml/4/492715a0-5909-11ee-a459-5b20d657705e.graphml +63 -0
- graph/incidents_graphml/4/492c7390-631f-11ee-b6b8-b9a4d865fde2.graphml +63 -0
- graph/incidents_graphml/4/493023f0-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
- graph/incidents_graphml/4/49337f50-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
- graph/incidents_graphml/4/4934fe50-0836-11ee-b8d0-013dce35746a.graphml +63 -0
- graph/incidents_graphml/4/4935a230-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
- graph/incidents_graphml/4/493683b0-d383-11ee-8aee-79d3d013c637.graphml +63 -0
- graph/incidents_graphml/4/4938af70-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
- graph/incidents_graphml/4/493944d0-631f-11ee-b6b8-b9a4d865fde2.graphml +63 -0
- graph/incidents_graphml/4/493b60f0-5909-11ee-a459-5b20d657705e.graphml +63 -0
- graph/incidents_graphml/4/49458960-9ff2-11ee-b57e-09f55271957e.graphml +85 -0
- graph/incidents_graphml/4/4946cba0-2611-11ee-a11d-5dcee9a57544.graphml +63 -0
- graph/incidents_graphml/4/49487ee0-f83f-11ee-a565-4974183b9eb9.graphml +63 -0
- graph/incidents_graphml/4/49518c00-0ef9-11ed-ae8a-a78294a70068.graphml +63 -0
- graph/incidents_graphml/4/4952def0-f286-11ec-babd-d5ed2eda1ac6.graphml +77 -0
- graph/incidents_graphml/4/49544b20-0ef9-11ed-ae8a-a78294a70068.graphml +63 -0
- graph/incidents_graphml/4/49577f70-0ef9-11ed-ae8a-a78294a70068.graphml +63 -0
- graph/incidents_graphml/4/4958d290-f83f-11ee-a565-4974183b9eb9.graphml +63 -0
- graph/incidents_graphml/4/495f0ee0-0068-11ef-9e1d-8b16c75f4754.graphml +63 -0
- graph/incidents_graphml/4/49643eb0-2611-11ee-a11d-5dcee9a57544.graphml +63 -0
- graph/incidents_graphml/4/4965a3d0-f83f-11ee-a565-4974183b9eb9.graphml +63 -0
- graph/incidents_graphml/4/496f7b30-08cf-11ef-81ac-a7f609e446b5.graphml +63 -0
- graph/incidents_graphml/4/497470e0-f83f-11ee-a565-4974183b9eb9.graphml +63 -0
- graph/incidents_graphml/4/4977c700-0068-11ef-9e1d-8b16c75f4754.graphml +63 -0
- graph/incidents_graphml/4/497852f0-68ac-11ee-864e-0fda06c5b459.graphml +63 -0
- graph/incidents_graphml/4/497ad3f0-2611-11ee-a11d-5dcee9a57544.graphml +63 -0
graph/incidents_graphml/4/48ef54a0-6d11-11ee-9911-f50eb88c1287.graphml
ADDED
|
@@ -0,0 +1,797 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.31.182.227</data>
|
| 35 |
+
<data key="n_hostname">172.31.182.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a9ea58d0-0c87-11ee-b6c6-6b952e97c077">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.7.75</data>
|
| 43 |
+
<data key="n_hostname">100.64.7.75</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="44e337c2-0833-11ee-a597-2bdd4fe21485">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.15.235</data>
|
| 51 |
+
<data key="n_hostname">100.64.15.235</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">172.31.6.172</data>
|
| 59 |
+
<data key="n_hostname">172.31.6.172</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="d741fe43-062f-11ee-b8fe-2b837b6c5f79">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.15.236</data>
|
| 67 |
+
<data key="n_hostname">100.64.15.236</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="46b76870-6c81-11ee-b899-956327f3cbfd">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.15.237</data>
|
| 75 |
+
<data key="n_hostname">100.64.15.237</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">172.24.191.229</data>
|
| 83 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="2cbf24e1-6d11-11ee-92a5-1786393e6e33">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.15.238</data>
|
| 91 |
+
<data key="n_hostname">100.64.15.238</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.25</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">172.16.233.43</data>
|
| 99 |
+
<data key="n_hostname">172.16.233.43</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.25</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="7e6282b0-1be5-11ee-ae44-ff8a590fe858">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.15.239</data>
|
| 107 |
+
<data key="n_hostname">100.64.15.239</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.25</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">172.21.61.66</data>
|
| 115 |
+
<data key="n_hostname">172.21.61.66</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.25</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="3956bb80-42c5-11ee-9dea-8baa5ffd0671">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">100.64.15.240</data>
|
| 123 |
+
<data key="n_hostname">100.64.15.240</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.25</data>
|
| 126 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="87aa9ba0-2e5f-11ee-92fd-0b49218c7f04">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">100.64.15.241</data>
|
| 131 |
+
<data key="n_hostname">100.64.15.241</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.25</data>
|
| 134 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="4ee08ab4-42e0-11ee-a68f-ed1351d62a26">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">100.64.15.242</data>
|
| 139 |
+
<data key="n_hostname">100.64.15.242</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.25</data>
|
| 142 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">172.18.96.192</data>
|
| 147 |
+
<data key="n_hostname">172.18.96.192</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.25</data>
|
| 150 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<node id="73eb74b0-07c0-11ee-abcb-e3d6cf13af91">
|
| 153 |
+
<data key="n_type">HOST</data>
|
| 154 |
+
<data key="n_ip">100.64.15.243</data>
|
| 155 |
+
<data key="n_hostname">100.64.15.243</data>
|
| 156 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 157 |
+
<data key="n_suspicion_score">0.25</data>
|
| 158 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 159 |
+
</node>
|
| 160 |
+
<node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
|
| 161 |
+
<data key="n_type">HOST</data>
|
| 162 |
+
<data key="n_ip">172.25.222.10</data>
|
| 163 |
+
<data key="n_hostname">172.25.222.10</data>
|
| 164 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 165 |
+
<data key="n_suspicion_score">0.25</data>
|
| 166 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 167 |
+
</node>
|
| 168 |
+
<node id="1c33b122-4d56-11ee-8daf-734e5b623146">
|
| 169 |
+
<data key="n_type">HOST</data>
|
| 170 |
+
<data key="n_ip">100.64.15.244</data>
|
| 171 |
+
<data key="n_hostname">100.64.15.244</data>
|
| 172 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 173 |
+
<data key="n_suspicion_score">0.25</data>
|
| 174 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 175 |
+
</node>
|
| 176 |
+
<node id="5ea3a190-0626-11ee-ad3e-fda0da874cab">
|
| 177 |
+
<data key="n_type">HOST</data>
|
| 178 |
+
<data key="n_ip">100.64.5.83</data>
|
| 179 |
+
<data key="n_hostname">100.64.5.83</data>
|
| 180 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 181 |
+
<data key="n_suspicion_score">0.25</data>
|
| 182 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 183 |
+
</node>
|
| 184 |
+
<node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
|
| 185 |
+
<data key="n_type">HOST</data>
|
| 186 |
+
<data key="n_ip">172.22.127.96</data>
|
| 187 |
+
<data key="n_hostname">172.22.127.96</data>
|
| 188 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 189 |
+
<data key="n_suspicion_score">0.25</data>
|
| 190 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 191 |
+
</node>
|
| 192 |
+
<node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
|
| 193 |
+
<data key="n_type">HOST</data>
|
| 194 |
+
<data key="n_ip">172.30.229.11</data>
|
| 195 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 196 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 197 |
+
<data key="n_suspicion_score">0.25</data>
|
| 198 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 199 |
+
</node>
|
| 200 |
+
<node id="9110dda0-0833-11ee-9381-451180c5260b">
|
| 201 |
+
<data key="n_type">HOST</data>
|
| 202 |
+
<data key="n_ip">100.64.15.245</data>
|
| 203 |
+
<data key="n_hostname">100.64.15.245</data>
|
| 204 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 205 |
+
<data key="n_suspicion_score">0.25</data>
|
| 206 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 207 |
+
</node>
|
| 208 |
+
<edge id="e1" source="HOST-2761" target="HOST-2712">
|
| 209 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 210 |
+
<data key="e_timestamp">1697563150</data>
|
| 211 |
+
<data key="e_label_binary">malicious</data>
|
| 212 |
+
<data key="e_label_confidence">0.7</data>
|
| 213 |
+
<data key="e_suspicion_score">0.25</data>
|
| 214 |
+
<data key="e_mo_name">Data Theft</data>
|
| 215 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 216 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 217 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 218 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 219 |
+
<data key="e_disposition">Unprocessed</data>
|
| 220 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 221 |
+
</edge>
|
| 222 |
+
<edge id="e2" source="44e337c2-0833-11ee-a597-2bdd4fe21485" target="HOST-2757">
|
| 223 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 224 |
+
<data key="e_timestamp">1697563150</data>
|
| 225 |
+
<data key="e_label_binary">malicious</data>
|
| 226 |
+
<data key="e_label_confidence">0.7</data>
|
| 227 |
+
<data key="e_suspicion_score">0.25</data>
|
| 228 |
+
<data key="e_mo_name">Data Theft</data>
|
| 229 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 230 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 231 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 232 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 233 |
+
<data key="e_disposition">Unprocessed</data>
|
| 234 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 235 |
+
</edge>
|
| 236 |
+
<edge id="e3" source="HOST-2757" target="44e337c2-0833-11ee-a597-2bdd4fe21485">
|
| 237 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 238 |
+
<data key="e_timestamp">1697563150</data>
|
| 239 |
+
<data key="e_label_binary">malicious</data>
|
| 240 |
+
<data key="e_label_confidence">0.7</data>
|
| 241 |
+
<data key="e_suspicion_score">0.25</data>
|
| 242 |
+
<data key="e_mo_name">Data Theft</data>
|
| 243 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 244 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 245 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 246 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 247 |
+
<data key="e_disposition">Unprocessed</data>
|
| 248 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 249 |
+
</edge>
|
| 250 |
+
<edge id="e4" source="d741fe43-062f-11ee-b8fe-2b837b6c5f79" target="HOST-2757">
|
| 251 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 252 |
+
<data key="e_timestamp">1697563150</data>
|
| 253 |
+
<data key="e_label_binary">malicious</data>
|
| 254 |
+
<data key="e_label_confidence">0.7</data>
|
| 255 |
+
<data key="e_suspicion_score">0.25</data>
|
| 256 |
+
<data key="e_mo_name">Data Theft</data>
|
| 257 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 258 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 259 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 260 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 261 |
+
<data key="e_disposition">Unprocessed</data>
|
| 262 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 263 |
+
</edge>
|
| 264 |
+
<edge id="e5" source="HOST-2757" target="d741fe43-062f-11ee-b8fe-2b837b6c5f79">
|
| 265 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 266 |
+
<data key="e_timestamp">1697563150</data>
|
| 267 |
+
<data key="e_label_binary">malicious</data>
|
| 268 |
+
<data key="e_label_confidence">0.7</data>
|
| 269 |
+
<data key="e_suspicion_score">0.25</data>
|
| 270 |
+
<data key="e_mo_name">Data Theft</data>
|
| 271 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 272 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 273 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 274 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 275 |
+
<data key="e_disposition">Unprocessed</data>
|
| 276 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 277 |
+
</edge>
|
| 278 |
+
<edge id="e6" source="HOST-2712" target="HOST-2757">
|
| 279 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 280 |
+
<data key="e_timestamp">1697563150</data>
|
| 281 |
+
<data key="e_label_binary">malicious</data>
|
| 282 |
+
<data key="e_label_confidence">0.7</data>
|
| 283 |
+
<data key="e_suspicion_score">0.25</data>
|
| 284 |
+
<data key="e_mo_name">Data Theft</data>
|
| 285 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 286 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 287 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 288 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 289 |
+
<data key="e_disposition">Unprocessed</data>
|
| 290 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 291 |
+
</edge>
|
| 292 |
+
<edge id="e7" source="HOST-2757" target="HOST-2712">
|
| 293 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 294 |
+
<data key="e_timestamp">1697563150</data>
|
| 295 |
+
<data key="e_label_binary">malicious</data>
|
| 296 |
+
<data key="e_label_confidence">0.7</data>
|
| 297 |
+
<data key="e_suspicion_score">0.25</data>
|
| 298 |
+
<data key="e_mo_name">Data Theft</data>
|
| 299 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 300 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 301 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 302 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 303 |
+
<data key="e_disposition">Unprocessed</data>
|
| 304 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 305 |
+
</edge>
|
| 306 |
+
<edge id="e8" source="46b76870-6c81-11ee-b899-956327f3cbfd" target="HOST-2839">
|
| 307 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 308 |
+
<data key="e_timestamp">1697563150</data>
|
| 309 |
+
<data key="e_label_binary">malicious</data>
|
| 310 |
+
<data key="e_label_confidence">0.7</data>
|
| 311 |
+
<data key="e_suspicion_score">0.25</data>
|
| 312 |
+
<data key="e_mo_name">Data Theft</data>
|
| 313 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 314 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 315 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 316 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 317 |
+
<data key="e_disposition">Unprocessed</data>
|
| 318 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 319 |
+
</edge>
|
| 320 |
+
<edge id="e9" source="HOST-2839" target="46b76870-6c81-11ee-b899-956327f3cbfd">
|
| 321 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 322 |
+
<data key="e_timestamp">1697563150</data>
|
| 323 |
+
<data key="e_label_binary">malicious</data>
|
| 324 |
+
<data key="e_label_confidence">0.7</data>
|
| 325 |
+
<data key="e_suspicion_score">0.25</data>
|
| 326 |
+
<data key="e_mo_name">Data Theft</data>
|
| 327 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 328 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 329 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 330 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 331 |
+
<data key="e_disposition">Unprocessed</data>
|
| 332 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 333 |
+
</edge>
|
| 334 |
+
<edge id="e10" source="2cbf24e1-6d11-11ee-92a5-1786393e6e33" target="HOST-2839">
|
| 335 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 336 |
+
<data key="e_timestamp">1697563150</data>
|
| 337 |
+
<data key="e_label_binary">malicious</data>
|
| 338 |
+
<data key="e_label_confidence">0.7</data>
|
| 339 |
+
<data key="e_suspicion_score">0.25</data>
|
| 340 |
+
<data key="e_mo_name">Data Theft</data>
|
| 341 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 342 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 343 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 344 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 345 |
+
<data key="e_disposition">Unprocessed</data>
|
| 346 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 347 |
+
</edge>
|
| 348 |
+
<edge id="e11" source="HOST-2839" target="2cbf24e1-6d11-11ee-92a5-1786393e6e33">
|
| 349 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 350 |
+
<data key="e_timestamp">1697563150</data>
|
| 351 |
+
<data key="e_label_binary">malicious</data>
|
| 352 |
+
<data key="e_label_confidence">0.7</data>
|
| 353 |
+
<data key="e_suspicion_score">0.25</data>
|
| 354 |
+
<data key="e_mo_name">Data Theft</data>
|
| 355 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 356 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 357 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 358 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 359 |
+
<data key="e_disposition">Unprocessed</data>
|
| 360 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 361 |
+
</edge>
|
| 362 |
+
<edge id="e12" source="HOST-2712" target="HOST-2839">
|
| 363 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 364 |
+
<data key="e_timestamp">1697563150</data>
|
| 365 |
+
<data key="e_label_binary">malicious</data>
|
| 366 |
+
<data key="e_label_confidence">0.7</data>
|
| 367 |
+
<data key="e_suspicion_score">0.25</data>
|
| 368 |
+
<data key="e_mo_name">Data Theft</data>
|
| 369 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 370 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 371 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 372 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 373 |
+
<data key="e_disposition">Unprocessed</data>
|
| 374 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 375 |
+
</edge>
|
| 376 |
+
<edge id="e13" source="HOST-2839" target="HOST-2712">
|
| 377 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 378 |
+
<data key="e_timestamp">1697563150</data>
|
| 379 |
+
<data key="e_label_binary">malicious</data>
|
| 380 |
+
<data key="e_label_confidence">0.7</data>
|
| 381 |
+
<data key="e_suspicion_score">0.25</data>
|
| 382 |
+
<data key="e_mo_name">Data Theft</data>
|
| 383 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 384 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 385 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 386 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 387 |
+
<data key="e_disposition">Unprocessed</data>
|
| 388 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 389 |
+
</edge>
|
| 390 |
+
<edge id="e14" source="HOST-2712" target="HOST-2758">
|
| 391 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 392 |
+
<data key="e_timestamp">1697563150</data>
|
| 393 |
+
<data key="e_label_binary">malicious</data>
|
| 394 |
+
<data key="e_label_confidence">0.7</data>
|
| 395 |
+
<data key="e_suspicion_score">0.25</data>
|
| 396 |
+
<data key="e_mo_name">Data Theft</data>
|
| 397 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 398 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 399 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 400 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 401 |
+
<data key="e_disposition">Unprocessed</data>
|
| 402 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 403 |
+
</edge>
|
| 404 |
+
<edge id="e15" source="7e6282b0-1be5-11ee-ae44-ff8a590fe858" target="HOST-2709">
|
| 405 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 406 |
+
<data key="e_timestamp">1697563150</data>
|
| 407 |
+
<data key="e_label_binary">malicious</data>
|
| 408 |
+
<data key="e_label_confidence">0.7</data>
|
| 409 |
+
<data key="e_suspicion_score">0.25</data>
|
| 410 |
+
<data key="e_mo_name">Data Theft</data>
|
| 411 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 412 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 413 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 414 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 415 |
+
<data key="e_disposition">Unprocessed</data>
|
| 416 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 417 |
+
</edge>
|
| 418 |
+
<edge id="e16" source="HOST-2709" target="7e6282b0-1be5-11ee-ae44-ff8a590fe858">
|
| 419 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 420 |
+
<data key="e_timestamp">1697563150</data>
|
| 421 |
+
<data key="e_label_binary">malicious</data>
|
| 422 |
+
<data key="e_label_confidence">0.7</data>
|
| 423 |
+
<data key="e_suspicion_score">0.25</data>
|
| 424 |
+
<data key="e_mo_name">Data Theft</data>
|
| 425 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 426 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 427 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 428 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 429 |
+
<data key="e_disposition">Unprocessed</data>
|
| 430 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 431 |
+
</edge>
|
| 432 |
+
<edge id="e17" source="3956bb80-42c5-11ee-9dea-8baa5ffd0671" target="HOST-2709">
|
| 433 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 434 |
+
<data key="e_timestamp">1697563150</data>
|
| 435 |
+
<data key="e_label_binary">malicious</data>
|
| 436 |
+
<data key="e_label_confidence">0.7</data>
|
| 437 |
+
<data key="e_suspicion_score">0.25</data>
|
| 438 |
+
<data key="e_mo_name">Data Theft</data>
|
| 439 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 440 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 441 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 442 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 443 |
+
<data key="e_disposition">Unprocessed</data>
|
| 444 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 445 |
+
</edge>
|
| 446 |
+
<edge id="e18" source="HOST-2709" target="3956bb80-42c5-11ee-9dea-8baa5ffd0671">
|
| 447 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 448 |
+
<data key="e_timestamp">1697563150</data>
|
| 449 |
+
<data key="e_label_binary">malicious</data>
|
| 450 |
+
<data key="e_label_confidence">0.7</data>
|
| 451 |
+
<data key="e_suspicion_score">0.25</data>
|
| 452 |
+
<data key="e_mo_name">Data Theft</data>
|
| 453 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 454 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 455 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 456 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 457 |
+
<data key="e_disposition">Unprocessed</data>
|
| 458 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 459 |
+
</edge>
|
| 460 |
+
<edge id="e19" source="HOST-2712" target="HOST-2709">
|
| 461 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 462 |
+
<data key="e_timestamp">1697563150</data>
|
| 463 |
+
<data key="e_label_binary">malicious</data>
|
| 464 |
+
<data key="e_label_confidence">0.7</data>
|
| 465 |
+
<data key="e_suspicion_score">0.25</data>
|
| 466 |
+
<data key="e_mo_name">Data Theft</data>
|
| 467 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 468 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 469 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 470 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 471 |
+
<data key="e_disposition">Unprocessed</data>
|
| 472 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 473 |
+
</edge>
|
| 474 |
+
<edge id="e20" source="HOST-2709" target="HOST-2712">
|
| 475 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 476 |
+
<data key="e_timestamp">1697563150</data>
|
| 477 |
+
<data key="e_label_binary">malicious</data>
|
| 478 |
+
<data key="e_label_confidence">0.7</data>
|
| 479 |
+
<data key="e_suspicion_score">0.25</data>
|
| 480 |
+
<data key="e_mo_name">Data Theft</data>
|
| 481 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 482 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 483 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 484 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 485 |
+
<data key="e_disposition">Unprocessed</data>
|
| 486 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 487 |
+
</edge>
|
| 488 |
+
<edge id="e21" source="87aa9ba0-2e5f-11ee-92fd-0b49218c7f04" target="HOST-2709">
|
| 489 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 490 |
+
<data key="e_timestamp">1697563150</data>
|
| 491 |
+
<data key="e_label_binary">malicious</data>
|
| 492 |
+
<data key="e_label_confidence">0.7</data>
|
| 493 |
+
<data key="e_suspicion_score">0.25</data>
|
| 494 |
+
<data key="e_mo_name">Data Theft</data>
|
| 495 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 496 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 497 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 498 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 499 |
+
<data key="e_disposition">Unprocessed</data>
|
| 500 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 501 |
+
</edge>
|
| 502 |
+
<edge id="e22" source="HOST-2709" target="87aa9ba0-2e5f-11ee-92fd-0b49218c7f04">
|
| 503 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 504 |
+
<data key="e_timestamp">1697563150</data>
|
| 505 |
+
<data key="e_label_binary">malicious</data>
|
| 506 |
+
<data key="e_label_confidence">0.7</data>
|
| 507 |
+
<data key="e_suspicion_score">0.25</data>
|
| 508 |
+
<data key="e_mo_name">Data Theft</data>
|
| 509 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 510 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 511 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 512 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 513 |
+
<data key="e_disposition">Unprocessed</data>
|
| 514 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 515 |
+
</edge>
|
| 516 |
+
<edge id="e23" source="4ee08ab4-42e0-11ee-a68f-ed1351d62a26" target="HOST-2715">
|
| 517 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 518 |
+
<data key="e_timestamp">1697563150</data>
|
| 519 |
+
<data key="e_label_binary">malicious</data>
|
| 520 |
+
<data key="e_label_confidence">0.7</data>
|
| 521 |
+
<data key="e_suspicion_score">0.25</data>
|
| 522 |
+
<data key="e_mo_name">Data Theft</data>
|
| 523 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 524 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 525 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 526 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 527 |
+
<data key="e_disposition">Unprocessed</data>
|
| 528 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 529 |
+
</edge>
|
| 530 |
+
<edge id="e24" source="HOST-2715" target="4ee08ab4-42e0-11ee-a68f-ed1351d62a26">
|
| 531 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 532 |
+
<data key="e_timestamp">1697563150</data>
|
| 533 |
+
<data key="e_label_binary">malicious</data>
|
| 534 |
+
<data key="e_label_confidence">0.7</data>
|
| 535 |
+
<data key="e_suspicion_score">0.25</data>
|
| 536 |
+
<data key="e_mo_name">Data Theft</data>
|
| 537 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 538 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 539 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 540 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 541 |
+
<data key="e_disposition">Unprocessed</data>
|
| 542 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 543 |
+
</edge>
|
| 544 |
+
<edge id="e25" source="73eb74b0-07c0-11ee-abcb-e3d6cf13af91" target="HOST-2715">
|
| 545 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 546 |
+
<data key="e_timestamp">1697563150</data>
|
| 547 |
+
<data key="e_label_binary">malicious</data>
|
| 548 |
+
<data key="e_label_confidence">0.7</data>
|
| 549 |
+
<data key="e_suspicion_score">0.25</data>
|
| 550 |
+
<data key="e_mo_name">Data Theft</data>
|
| 551 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 552 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 553 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 554 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 555 |
+
<data key="e_disposition">Unprocessed</data>
|
| 556 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 557 |
+
</edge>
|
| 558 |
+
<edge id="e26" source="HOST-2715" target="73eb74b0-07c0-11ee-abcb-e3d6cf13af91">
|
| 559 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 560 |
+
<data key="e_timestamp">1697563150</data>
|
| 561 |
+
<data key="e_label_binary">malicious</data>
|
| 562 |
+
<data key="e_label_confidence">0.7</data>
|
| 563 |
+
<data key="e_suspicion_score">0.25</data>
|
| 564 |
+
<data key="e_mo_name">Data Theft</data>
|
| 565 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 566 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 567 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 568 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 569 |
+
<data key="e_disposition">Unprocessed</data>
|
| 570 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 571 |
+
</edge>
|
| 572 |
+
<edge id="e27" source="HOST-2712" target="HOST-2715">
|
| 573 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 574 |
+
<data key="e_timestamp">1697563150</data>
|
| 575 |
+
<data key="e_label_binary">malicious</data>
|
| 576 |
+
<data key="e_label_confidence">0.7</data>
|
| 577 |
+
<data key="e_suspicion_score">0.25</data>
|
| 578 |
+
<data key="e_mo_name">Data Theft</data>
|
| 579 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 580 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 581 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 582 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 583 |
+
<data key="e_disposition">Unprocessed</data>
|
| 584 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 585 |
+
</edge>
|
| 586 |
+
<edge id="e28" source="HOST-2715" target="HOST-2712">
|
| 587 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 588 |
+
<data key="e_timestamp">1697563150</data>
|
| 589 |
+
<data key="e_label_binary">malicious</data>
|
| 590 |
+
<data key="e_label_confidence">0.7</data>
|
| 591 |
+
<data key="e_suspicion_score">0.25</data>
|
| 592 |
+
<data key="e_mo_name">Data Theft</data>
|
| 593 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 594 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 595 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 596 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 597 |
+
<data key="e_disposition">Unprocessed</data>
|
| 598 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 599 |
+
</edge>
|
| 600 |
+
<edge id="e29" source="HOST-2712" target="HOST-2768">
|
| 601 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 602 |
+
<data key="e_timestamp">1697563150</data>
|
| 603 |
+
<data key="e_label_binary">malicious</data>
|
| 604 |
+
<data key="e_label_confidence">0.7</data>
|
| 605 |
+
<data key="e_suspicion_score">0.25</data>
|
| 606 |
+
<data key="e_mo_name">Data Theft</data>
|
| 607 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 608 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 609 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 610 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 611 |
+
<data key="e_disposition">Unprocessed</data>
|
| 612 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 613 |
+
</edge>
|
| 614 |
+
<edge id="e30" source="1c33b122-4d56-11ee-8daf-734e5b623146" target="HOST-2709">
|
| 615 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 616 |
+
<data key="e_timestamp">1697563150</data>
|
| 617 |
+
<data key="e_label_binary">malicious</data>
|
| 618 |
+
<data key="e_label_confidence">0.7</data>
|
| 619 |
+
<data key="e_suspicion_score">0.25</data>
|
| 620 |
+
<data key="e_mo_name">Data Theft</data>
|
| 621 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 622 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 623 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 624 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 625 |
+
<data key="e_disposition">Unprocessed</data>
|
| 626 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 627 |
+
</edge>
|
| 628 |
+
<edge id="e31" source="HOST-2709" target="1c33b122-4d56-11ee-8daf-734e5b623146">
|
| 629 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 630 |
+
<data key="e_timestamp">1697563150</data>
|
| 631 |
+
<data key="e_label_binary">malicious</data>
|
| 632 |
+
<data key="e_label_confidence">0.7</data>
|
| 633 |
+
<data key="e_suspicion_score">0.25</data>
|
| 634 |
+
<data key="e_mo_name">Data Theft</data>
|
| 635 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 636 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 637 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 638 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 639 |
+
<data key="e_disposition">Unprocessed</data>
|
| 640 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 641 |
+
</edge>
|
| 642 |
+
<edge id="e32" source="5ea3a190-0626-11ee-ad3e-fda0da874cab" target="HOST-2757">
|
| 643 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 644 |
+
<data key="e_timestamp">1697563150</data>
|
| 645 |
+
<data key="e_label_binary">malicious</data>
|
| 646 |
+
<data key="e_label_confidence">0.7</data>
|
| 647 |
+
<data key="e_suspicion_score">0.25</data>
|
| 648 |
+
<data key="e_mo_name">Data Theft</data>
|
| 649 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 650 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 651 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 652 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 653 |
+
<data key="e_disposition">Unprocessed</data>
|
| 654 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 655 |
+
</edge>
|
| 656 |
+
<edge id="e33" source="HOST-2757" target="5ea3a190-0626-11ee-ad3e-fda0da874cab">
|
| 657 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 658 |
+
<data key="e_timestamp">1697563150</data>
|
| 659 |
+
<data key="e_label_binary">malicious</data>
|
| 660 |
+
<data key="e_label_confidence">0.7</data>
|
| 661 |
+
<data key="e_suspicion_score">0.25</data>
|
| 662 |
+
<data key="e_mo_name">Data Theft</data>
|
| 663 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 664 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 665 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 666 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 667 |
+
<data key="e_disposition">Unprocessed</data>
|
| 668 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 669 |
+
</edge>
|
| 670 |
+
<edge id="e34" source="87aa9ba0-2e5f-11ee-92fd-0b49218c7f04" target="HOST-2761">
|
| 671 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 672 |
+
<data key="e_timestamp">1697563150</data>
|
| 673 |
+
<data key="e_label_binary">malicious</data>
|
| 674 |
+
<data key="e_label_confidence">0.7</data>
|
| 675 |
+
<data key="e_suspicion_score">0.25</data>
|
| 676 |
+
<data key="e_mo_name">Data Theft</data>
|
| 677 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 678 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 679 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 680 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 681 |
+
<data key="e_disposition">Unprocessed</data>
|
| 682 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 683 |
+
</edge>
|
| 684 |
+
<edge id="e35" source="HOST-2712" target="HOST-2726">
|
| 685 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 686 |
+
<data key="e_timestamp">1697563150</data>
|
| 687 |
+
<data key="e_label_binary">malicious</data>
|
| 688 |
+
<data key="e_label_confidence">0.7</data>
|
| 689 |
+
<data key="e_suspicion_score">0.25</data>
|
| 690 |
+
<data key="e_mo_name">Data Theft</data>
|
| 691 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 692 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 693 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 694 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 695 |
+
<data key="e_disposition">Unprocessed</data>
|
| 696 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 697 |
+
</edge>
|
| 698 |
+
<edge id="e36" source="HOST-2712" target="HOST-2750">
|
| 699 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 700 |
+
<data key="e_timestamp">1697563150</data>
|
| 701 |
+
<data key="e_label_binary">malicious</data>
|
| 702 |
+
<data key="e_label_confidence">0.7</data>
|
| 703 |
+
<data key="e_suspicion_score">0.25</data>
|
| 704 |
+
<data key="e_mo_name">Data Theft</data>
|
| 705 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 706 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 707 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 708 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 709 |
+
<data key="e_disposition">Unprocessed</data>
|
| 710 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 711 |
+
</edge>
|
| 712 |
+
<edge id="e37" source="9110dda0-0833-11ee-9381-451180c5260b" target="HOST-2709">
|
| 713 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 714 |
+
<data key="e_timestamp">1697563150</data>
|
| 715 |
+
<data key="e_label_binary">malicious</data>
|
| 716 |
+
<data key="e_label_confidence">0.7</data>
|
| 717 |
+
<data key="e_suspicion_score">0.25</data>
|
| 718 |
+
<data key="e_mo_name">Data Theft</data>
|
| 719 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 720 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 721 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 722 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 723 |
+
<data key="e_disposition">Unprocessed</data>
|
| 724 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 725 |
+
</edge>
|
| 726 |
+
<edge id="e38" source="HOST-2709" target="9110dda0-0833-11ee-9381-451180c5260b">
|
| 727 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 728 |
+
<data key="e_timestamp">1697563150</data>
|
| 729 |
+
<data key="e_label_binary">malicious</data>
|
| 730 |
+
<data key="e_label_confidence">0.7</data>
|
| 731 |
+
<data key="e_suspicion_score">0.25</data>
|
| 732 |
+
<data key="e_mo_name">Data Theft</data>
|
| 733 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 734 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 735 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 736 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 737 |
+
<data key="e_disposition">Unprocessed</data>
|
| 738 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 739 |
+
</edge>
|
| 740 |
+
<edge id="e39" source="9110dda0-0833-11ee-9381-451180c5260b" target="HOST-2757">
|
| 741 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 742 |
+
<data key="e_timestamp">1697563150</data>
|
| 743 |
+
<data key="e_label_binary">malicious</data>
|
| 744 |
+
<data key="e_label_confidence">0.7</data>
|
| 745 |
+
<data key="e_suspicion_score">0.25</data>
|
| 746 |
+
<data key="e_mo_name">Data Theft</data>
|
| 747 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 748 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 749 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 750 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 751 |
+
<data key="e_disposition">Unprocessed</data>
|
| 752 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 753 |
+
</edge>
|
| 754 |
+
<edge id="e40" source="HOST-2757" target="9110dda0-0833-11ee-9381-451180c5260b">
|
| 755 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 756 |
+
<data key="e_timestamp">1697563150</data>
|
| 757 |
+
<data key="e_label_binary">malicious</data>
|
| 758 |
+
<data key="e_label_confidence">0.7</data>
|
| 759 |
+
<data key="e_suspicion_score">0.25</data>
|
| 760 |
+
<data key="e_mo_name">Data Theft</data>
|
| 761 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 762 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 763 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 764 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 765 |
+
<data key="e_disposition">Unprocessed</data>
|
| 766 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 767 |
+
</edge>
|
| 768 |
+
<edge id="e41" source="9110dda0-0833-11ee-9381-451180c5260b" target="HOST-2768">
|
| 769 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 770 |
+
<data key="e_timestamp">1697563150</data>
|
| 771 |
+
<data key="e_label_binary">malicious</data>
|
| 772 |
+
<data key="e_label_confidence">0.7</data>
|
| 773 |
+
<data key="e_suspicion_score">0.25</data>
|
| 774 |
+
<data key="e_mo_name">Data Theft</data>
|
| 775 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 776 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 777 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 778 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 779 |
+
<data key="e_disposition">Unprocessed</data>
|
| 780 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 781 |
+
</edge>
|
| 782 |
+
<edge id="e42" source="9110dda0-0833-11ee-9381-451180c5260b" target="HOST-2726">
|
| 783 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 784 |
+
<data key="e_timestamp">1697563150</data>
|
| 785 |
+
<data key="e_label_binary">malicious</data>
|
| 786 |
+
<data key="e_label_confidence">0.7</data>
|
| 787 |
+
<data key="e_suspicion_score">0.25</data>
|
| 788 |
+
<data key="e_mo_name">Data Theft</data>
|
| 789 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 790 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 791 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 792 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 793 |
+
<data key="e_disposition">Unprocessed</data>
|
| 794 |
+
<data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
|
| 795 |
+
</edge>
|
| 796 |
+
</graph>
|
| 797 |
+
</graphml>
|
graph/incidents_graphml/4/48fb4580-850d-11ee-89b4-37c02fa13bd9.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.247.113</data>
|
| 35 |
+
<data key="n_hostname">172.24.247.113</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="97c97e81-0627-11ee-9882-3f47c834d49b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.9.50</data>
|
| 43 |
+
<data key="n_hostname">100.64.9.50</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2759" target="HOST-2999">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1700200260</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">48fb4580-850d-11ee-89b4-37c02fa13bd9</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/48ff9730-631f-11ee-b6b8-b9a4d865fde2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.168.48</data>
|
| 35 |
+
<data key="n_hostname">172.30.168.48</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5596dc42-0629-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.37.228</data>
|
| 43 |
+
<data key="n_hostname">100.64.37.228</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2842" target="5596dc42-0629-11ee-b19f-ed665a42340f">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1696469651</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">48ff9730-631f-11ee-b6b8-b9a4d865fde2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49001890-efa8-11ec-88e9-cd157aceabd3.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.70.227</data>
|
| 35 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="71922250-ea92-11ec-abf7-619673fe2558">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.79.61</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-1904.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-12604" target="71922250-ea92-11ec-abf7-619673fe2558">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1655626660</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">49001890-efa8-11ec-88e9-cd157aceabd3</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49048aa0-2270-11ee-9fd4-59af0d5e8a32.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="52a5cab1-16db-11ee-80e1-3d23d13d4b8a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.221.82.8</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-1967.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9a3b3aa2-212a-11ee-b17e-d1a81346a726">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.91.134</data>
|
| 43 |
+
<data key="n_hostname">100.64.91.134</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17003" target="HOST-18126">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689357615</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">49048aa0-2270-11ee-9fd4-59af0d5e8a32</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/490670c0-30fe-11ef-82e2-b166e7a5de57.graphml
ADDED
|
@@ -0,0 +1,185 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="085fab70-28f9-11ef-8a9d-45659198471d">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.46.144</data>
|
| 35 |
+
<data key="n_hostname">100.64.46.144</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="7e7fca11-28f4-11ef-a65d-2d26b03b63f9">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.22.127.96</data>
|
| 43 |
+
<data key="n_hostname">172.22.127.96</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="6d4c7b52-30fe-11ef-841f-0d3b44fd46b7">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.46.145</data>
|
| 51 |
+
<data key="n_hostname">100.64.46.145</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="001d48c5-2901-11ef-b28d-4b56691b41da">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.46.146</data>
|
| 59 |
+
<data key="n_hostname">100.64.46.146</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="75b23b31-28f8-11ef-aead-b741176e73de">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.40.230</data>
|
| 67 |
+
<data key="n_hostname">100.64.40.230</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.94375</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<edge id="e1" source="085fab70-28f9-11ef-8a9d-45659198471d" target="7e7fca11-28f4-11ef-a65d-2d26b03b63f9">
|
| 73 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 74 |
+
<data key="e_timestamp">1719105417</data>
|
| 75 |
+
<data key="e_label_binary">malicious</data>
|
| 76 |
+
<data key="e_label_confidence">0.94375</data>
|
| 77 |
+
<data key="e_suspicion_score">0.94375</data>
|
| 78 |
+
<data key="e_mo_name">Data Theft</data>
|
| 79 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 80 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 81 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 82 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 83 |
+
<data key="e_disposition">Disrupted</data>
|
| 84 |
+
<data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
|
| 85 |
+
</edge>
|
| 86 |
+
<edge id="e2" source="7e7fca11-28f4-11ef-a65d-2d26b03b63f9" target="085fab70-28f9-11ef-8a9d-45659198471d">
|
| 87 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 88 |
+
<data key="e_timestamp">1719105417</data>
|
| 89 |
+
<data key="e_label_binary">malicious</data>
|
| 90 |
+
<data key="e_label_confidence">0.94375</data>
|
| 91 |
+
<data key="e_suspicion_score">0.94375</data>
|
| 92 |
+
<data key="e_mo_name">Data Theft</data>
|
| 93 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 94 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 95 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 96 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 97 |
+
<data key="e_disposition">Disrupted</data>
|
| 98 |
+
<data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
|
| 99 |
+
</edge>
|
| 100 |
+
<edge id="e3" source="6d4c7b52-30fe-11ef-841f-0d3b44fd46b7" target="7e7fca11-28f4-11ef-a65d-2d26b03b63f9">
|
| 101 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 102 |
+
<data key="e_timestamp">1719105417</data>
|
| 103 |
+
<data key="e_label_binary">malicious</data>
|
| 104 |
+
<data key="e_label_confidence">0.94375</data>
|
| 105 |
+
<data key="e_suspicion_score">0.94375</data>
|
| 106 |
+
<data key="e_mo_name">Data Theft</data>
|
| 107 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 108 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 109 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 110 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 111 |
+
<data key="e_disposition">Disrupted</data>
|
| 112 |
+
<data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
|
| 113 |
+
</edge>
|
| 114 |
+
<edge id="e4" source="7e7fca11-28f4-11ef-a65d-2d26b03b63f9" target="6d4c7b52-30fe-11ef-841f-0d3b44fd46b7">
|
| 115 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 116 |
+
<data key="e_timestamp">1719105417</data>
|
| 117 |
+
<data key="e_label_binary">malicious</data>
|
| 118 |
+
<data key="e_label_confidence">0.94375</data>
|
| 119 |
+
<data key="e_suspicion_score">0.94375</data>
|
| 120 |
+
<data key="e_mo_name">Data Theft</data>
|
| 121 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 122 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 123 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 124 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 125 |
+
<data key="e_disposition">Disrupted</data>
|
| 126 |
+
<data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
|
| 127 |
+
</edge>
|
| 128 |
+
<edge id="e5" source="001d48c5-2901-11ef-b28d-4b56691b41da" target="7e7fca11-28f4-11ef-a65d-2d26b03b63f9">
|
| 129 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 130 |
+
<data key="e_timestamp">1719105417</data>
|
| 131 |
+
<data key="e_label_binary">malicious</data>
|
| 132 |
+
<data key="e_label_confidence">0.94375</data>
|
| 133 |
+
<data key="e_suspicion_score">0.94375</data>
|
| 134 |
+
<data key="e_mo_name">Data Theft</data>
|
| 135 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 136 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 137 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 138 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 139 |
+
<data key="e_disposition">Disrupted</data>
|
| 140 |
+
<data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
|
| 141 |
+
</edge>
|
| 142 |
+
<edge id="e6" source="7e7fca11-28f4-11ef-a65d-2d26b03b63f9" target="001d48c5-2901-11ef-b28d-4b56691b41da">
|
| 143 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 144 |
+
<data key="e_timestamp">1719105417</data>
|
| 145 |
+
<data key="e_label_binary">malicious</data>
|
| 146 |
+
<data key="e_label_confidence">0.94375</data>
|
| 147 |
+
<data key="e_suspicion_score">0.94375</data>
|
| 148 |
+
<data key="e_mo_name">Data Theft</data>
|
| 149 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 150 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 151 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 152 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 153 |
+
<data key="e_disposition">Disrupted</data>
|
| 154 |
+
<data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
|
| 155 |
+
</edge>
|
| 156 |
+
<edge id="e7" source="75b23b31-28f8-11ef-aead-b741176e73de" target="7e7fca11-28f4-11ef-a65d-2d26b03b63f9">
|
| 157 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 158 |
+
<data key="e_timestamp">1719105417</data>
|
| 159 |
+
<data key="e_label_binary">malicious</data>
|
| 160 |
+
<data key="e_label_confidence">0.94375</data>
|
| 161 |
+
<data key="e_suspicion_score">0.94375</data>
|
| 162 |
+
<data key="e_mo_name">Data Theft</data>
|
| 163 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 164 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 165 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 166 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 167 |
+
<data key="e_disposition">Disrupted</data>
|
| 168 |
+
<data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
|
| 169 |
+
</edge>
|
| 170 |
+
<edge id="e8" source="7e7fca11-28f4-11ef-a65d-2d26b03b63f9" target="75b23b31-28f8-11ef-aead-b741176e73de">
|
| 171 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 172 |
+
<data key="e_timestamp">1719105417</data>
|
| 173 |
+
<data key="e_label_binary">malicious</data>
|
| 174 |
+
<data key="e_label_confidence">0.94375</data>
|
| 175 |
+
<data key="e_suspicion_score">0.94375</data>
|
| 176 |
+
<data key="e_mo_name">Data Theft</data>
|
| 177 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 178 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 179 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 180 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 181 |
+
<data key="e_disposition">Disrupted</data>
|
| 182 |
+
<data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
|
| 183 |
+
</edge>
|
| 184 |
+
</graph>
|
| 185 |
+
</graphml>
|
graph/incidents_graphml/4/49077fb0-5909-11ee-a459-5b20d657705e.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="70e94116-0627-11ee-ad3e-fda0da874cab">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.56.243</data>
|
| 35 |
+
<data key="n_hostname">100.64.56.243</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.191.229</data>
|
| 43 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-9732" target="HOST-2839">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1695360691</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">49077fb0-5909-11ee-a459-5b20d657705e</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49096700-2cc0-11ee-9ea2-17c9a8b72baa.graphml
ADDED
|
@@ -0,0 +1,489 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b132b833-1b32-11ee-a6d3-9f15016beec0">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.42.218</data>
|
| 35 |
+
<data key="n_hostname">100.64.42.218</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.200.243</data>
|
| 43 |
+
<data key="n_hostname">172.30.200.243</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="9a3f9982-0625-11ee-8860-f951c26910c1">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.14.140</data>
|
| 51 |
+
<data key="n_hostname">100.64.14.140</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">10.117.12.163</data>
|
| 59 |
+
<data key="n_hostname">10.117.12.163</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="1d680584-14fa-11ee-9c07-0f6b4b953b28">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.42.219</data>
|
| 67 |
+
<data key="n_hostname">100.64.42.219</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">172.27.202.53</data>
|
| 75 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="12b9a220-062b-11ee-a437-2bfcb70360ca">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.20.44</data>
|
| 83 |
+
<data key="n_hostname">100.64.20.44</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="62043410-1500-11ee-9c07-0f6b4b953b28">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.42.220</data>
|
| 91 |
+
<data key="n_hostname">100.64.42.220</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="7844c532-062a-11ee-9a0c-b9f8978d847e">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.42.221</data>
|
| 99 |
+
<data key="n_hostname">100.64.42.221</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="05849802-06bf-11ee-91c7-b96dba9d7bf0">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.29.11</data>
|
| 107 |
+
<data key="n_hostname">100.64.29.11</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.841796875</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">172.30.208.219</data>
|
| 115 |
+
<data key="n_hostname">172.30.208.219</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="76d244b0-0aa4-11ee-9b9e-a7fb665fc5e8">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">100.64.42.222</data>
|
| 123 |
+
<data key="n_hostname">100.64.42.222</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 126 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">172.29.40.149</data>
|
| 131 |
+
<data key="n_hostname">172.29.40.149</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 134 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">172.31.6.172</data>
|
| 139 |
+
<data key="n_hostname">172.31.6.172</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 142 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="e4407050-2fd2-11ee-a843-5f25ac05f17c">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">100.64.11.134</data>
|
| 147 |
+
<data key="n_hostname">100.64.11.134</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 150 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<edge id="e1" source="b132b833-1b32-11ee-a6d3-9f15016beec0" target="HOST-2706">
|
| 153 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 154 |
+
<data key="e_timestamp">1690491486</data>
|
| 155 |
+
<data key="e_label_binary">malicious</data>
|
| 156 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 157 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 158 |
+
<data key="e_mo_name">Data Theft</data>
|
| 159 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 160 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 161 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 162 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 163 |
+
<data key="e_disposition">Disrupted</data>
|
| 164 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 165 |
+
</edge>
|
| 166 |
+
<edge id="e2" source="HOST-3716" target="HOST-2773">
|
| 167 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 168 |
+
<data key="e_timestamp">1690491486</data>
|
| 169 |
+
<data key="e_label_binary">malicious</data>
|
| 170 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 171 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 172 |
+
<data key="e_mo_name">Data Theft</data>
|
| 173 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 174 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 175 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 176 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 177 |
+
<data key="e_disposition">Disrupted</data>
|
| 178 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 179 |
+
</edge>
|
| 180 |
+
<edge id="e3" source="1d680584-14fa-11ee-9c07-0f6b4b953b28" target="HOST-2703">
|
| 181 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 182 |
+
<data key="e_timestamp">1690491486</data>
|
| 183 |
+
<data key="e_label_binary">malicious</data>
|
| 184 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 185 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 186 |
+
<data key="e_mo_name">Data Theft</data>
|
| 187 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 188 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 189 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 190 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 191 |
+
<data key="e_disposition">Disrupted</data>
|
| 192 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 193 |
+
</edge>
|
| 194 |
+
<edge id="e4" source="HOST-2703" target="1d680584-14fa-11ee-9c07-0f6b4b953b28">
|
| 195 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 196 |
+
<data key="e_timestamp">1690491486</data>
|
| 197 |
+
<data key="e_label_binary">malicious</data>
|
| 198 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 199 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 200 |
+
<data key="e_mo_name">Data Theft</data>
|
| 201 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 202 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 203 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 204 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 205 |
+
<data key="e_disposition">Disrupted</data>
|
| 206 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 207 |
+
</edge>
|
| 208 |
+
<edge id="e5" source="HOST-4490" target="HOST-2703">
|
| 209 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 210 |
+
<data key="e_timestamp">1690491486</data>
|
| 211 |
+
<data key="e_label_binary">malicious</data>
|
| 212 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 213 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 214 |
+
<data key="e_mo_name">Data Theft</data>
|
| 215 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 216 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 217 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 218 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 219 |
+
<data key="e_disposition">Disrupted</data>
|
| 220 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 221 |
+
</edge>
|
| 222 |
+
<edge id="e6" source="HOST-2703" target="HOST-4490">
|
| 223 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 224 |
+
<data key="e_timestamp">1690491486</data>
|
| 225 |
+
<data key="e_label_binary">malicious</data>
|
| 226 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 227 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 228 |
+
<data key="e_mo_name">Data Theft</data>
|
| 229 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 230 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 231 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 232 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 233 |
+
<data key="e_disposition">Disrupted</data>
|
| 234 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 235 |
+
</edge>
|
| 236 |
+
<edge id="e7" source="62043410-1500-11ee-9c07-0f6b4b953b28" target="HOST-2703">
|
| 237 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 238 |
+
<data key="e_timestamp">1690491486</data>
|
| 239 |
+
<data key="e_label_binary">malicious</data>
|
| 240 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 241 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 242 |
+
<data key="e_mo_name">Data Theft</data>
|
| 243 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 244 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 245 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 246 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 247 |
+
<data key="e_disposition">Disrupted</data>
|
| 248 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 249 |
+
</edge>
|
| 250 |
+
<edge id="e8" source="HOST-2703" target="62043410-1500-11ee-9c07-0f6b4b953b28">
|
| 251 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 252 |
+
<data key="e_timestamp">1690491486</data>
|
| 253 |
+
<data key="e_label_binary">malicious</data>
|
| 254 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 255 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 256 |
+
<data key="e_mo_name">Data Theft</data>
|
| 257 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 258 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 259 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 260 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 261 |
+
<data key="e_disposition">Disrupted</data>
|
| 262 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 263 |
+
</edge>
|
| 264 |
+
<edge id="e9" source="7844c532-062a-11ee-9a0c-b9f8978d847e" target="HOST-2773">
|
| 265 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 266 |
+
<data key="e_timestamp">1690491486</data>
|
| 267 |
+
<data key="e_label_binary">malicious</data>
|
| 268 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 269 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 270 |
+
<data key="e_mo_name">Data Theft</data>
|
| 271 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 272 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 273 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 274 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 275 |
+
<data key="e_disposition">Disrupted</data>
|
| 276 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 277 |
+
</edge>
|
| 278 |
+
<edge id="e10" source="HOST-2773" target="7844c532-062a-11ee-9a0c-b9f8978d847e">
|
| 279 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 280 |
+
<data key="e_timestamp">1690491486</data>
|
| 281 |
+
<data key="e_label_binary">malicious</data>
|
| 282 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 283 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 284 |
+
<data key="e_mo_name">Data Theft</data>
|
| 285 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 286 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 287 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 288 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 289 |
+
<data key="e_disposition">Disrupted</data>
|
| 290 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 291 |
+
</edge>
|
| 292 |
+
<edge id="e11" source="62043410-1500-11ee-9c07-0f6b4b953b28" target="HOST-2773">
|
| 293 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 294 |
+
<data key="e_timestamp">1690491486</data>
|
| 295 |
+
<data key="e_label_binary">malicious</data>
|
| 296 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 297 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 298 |
+
<data key="e_mo_name">Data Theft</data>
|
| 299 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 300 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 301 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 302 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 303 |
+
<data key="e_disposition">Disrupted</data>
|
| 304 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 305 |
+
</edge>
|
| 306 |
+
<edge id="e12" source="HOST-2773" target="62043410-1500-11ee-9c07-0f6b4b953b28">
|
| 307 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 308 |
+
<data key="e_timestamp">1690491486</data>
|
| 309 |
+
<data key="e_label_binary">malicious</data>
|
| 310 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 311 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 312 |
+
<data key="e_mo_name">Data Theft</data>
|
| 313 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 314 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 315 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 316 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 317 |
+
<data key="e_disposition">Disrupted</data>
|
| 318 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 319 |
+
</edge>
|
| 320 |
+
<edge id="e13" source="HOST-5747" target="HOST-2823">
|
| 321 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 322 |
+
<data key="e_timestamp">1690491486</data>
|
| 323 |
+
<data key="e_label_binary">malicious</data>
|
| 324 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 325 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 326 |
+
<data key="e_mo_name">Data Theft</data>
|
| 327 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 328 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 329 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 330 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 331 |
+
<data key="e_disposition">Disrupted</data>
|
| 332 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 333 |
+
</edge>
|
| 334 |
+
<edge id="e14" source="HOST-2823" target="HOST-5747">
|
| 335 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 336 |
+
<data key="e_timestamp">1690491486</data>
|
| 337 |
+
<data key="e_label_binary">malicious</data>
|
| 338 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 339 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 340 |
+
<data key="e_mo_name">Data Theft</data>
|
| 341 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 342 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 343 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 344 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 345 |
+
<data key="e_disposition">Disrupted</data>
|
| 346 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 347 |
+
</edge>
|
| 348 |
+
<edge id="e15" source="HOST-2706" target="76d244b0-0aa4-11ee-9b9e-a7fb665fc5e8">
|
| 349 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 350 |
+
<data key="e_timestamp">1690491486</data>
|
| 351 |
+
<data key="e_label_binary">malicious</data>
|
| 352 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 353 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 354 |
+
<data key="e_mo_name">Data Theft</data>
|
| 355 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 356 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 357 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 358 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 359 |
+
<data key="e_disposition">Disrupted</data>
|
| 360 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 361 |
+
</edge>
|
| 362 |
+
<edge id="e16" source="76d244b0-0aa4-11ee-9b9e-a7fb665fc5e8" target="HOST-2834">
|
| 363 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 364 |
+
<data key="e_timestamp">1690491486</data>
|
| 365 |
+
<data key="e_label_binary">malicious</data>
|
| 366 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 367 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 368 |
+
<data key="e_mo_name">Data Theft</data>
|
| 369 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 370 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 371 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 372 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 373 |
+
<data key="e_disposition">Disrupted</data>
|
| 374 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 375 |
+
</edge>
|
| 376 |
+
<edge id="e17" source="HOST-5747" target="HOST-2757">
|
| 377 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 378 |
+
<data key="e_timestamp">1690491486</data>
|
| 379 |
+
<data key="e_label_binary">malicious</data>
|
| 380 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 381 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 382 |
+
<data key="e_mo_name">Data Theft</data>
|
| 383 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 384 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 385 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 386 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 387 |
+
<data key="e_disposition">Disrupted</data>
|
| 388 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 389 |
+
</edge>
|
| 390 |
+
<edge id="e18" source="HOST-2834" target="HOST-5747">
|
| 391 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 392 |
+
<data key="e_timestamp">1690491486</data>
|
| 393 |
+
<data key="e_label_binary">malicious</data>
|
| 394 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 395 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 396 |
+
<data key="e_mo_name">Data Theft</data>
|
| 397 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 398 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 399 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 400 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 401 |
+
<data key="e_disposition">Disrupted</data>
|
| 402 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 403 |
+
</edge>
|
| 404 |
+
<edge id="e19" source="HOST-5747" target="HOST-2834">
|
| 405 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 406 |
+
<data key="e_timestamp">1690491486</data>
|
| 407 |
+
<data key="e_label_binary">malicious</data>
|
| 408 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 409 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 410 |
+
<data key="e_mo_name">Data Theft</data>
|
| 411 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 412 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 413 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 414 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 415 |
+
<data key="e_disposition">Disrupted</data>
|
| 416 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 417 |
+
</edge>
|
| 418 |
+
<edge id="e20" source="HOST-2757" target="HOST-5747">
|
| 419 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 420 |
+
<data key="e_timestamp">1690491486</data>
|
| 421 |
+
<data key="e_label_binary">malicious</data>
|
| 422 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 423 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 424 |
+
<data key="e_mo_name">Data Theft</data>
|
| 425 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 426 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 427 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 428 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 429 |
+
<data key="e_disposition">Disrupted</data>
|
| 430 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 431 |
+
</edge>
|
| 432 |
+
<edge id="e21" source="HOST-3716" target="HOST-2706">
|
| 433 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 434 |
+
<data key="e_timestamp">1690491486</data>
|
| 435 |
+
<data key="e_label_binary">malicious</data>
|
| 436 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 437 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 438 |
+
<data key="e_mo_name">Data Theft</data>
|
| 439 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 440 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 441 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 442 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 443 |
+
<data key="e_disposition">Disrupted</data>
|
| 444 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 445 |
+
</edge>
|
| 446 |
+
<edge id="e22" source="HOST-2706" target="HOST-3716">
|
| 447 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 448 |
+
<data key="e_timestamp">1690491486</data>
|
| 449 |
+
<data key="e_label_binary">malicious</data>
|
| 450 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 451 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 452 |
+
<data key="e_mo_name">Data Theft</data>
|
| 453 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 454 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 455 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 456 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 457 |
+
<data key="e_disposition">Disrupted</data>
|
| 458 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 459 |
+
</edge>
|
| 460 |
+
<edge id="e23" source="HOST-3458" target="HOST-2706">
|
| 461 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 462 |
+
<data key="e_timestamp">1690491486</data>
|
| 463 |
+
<data key="e_label_binary">malicious</data>
|
| 464 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 465 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 466 |
+
<data key="e_mo_name">Data Theft</data>
|
| 467 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 468 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 469 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 470 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 471 |
+
<data key="e_disposition">Disrupted</data>
|
| 472 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 473 |
+
</edge>
|
| 474 |
+
<edge id="e24" source="HOST-2706" target="HOST-3458">
|
| 475 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 476 |
+
<data key="e_timestamp">1690491486</data>
|
| 477 |
+
<data key="e_label_binary">malicious</data>
|
| 478 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 479 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 480 |
+
<data key="e_mo_name">Data Theft</data>
|
| 481 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 482 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 483 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 484 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 485 |
+
<data key="e_disposition">Disrupted</data>
|
| 486 |
+
<data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
|
| 487 |
+
</edge>
|
| 488 |
+
</graph>
|
| 489 |
+
</graphml>
|
graph/incidents_graphml/4/49098040-d383-11ee-8aee-79d3d013c637.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="19ffab32-066a-11ee-904d-db08e2329d95">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.31.240</data>
|
| 35 |
+
<data key="n_hostname">100.64.31.240</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.27.202.53</data>
|
| 43 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="19ffab32-066a-11ee-904d-db08e2329d95" target="HOST-2703">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1708827131</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">49098040-d383-11ee-8aee-79d3d013c637</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/490a89e0-6fe7-11ee-bec7-efacac475e54.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b4188043-6f77-11ee-a785-95ebf72e2801">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.63.27</data>
|
| 35 |
+
<data key="n_hostname">100.64.63.27</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.18.38.152</data>
|
| 43 |
+
<data key="n_hostname">172.18.38.152</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="b4188043-6f77-11ee-a785-95ebf72e2801" target="HOST-2844">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697874964</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">490a89e0-6fe7-11ee-bec7-efacac475e54</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/490bfd10-676e-11ee-acda-6b17f6d60989.graphml
ADDED
|
@@ -0,0 +1,841 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="9e3016c5-0fab-11ee-bf8c-81769f9f73a8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.34.178</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-1303.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.54.66</data>
|
| 43 |
+
<data key="n_hostname">172.24.54.66</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.841796875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="7ae96220-4c64-11ee-ba45-e15e5d7b4f5f">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.34.179</data>
|
| 51 |
+
<data key="n_hostname">100.64.34.179</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="e6780b70-2add-11ee-a333-fbd09b27d852">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.34.180</data>
|
| 59 |
+
<data key="n_hostname">100.64.34.180</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="ca1771b2-412a-11ee-9889-e7cce85e3916">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.34.181</data>
|
| 67 |
+
<data key="n_hostname">100.64.34.181</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">172.25.222.10</data>
|
| 75 |
+
<data key="n_hostname">172.25.222.10</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.9208984375</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="7657c3a0-5bdc-11ee-8cb7-d728671df62b">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.19.108</data>
|
| 83 |
+
<data key="n_hostname">100.64.19.108</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="48f8d990-078f-11ee-b083-01471e2c7862">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.26.89</data>
|
| 91 |
+
<data key="n_hostname">100.64.26.89</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="8e702451-0c13-11ee-b585-4dd8740efc4e">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.34.182</data>
|
| 99 |
+
<data key="n_hostname">100.64.34.182</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="0a8f09b0-0792-11ee-9293-95a29e9874f3">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.34.183</data>
|
| 107 |
+
<data key="n_hostname">100.64.34.183</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="d03dd283-0798-11ee-bec9-bd41090a2a4e">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.20.217</data>
|
| 115 |
+
<data key="n_hostname">100.64.20.217</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">172.21.61.66</data>
|
| 123 |
+
<data key="n_hostname">172.21.61.66</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 126 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="e714b0b4-062a-11ee-9792-13ac4ddb104c">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">100.64.34.184</data>
|
| 131 |
+
<data key="n_hostname">100.64.34.184</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 134 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="a1e52331-278b-11ee-83d6-a9db21a53534">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">100.64.34.185</data>
|
| 139 |
+
<data key="n_hostname">100.64.34.185</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 142 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="8aab8d40-674f-11ee-b865-d3bc8ba6b5af">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">100.64.34.186</data>
|
| 147 |
+
<data key="n_hostname">100.64.34.186</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 150 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<node id="4415e821-062f-11ee-afbe-3f6ae08a44ca">
|
| 153 |
+
<data key="n_type">HOST</data>
|
| 154 |
+
<data key="n_ip">100.64.34.187</data>
|
| 155 |
+
<data key="n_hostname">100.64.34.187</data>
|
| 156 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 157 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 158 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 159 |
+
</node>
|
| 160 |
+
<node id="e1025f32-0c9a-11ee-a19b-b5cc42a65fd7">
|
| 161 |
+
<data key="n_type">HOST</data>
|
| 162 |
+
<data key="n_ip">100.64.25.27</data>
|
| 163 |
+
<data key="n_hostname">100.64.25.27</data>
|
| 164 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 165 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 166 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 167 |
+
</node>
|
| 168 |
+
<node id="72c79372-0626-11ee-b19f-ed665a42340f">
|
| 169 |
+
<data key="n_type">HOST</data>
|
| 170 |
+
<data key="n_ip">172.23.168.229</data>
|
| 171 |
+
<data key="n_hostname">172.23.168.229</data>
|
| 172 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 173 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 174 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 175 |
+
</node>
|
| 176 |
+
<node id="dd402a64-0634-11ee-9d4e-c51fecad84f7">
|
| 177 |
+
<data key="n_type">HOST</data>
|
| 178 |
+
<data key="n_ip">100.64.34.188</data>
|
| 179 |
+
<data key="n_hostname">100.64.34.188</data>
|
| 180 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 181 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 182 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 183 |
+
</node>
|
| 184 |
+
<node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
|
| 185 |
+
<data key="n_type">HOST</data>
|
| 186 |
+
<data key="n_ip">172.29.1.127</data>
|
| 187 |
+
<data key="n_hostname">172.29.1.127</data>
|
| 188 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 189 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 190 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 191 |
+
</node>
|
| 192 |
+
<node id="e20ddca2-06c4-11ee-a727-d1c21320776d">
|
| 193 |
+
<data key="n_type">HOST</data>
|
| 194 |
+
<data key="n_ip">100.64.34.189</data>
|
| 195 |
+
<data key="n_hostname">100.64.34.189</data>
|
| 196 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 197 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 198 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 199 |
+
</node>
|
| 200 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 201 |
+
<data key="n_type">HOST</data>
|
| 202 |
+
<data key="n_ip">172.24.217.8</data>
|
| 203 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 204 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 205 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 206 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 207 |
+
</node>
|
| 208 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 209 |
+
<data key="n_type">HOST</data>
|
| 210 |
+
<data key="n_ip">172.27.202.53</data>
|
| 211 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 212 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 213 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 214 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 215 |
+
</node>
|
| 216 |
+
<node id="bfa38b32-350c-11ee-a042-bd687a574c51">
|
| 217 |
+
<data key="n_type">HOST</data>
|
| 218 |
+
<data key="n_ip">100.64.23.216</data>
|
| 219 |
+
<data key="n_hostname">100.64.23.216</data>
|
| 220 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 221 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 222 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 223 |
+
</node>
|
| 224 |
+
<edge id="e1" source="9e3016c5-0fab-11ee-bf8c-81769f9f73a8" target="HOST-2745">
|
| 225 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 226 |
+
<data key="e_timestamp">1696943386</data>
|
| 227 |
+
<data key="e_label_binary">malicious</data>
|
| 228 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 229 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 230 |
+
<data key="e_mo_name">Data Theft</data>
|
| 231 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 232 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 233 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 234 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 235 |
+
<data key="e_disposition">Disrupted</data>
|
| 236 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 237 |
+
</edge>
|
| 238 |
+
<edge id="e2" source="HOST-2745" target="9e3016c5-0fab-11ee-bf8c-81769f9f73a8">
|
| 239 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 240 |
+
<data key="e_timestamp">1696943386</data>
|
| 241 |
+
<data key="e_label_binary">malicious</data>
|
| 242 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 243 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 244 |
+
<data key="e_mo_name">Data Theft</data>
|
| 245 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 246 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 247 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 248 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 249 |
+
<data key="e_disposition">Disrupted</data>
|
| 250 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 251 |
+
</edge>
|
| 252 |
+
<edge id="e3" source="7ae96220-4c64-11ee-ba45-e15e5d7b4f5f" target="HOST-2745">
|
| 253 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 254 |
+
<data key="e_timestamp">1696943386</data>
|
| 255 |
+
<data key="e_label_binary">malicious</data>
|
| 256 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 257 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 258 |
+
<data key="e_mo_name">Data Theft</data>
|
| 259 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 260 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 261 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 262 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 263 |
+
<data key="e_disposition">Disrupted</data>
|
| 264 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 265 |
+
</edge>
|
| 266 |
+
<edge id="e4" source="HOST-2745" target="7ae96220-4c64-11ee-ba45-e15e5d7b4f5f">
|
| 267 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 268 |
+
<data key="e_timestamp">1696943386</data>
|
| 269 |
+
<data key="e_label_binary">malicious</data>
|
| 270 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 271 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 272 |
+
<data key="e_mo_name">Data Theft</data>
|
| 273 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 274 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 275 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 276 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 277 |
+
<data key="e_disposition">Disrupted</data>
|
| 278 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 279 |
+
</edge>
|
| 280 |
+
<edge id="e5" source="e6780b70-2add-11ee-a333-fbd09b27d852" target="HOST-2745">
|
| 281 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 282 |
+
<data key="e_timestamp">1696943386</data>
|
| 283 |
+
<data key="e_label_binary">malicious</data>
|
| 284 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 285 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 286 |
+
<data key="e_mo_name">Data Theft</data>
|
| 287 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 288 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 289 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 290 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 291 |
+
<data key="e_disposition">Disrupted</data>
|
| 292 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 293 |
+
</edge>
|
| 294 |
+
<edge id="e6" source="HOST-2745" target="e6780b70-2add-11ee-a333-fbd09b27d852">
|
| 295 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 296 |
+
<data key="e_timestamp">1696943386</data>
|
| 297 |
+
<data key="e_label_binary">malicious</data>
|
| 298 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 299 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 300 |
+
<data key="e_mo_name">Data Theft</data>
|
| 301 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 302 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 303 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 304 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 305 |
+
<data key="e_disposition">Disrupted</data>
|
| 306 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 307 |
+
</edge>
|
| 308 |
+
<edge id="e7" source="ca1771b2-412a-11ee-9889-e7cce85e3916" target="HOST-2768">
|
| 309 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 310 |
+
<data key="e_timestamp">1696943386</data>
|
| 311 |
+
<data key="e_label_binary">malicious</data>
|
| 312 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 313 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 314 |
+
<data key="e_mo_name">Data Theft</data>
|
| 315 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 316 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 317 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 318 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 319 |
+
<data key="e_disposition">Disrupted</data>
|
| 320 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 321 |
+
</edge>
|
| 322 |
+
<edge id="e8" source="HOST-2768" target="ca1771b2-412a-11ee-9889-e7cce85e3916">
|
| 323 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 324 |
+
<data key="e_timestamp">1696943386</data>
|
| 325 |
+
<data key="e_label_binary">malicious</data>
|
| 326 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 327 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 328 |
+
<data key="e_mo_name">Data Theft</data>
|
| 329 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 330 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 331 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 332 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 333 |
+
<data key="e_disposition">Disrupted</data>
|
| 334 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 335 |
+
</edge>
|
| 336 |
+
<edge id="e9" source="HOST-4391" target="HOST-2768">
|
| 337 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 338 |
+
<data key="e_timestamp">1696943386</data>
|
| 339 |
+
<data key="e_label_binary">malicious</data>
|
| 340 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 341 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 342 |
+
<data key="e_mo_name">Data Theft</data>
|
| 343 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 344 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 345 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 346 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 347 |
+
<data key="e_disposition">Disrupted</data>
|
| 348 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 349 |
+
</edge>
|
| 350 |
+
<edge id="e10" source="HOST-2768" target="HOST-4391">
|
| 351 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 352 |
+
<data key="e_timestamp">1696943386</data>
|
| 353 |
+
<data key="e_label_binary">malicious</data>
|
| 354 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 355 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 356 |
+
<data key="e_mo_name">Data Theft</data>
|
| 357 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 358 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 359 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 360 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 361 |
+
<data key="e_disposition">Disrupted</data>
|
| 362 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 363 |
+
</edge>
|
| 364 |
+
<edge id="e11" source="HOST-2768" target="HOST-6130">
|
| 365 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 366 |
+
<data key="e_timestamp">1696943386</data>
|
| 367 |
+
<data key="e_label_binary">malicious</data>
|
| 368 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 369 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 370 |
+
<data key="e_mo_name">Data Theft</data>
|
| 371 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 372 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 373 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 374 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 375 |
+
<data key="e_disposition">Disrupted</data>
|
| 376 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 377 |
+
</edge>
|
| 378 |
+
<edge id="e12" source="HOST-6130" target="HOST-2768">
|
| 379 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 380 |
+
<data key="e_timestamp">1696943386</data>
|
| 381 |
+
<data key="e_label_binary">malicious</data>
|
| 382 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 383 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 384 |
+
<data key="e_mo_name">Data Theft</data>
|
| 385 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 386 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 387 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 388 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 389 |
+
<data key="e_disposition">Disrupted</data>
|
| 390 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 391 |
+
</edge>
|
| 392 |
+
<edge id="e13" source="8e702451-0c13-11ee-b585-4dd8740efc4e" target="HOST-2768">
|
| 393 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 394 |
+
<data key="e_timestamp">1696943386</data>
|
| 395 |
+
<data key="e_label_binary">malicious</data>
|
| 396 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 397 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 398 |
+
<data key="e_mo_name">Data Theft</data>
|
| 399 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 400 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 401 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 402 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 403 |
+
<data key="e_disposition">Disrupted</data>
|
| 404 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 405 |
+
</edge>
|
| 406 |
+
<edge id="e14" source="HOST-2768" target="8e702451-0c13-11ee-b585-4dd8740efc4e">
|
| 407 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 408 |
+
<data key="e_timestamp">1696943386</data>
|
| 409 |
+
<data key="e_label_binary">malicious</data>
|
| 410 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 411 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 412 |
+
<data key="e_mo_name">Data Theft</data>
|
| 413 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 414 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 415 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 416 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 417 |
+
<data key="e_disposition">Disrupted</data>
|
| 418 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 419 |
+
</edge>
|
| 420 |
+
<edge id="e15" source="0a8f09b0-0792-11ee-9293-95a29e9874f3" target="HOST-2768">
|
| 421 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 422 |
+
<data key="e_timestamp">1696943386</data>
|
| 423 |
+
<data key="e_label_binary">malicious</data>
|
| 424 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 425 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 426 |
+
<data key="e_mo_name">Data Theft</data>
|
| 427 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 428 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 429 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 430 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 431 |
+
<data key="e_disposition">Disrupted</data>
|
| 432 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 433 |
+
</edge>
|
| 434 |
+
<edge id="e16" source="HOST-2768" target="0a8f09b0-0792-11ee-9293-95a29e9874f3">
|
| 435 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 436 |
+
<data key="e_timestamp">1696943386</data>
|
| 437 |
+
<data key="e_label_binary">malicious</data>
|
| 438 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 439 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 440 |
+
<data key="e_mo_name">Data Theft</data>
|
| 441 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 442 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 443 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 444 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 445 |
+
<data key="e_disposition">Disrupted</data>
|
| 446 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 447 |
+
</edge>
|
| 448 |
+
<edge id="e17" source="HOST-4578" target="HOST-2768">
|
| 449 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 450 |
+
<data key="e_timestamp">1696943386</data>
|
| 451 |
+
<data key="e_label_binary">malicious</data>
|
| 452 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 453 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 454 |
+
<data key="e_mo_name">Data Theft</data>
|
| 455 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 456 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 457 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 458 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 459 |
+
<data key="e_disposition">Disrupted</data>
|
| 460 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 461 |
+
</edge>
|
| 462 |
+
<edge id="e18" source="HOST-2768" target="HOST-4578">
|
| 463 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 464 |
+
<data key="e_timestamp">1696943386</data>
|
| 465 |
+
<data key="e_label_binary">malicious</data>
|
| 466 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 467 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 468 |
+
<data key="e_mo_name">Data Theft</data>
|
| 469 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 470 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 471 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 472 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 473 |
+
<data key="e_disposition">Disrupted</data>
|
| 474 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 475 |
+
</edge>
|
| 476 |
+
<edge id="e19" source="HOST-4578" target="HOST-2709">
|
| 477 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 478 |
+
<data key="e_timestamp">1696943386</data>
|
| 479 |
+
<data key="e_label_binary">malicious</data>
|
| 480 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 481 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 482 |
+
<data key="e_mo_name">Data Theft</data>
|
| 483 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 484 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 485 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 486 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 487 |
+
<data key="e_disposition">Disrupted</data>
|
| 488 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 489 |
+
</edge>
|
| 490 |
+
<edge id="e20" source="e714b0b4-062a-11ee-9792-13ac4ddb104c" target="HOST-2768">
|
| 491 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 492 |
+
<data key="e_timestamp">1696943386</data>
|
| 493 |
+
<data key="e_label_binary">malicious</data>
|
| 494 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 495 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 496 |
+
<data key="e_mo_name">Data Theft</data>
|
| 497 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 498 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 499 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 500 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 501 |
+
<data key="e_disposition">Disrupted</data>
|
| 502 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 503 |
+
</edge>
|
| 504 |
+
<edge id="e21" source="HOST-2768" target="e714b0b4-062a-11ee-9792-13ac4ddb104c">
|
| 505 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 506 |
+
<data key="e_timestamp">1696943386</data>
|
| 507 |
+
<data key="e_label_binary">malicious</data>
|
| 508 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 509 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 510 |
+
<data key="e_mo_name">Data Theft</data>
|
| 511 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 512 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 513 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 514 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 515 |
+
<data key="e_disposition">Disrupted</data>
|
| 516 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 517 |
+
</edge>
|
| 518 |
+
<edge id="e22" source="9e3016c5-0fab-11ee-bf8c-81769f9f73a8" target="HOST-2768">
|
| 519 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 520 |
+
<data key="e_timestamp">1696943386</data>
|
| 521 |
+
<data key="e_label_binary">malicious</data>
|
| 522 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 523 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 524 |
+
<data key="e_mo_name">Data Theft</data>
|
| 525 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 526 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 527 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 528 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 529 |
+
<data key="e_disposition">Disrupted</data>
|
| 530 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 531 |
+
</edge>
|
| 532 |
+
<edge id="e23" source="HOST-2768" target="9e3016c5-0fab-11ee-bf8c-81769f9f73a8">
|
| 533 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 534 |
+
<data key="e_timestamp">1696943386</data>
|
| 535 |
+
<data key="e_label_binary">malicious</data>
|
| 536 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 537 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 538 |
+
<data key="e_mo_name">Data Theft</data>
|
| 539 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 540 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 541 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 542 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 543 |
+
<data key="e_disposition">Disrupted</data>
|
| 544 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 545 |
+
</edge>
|
| 546 |
+
<edge id="e24" source="a1e52331-278b-11ee-83d6-a9db21a53534" target="HOST-2745">
|
| 547 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 548 |
+
<data key="e_timestamp">1696943386</data>
|
| 549 |
+
<data key="e_label_binary">malicious</data>
|
| 550 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 551 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 552 |
+
<data key="e_mo_name">Data Theft</data>
|
| 553 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 554 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 555 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 556 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 557 |
+
<data key="e_disposition">Disrupted</data>
|
| 558 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 559 |
+
</edge>
|
| 560 |
+
<edge id="e25" source="HOST-2745" target="a1e52331-278b-11ee-83d6-a9db21a53534">
|
| 561 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 562 |
+
<data key="e_timestamp">1696943386</data>
|
| 563 |
+
<data key="e_label_binary">malicious</data>
|
| 564 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 565 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 566 |
+
<data key="e_mo_name">Data Theft</data>
|
| 567 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 568 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 569 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 570 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 571 |
+
<data key="e_disposition">Disrupted</data>
|
| 572 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 573 |
+
</edge>
|
| 574 |
+
<edge id="e26" source="8aab8d40-674f-11ee-b865-d3bc8ba6b5af" target="HOST-2768">
|
| 575 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 576 |
+
<data key="e_timestamp">1696943386</data>
|
| 577 |
+
<data key="e_label_binary">malicious</data>
|
| 578 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 579 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 580 |
+
<data key="e_mo_name">Data Theft</data>
|
| 581 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 582 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 583 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 584 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 585 |
+
<data key="e_disposition">Disrupted</data>
|
| 586 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 587 |
+
</edge>
|
| 588 |
+
<edge id="e27" source="HOST-2768" target="8aab8d40-674f-11ee-b865-d3bc8ba6b5af">
|
| 589 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 590 |
+
<data key="e_timestamp">1696943386</data>
|
| 591 |
+
<data key="e_label_binary">malicious</data>
|
| 592 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 593 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 594 |
+
<data key="e_mo_name">Data Theft</data>
|
| 595 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 596 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 597 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 598 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 599 |
+
<data key="e_disposition">Disrupted</data>
|
| 600 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 601 |
+
</edge>
|
| 602 |
+
<edge id="e28" source="4415e821-062f-11ee-afbe-3f6ae08a44ca" target="HOST-2745">
|
| 603 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 604 |
+
<data key="e_timestamp">1696943386</data>
|
| 605 |
+
<data key="e_label_binary">malicious</data>
|
| 606 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 607 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 608 |
+
<data key="e_mo_name">Data Theft</data>
|
| 609 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 610 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 611 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 612 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 613 |
+
<data key="e_disposition">Disrupted</data>
|
| 614 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 615 |
+
</edge>
|
| 616 |
+
<edge id="e29" source="HOST-2745" target="4415e821-062f-11ee-afbe-3f6ae08a44ca">
|
| 617 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 618 |
+
<data key="e_timestamp">1696943386</data>
|
| 619 |
+
<data key="e_label_binary">malicious</data>
|
| 620 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 621 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 622 |
+
<data key="e_mo_name">Data Theft</data>
|
| 623 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 624 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 625 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 626 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 627 |
+
<data key="e_disposition">Disrupted</data>
|
| 628 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 629 |
+
</edge>
|
| 630 |
+
<edge id="e30" source="HOST-5165" target="HOST-2768">
|
| 631 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 632 |
+
<data key="e_timestamp">1696943386</data>
|
| 633 |
+
<data key="e_label_binary">malicious</data>
|
| 634 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 635 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 636 |
+
<data key="e_mo_name">Data Theft</data>
|
| 637 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 638 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 639 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 640 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 641 |
+
<data key="e_disposition">Disrupted</data>
|
| 642 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 643 |
+
</edge>
|
| 644 |
+
<edge id="e31" source="HOST-2768" target="HOST-5165">
|
| 645 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 646 |
+
<data key="e_timestamp">1696943386</data>
|
| 647 |
+
<data key="e_label_binary">malicious</data>
|
| 648 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 649 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 650 |
+
<data key="e_mo_name">Data Theft</data>
|
| 651 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 652 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 653 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 654 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 655 |
+
<data key="e_disposition">Disrupted</data>
|
| 656 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 657 |
+
</edge>
|
| 658 |
+
<edge id="e32" source="9e3016c5-0fab-11ee-bf8c-81769f9f73a8" target="HOST-2865">
|
| 659 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 660 |
+
<data key="e_timestamp">1696943386</data>
|
| 661 |
+
<data key="e_label_binary">malicious</data>
|
| 662 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 663 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 664 |
+
<data key="e_mo_name">Data Theft</data>
|
| 665 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 666 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 667 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 668 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 669 |
+
<data key="e_disposition">Disrupted</data>
|
| 670 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 671 |
+
</edge>
|
| 672 |
+
<edge id="e33" source="dd402a64-0634-11ee-9d4e-c51fecad84f7" target="HOST-2768">
|
| 673 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 674 |
+
<data key="e_timestamp">1696943386</data>
|
| 675 |
+
<data key="e_label_binary">malicious</data>
|
| 676 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 677 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 678 |
+
<data key="e_mo_name">Data Theft</data>
|
| 679 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 680 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 681 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 682 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 683 |
+
<data key="e_disposition">Disrupted</data>
|
| 684 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 685 |
+
</edge>
|
| 686 |
+
<edge id="e34" source="HOST-2768" target="dd402a64-0634-11ee-9d4e-c51fecad84f7">
|
| 687 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 688 |
+
<data key="e_timestamp">1696943386</data>
|
| 689 |
+
<data key="e_label_binary">malicious</data>
|
| 690 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 691 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 692 |
+
<data key="e_mo_name">Data Theft</data>
|
| 693 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 694 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 695 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 696 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 697 |
+
<data key="e_disposition">Disrupted</data>
|
| 698 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 699 |
+
</edge>
|
| 700 |
+
<edge id="e35" source="e6780b70-2add-11ee-a333-fbd09b27d852" target="HOST-2713">
|
| 701 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 702 |
+
<data key="e_timestamp">1696943386</data>
|
| 703 |
+
<data key="e_label_binary">malicious</data>
|
| 704 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 705 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 706 |
+
<data key="e_mo_name">Data Theft</data>
|
| 707 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 708 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 709 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 710 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 711 |
+
<data key="e_disposition">Disrupted</data>
|
| 712 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 713 |
+
</edge>
|
| 714 |
+
<edge id="e36" source="e20ddca2-06c4-11ee-a727-d1c21320776d" target="HOST-2768">
|
| 715 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 716 |
+
<data key="e_timestamp">1696943386</data>
|
| 717 |
+
<data key="e_label_binary">malicious</data>
|
| 718 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 719 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 720 |
+
<data key="e_mo_name">Data Theft</data>
|
| 721 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 722 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 723 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 724 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 725 |
+
<data key="e_disposition">Disrupted</data>
|
| 726 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 727 |
+
</edge>
|
| 728 |
+
<edge id="e37" source="HOST-2768" target="e20ddca2-06c4-11ee-a727-d1c21320776d">
|
| 729 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 730 |
+
<data key="e_timestamp">1696943386</data>
|
| 731 |
+
<data key="e_label_binary">malicious</data>
|
| 732 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 733 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 734 |
+
<data key="e_mo_name">Data Theft</data>
|
| 735 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 736 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 737 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 738 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 739 |
+
<data key="e_disposition">Disrupted</data>
|
| 740 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 741 |
+
</edge>
|
| 742 |
+
<edge id="e38" source="a1e52331-278b-11ee-83d6-a9db21a53534" target="HOST-2731">
|
| 743 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 744 |
+
<data key="e_timestamp">1696943386</data>
|
| 745 |
+
<data key="e_label_binary">malicious</data>
|
| 746 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 747 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 748 |
+
<data key="e_mo_name">Data Theft</data>
|
| 749 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 750 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 751 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 752 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 753 |
+
<data key="e_disposition">Disrupted</data>
|
| 754 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 755 |
+
</edge>
|
| 756 |
+
<edge id="e39" source="HOST-2703" target="HOST-4987">
|
| 757 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 758 |
+
<data key="e_timestamp">1696943386</data>
|
| 759 |
+
<data key="e_label_binary">malicious</data>
|
| 760 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 761 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 762 |
+
<data key="e_mo_name">Data Theft</data>
|
| 763 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 764 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 765 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 766 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 767 |
+
<data key="e_disposition">Disrupted</data>
|
| 768 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 769 |
+
</edge>
|
| 770 |
+
<edge id="e40" source="HOST-2745" target="HOST-4987">
|
| 771 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 772 |
+
<data key="e_timestamp">1696943386</data>
|
| 773 |
+
<data key="e_label_binary">malicious</data>
|
| 774 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 775 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 776 |
+
<data key="e_mo_name">Data Theft</data>
|
| 777 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 778 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 779 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 780 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 781 |
+
<data key="e_disposition">Disrupted</data>
|
| 782 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 783 |
+
</edge>
|
| 784 |
+
<edge id="e41" source="HOST-4987" target="HOST-2745">
|
| 785 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 786 |
+
<data key="e_timestamp">1696943386</data>
|
| 787 |
+
<data key="e_label_binary">malicious</data>
|
| 788 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 789 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 790 |
+
<data key="e_mo_name">Data Theft</data>
|
| 791 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 792 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 793 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 794 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 795 |
+
<data key="e_disposition">Disrupted</data>
|
| 796 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 797 |
+
</edge>
|
| 798 |
+
<edge id="e42" source="9e3016c5-0fab-11ee-bf8c-81769f9f73a8" target="HOST-2709">
|
| 799 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 800 |
+
<data key="e_timestamp">1696943386</data>
|
| 801 |
+
<data key="e_label_binary">malicious</data>
|
| 802 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 803 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 804 |
+
<data key="e_mo_name">Data Theft</data>
|
| 805 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 806 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 807 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 808 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 809 |
+
<data key="e_disposition">Disrupted</data>
|
| 810 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 811 |
+
</edge>
|
| 812 |
+
<edge id="e43" source="9e3016c5-0fab-11ee-bf8c-81769f9f73a8" target="HOST-2713">
|
| 813 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 814 |
+
<data key="e_timestamp">1696943386</data>
|
| 815 |
+
<data key="e_label_binary">malicious</data>
|
| 816 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 817 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 818 |
+
<data key="e_mo_name">Data Theft</data>
|
| 819 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 820 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 821 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 822 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 823 |
+
<data key="e_disposition">Disrupted</data>
|
| 824 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 825 |
+
</edge>
|
| 826 |
+
<edge id="e44" source="0a8f09b0-0792-11ee-9293-95a29e9874f3" target="HOST-2703">
|
| 827 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 828 |
+
<data key="e_timestamp">1696943386</data>
|
| 829 |
+
<data key="e_label_binary">malicious</data>
|
| 830 |
+
<data key="e_label_confidence">0.9208984375</data>
|
| 831 |
+
<data key="e_suspicion_score">0.9208984375</data>
|
| 832 |
+
<data key="e_mo_name">Data Theft</data>
|
| 833 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 834 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 835 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 836 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 837 |
+
<data key="e_disposition">Disrupted</data>
|
| 838 |
+
<data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
|
| 839 |
+
</edge>
|
| 840 |
+
</graph>
|
| 841 |
+
</graphml>
|
graph/incidents_graphml/4/490d46e0-850d-11ee-89b4-37c02fa13bd9.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.29.40.149</data>
|
| 35 |
+
<data key="n_hostname">172.29.40.149</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="6086a723-84d2-11ee-800f-b537e9e44803">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.9.52</data>
|
| 43 |
+
<data key="n_hostname">100.64.9.52</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2834" target="6086a723-84d2-11ee-800f-b537e9e44803">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1700200260</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">490d46e0-850d-11ee-89b4-37c02fa13bd9</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/490f9cc0-631f-11ee-b6b8-b9a4d865fde2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5596dc42-0629-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.37.228</data>
|
| 35 |
+
<data key="n_hostname">100.64.37.228</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.168.48</data>
|
| 43 |
+
<data key="n_hostname">172.30.168.48</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-7339" target="HOST-2842">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1696469651</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">490f9cc0-631f-11ee-b6b8-b9a4d865fde2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/4914ee10-331d-11ed-b7a7-43dc40721942.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2e3de200-0d47-11ed-9630-f9bf7dfe9f05">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">192.168.147.151</data>
|
| 35 |
+
<data key="n_hostname">192.168.147.151</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.9296875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella","Windows Active Directory"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="0d798eb4-1bee-11ed-9108-69d970162826">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">HOST-14470</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-1751.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.9296875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Umbrella","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="2e3de200-0d47-11ed-9630-f9bf7dfe9f05" target="0d798eb4-1bee-11ed-9108-69d970162826">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1663043639</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.9296875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.9296875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">4914ee10-331d-11ed-b7a7-43dc40721942</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49151a40-0836-11ee-b8d0-013dce35746a.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2be74f06-0625-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.19.46</data>
|
| 35 |
+
<data key="n_hostname">100.64.19.46</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.16.233.43</data>
|
| 43 |
+
<data key="n_hostname">172.16.233.43</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-4360" target="HOST-2758">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1686473974</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">49151a40-0836-11ee-b8d0-013dce35746a</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49171290-30fe-11ef-82e2-b166e7a5de57.graphml
ADDED
|
@@ -0,0 +1,221 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="cf67b0c7-2901-11ef-8b71-dd8359e7840d">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.46.150</data>
|
| 35 |
+
<data key="n_hostname">100.64.46.150</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="59c1d061-28f4-11ef-aead-b741176e73de">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.191.229</data>
|
| 43 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="2fac0a76-28f4-11ef-a65d-2d26b03b63f9">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.21.179</data>
|
| 51 |
+
<data key="n_hostname">100.64.21.179</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="6577bbb3-28fc-11ef-a816-c17e11a63509">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.46.151</data>
|
| 59 |
+
<data key="n_hostname">100.64.46.151</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="776971e4-2f6b-11ef-88d3-bb4a48f2113c">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.46.152</data>
|
| 67 |
+
<data key="n_hostname">100.64.46.152</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="6947acd2-2e49-11ef-856f-adbfcc562a8b">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.21.25</data>
|
| 75 |
+
<data key="n_hostname">100.64.21.25</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<edge id="e1" source="cf67b0c7-2901-11ef-8b71-dd8359e7840d" target="HOST-4705">
|
| 81 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 82 |
+
<data key="e_timestamp">1719105417</data>
|
| 83 |
+
<data key="e_label_binary">malicious</data>
|
| 84 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 85 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 86 |
+
<data key="e_mo_name">Data Theft</data>
|
| 87 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 88 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 89 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 90 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 91 |
+
<data key="e_disposition">Disrupted</data>
|
| 92 |
+
<data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
|
| 93 |
+
</edge>
|
| 94 |
+
<edge id="e2" source="HOST-4705" target="cf67b0c7-2901-11ef-8b71-dd8359e7840d">
|
| 95 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 96 |
+
<data key="e_timestamp">1719105417</data>
|
| 97 |
+
<data key="e_label_binary">malicious</data>
|
| 98 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 99 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 100 |
+
<data key="e_mo_name">Data Theft</data>
|
| 101 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 102 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 103 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 104 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 105 |
+
<data key="e_disposition">Disrupted</data>
|
| 106 |
+
<data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
|
| 107 |
+
</edge>
|
| 108 |
+
<edge id="e3" source="HOST-4705" target="2fac0a76-28f4-11ef-a65d-2d26b03b63f9">
|
| 109 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 110 |
+
<data key="e_timestamp">1719105417</data>
|
| 111 |
+
<data key="e_label_binary">malicious</data>
|
| 112 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 113 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 114 |
+
<data key="e_mo_name">Data Theft</data>
|
| 115 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 116 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 117 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 118 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 119 |
+
<data key="e_disposition">Disrupted</data>
|
| 120 |
+
<data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
|
| 121 |
+
</edge>
|
| 122 |
+
<edge id="e4" source="2fac0a76-28f4-11ef-a65d-2d26b03b63f9" target="HOST-4705">
|
| 123 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 124 |
+
<data key="e_timestamp">1719105417</data>
|
| 125 |
+
<data key="e_label_binary">malicious</data>
|
| 126 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 127 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 128 |
+
<data key="e_mo_name">Data Theft</data>
|
| 129 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 130 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 131 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 132 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 133 |
+
<data key="e_disposition">Disrupted</data>
|
| 134 |
+
<data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
|
| 135 |
+
</edge>
|
| 136 |
+
<edge id="e5" source="6577bbb3-28fc-11ef-a816-c17e11a63509" target="HOST-4705">
|
| 137 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 138 |
+
<data key="e_timestamp">1719105417</data>
|
| 139 |
+
<data key="e_label_binary">malicious</data>
|
| 140 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 141 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 142 |
+
<data key="e_mo_name">Data Theft</data>
|
| 143 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 144 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 145 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 146 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 147 |
+
<data key="e_disposition">Disrupted</data>
|
| 148 |
+
<data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
|
| 149 |
+
</edge>
|
| 150 |
+
<edge id="e6" source="HOST-4705" target="6577bbb3-28fc-11ef-a816-c17e11a63509">
|
| 151 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 152 |
+
<data key="e_timestamp">1719105417</data>
|
| 153 |
+
<data key="e_label_binary">malicious</data>
|
| 154 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 155 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 156 |
+
<data key="e_mo_name">Data Theft</data>
|
| 157 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 158 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 159 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 160 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 161 |
+
<data key="e_disposition">Disrupted</data>
|
| 162 |
+
<data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
|
| 163 |
+
</edge>
|
| 164 |
+
<edge id="e7" source="776971e4-2f6b-11ef-88d3-bb4a48f2113c" target="HOST-4705">
|
| 165 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 166 |
+
<data key="e_timestamp">1719105417</data>
|
| 167 |
+
<data key="e_label_binary">malicious</data>
|
| 168 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 169 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 170 |
+
<data key="e_mo_name">Data Theft</data>
|
| 171 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 172 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 173 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 174 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 175 |
+
<data key="e_disposition">Disrupted</data>
|
| 176 |
+
<data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
|
| 177 |
+
</edge>
|
| 178 |
+
<edge id="e8" source="HOST-4705" target="776971e4-2f6b-11ef-88d3-bb4a48f2113c">
|
| 179 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 180 |
+
<data key="e_timestamp">1719105417</data>
|
| 181 |
+
<data key="e_label_binary">malicious</data>
|
| 182 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 183 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 184 |
+
<data key="e_mo_name">Data Theft</data>
|
| 185 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 186 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 187 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 188 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 189 |
+
<data key="e_disposition">Disrupted</data>
|
| 190 |
+
<data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
|
| 191 |
+
</edge>
|
| 192 |
+
<edge id="e9" source="6947acd2-2e49-11ef-856f-adbfcc562a8b" target="HOST-4705">
|
| 193 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 194 |
+
<data key="e_timestamp">1719105417</data>
|
| 195 |
+
<data key="e_label_binary">malicious</data>
|
| 196 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 197 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 198 |
+
<data key="e_mo_name">Data Theft</data>
|
| 199 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 200 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 201 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 202 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 203 |
+
<data key="e_disposition">Disrupted</data>
|
| 204 |
+
<data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
|
| 205 |
+
</edge>
|
| 206 |
+
<edge id="e10" source="HOST-4705" target="6947acd2-2e49-11ef-856f-adbfcc562a8b">
|
| 207 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 208 |
+
<data key="e_timestamp">1719105417</data>
|
| 209 |
+
<data key="e_label_binary">malicious</data>
|
| 210 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 211 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 212 |
+
<data key="e_mo_name">Data Theft</data>
|
| 213 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 214 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 215 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 216 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 217 |
+
<data key="e_disposition">Disrupted</data>
|
| 218 |
+
<data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
|
| 219 |
+
</edge>
|
| 220 |
+
</graph>
|
| 221 |
+
</graphml>
|
graph/incidents_graphml/4/491932f0-5909-11ee-a459-5b20d657705e.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.191.229</data>
|
| 35 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="70e94116-0627-11ee-ad3e-fda0da874cab">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.56.243</data>
|
| 43 |
+
<data key="n_hostname">100.64.56.243</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2839" target="HOST-9732">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1695360691</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">491932f0-5909-11ee-a459-5b20d657705e</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/491b6370-dba2-11ed-8f69-23b0b50da3c2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="a1c44121-9d88-11ed-9ba1-69c845a45d44">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.75.139</data>
|
| 35 |
+
<data key="n_hostname">100.64.75.139</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.70.227</data>
|
| 43 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="a1c44121-9d88-11ed-9ba1-69c845a45d44" target="HOST-12749">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1681572557</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">491b6370-dba2-11ed-8f69-23b0b50da3c2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/491d0f50-be91-11ed-9416-c54055a72e53.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ec6c26d0-9d87-11ed-9ba1-69c845a45d44">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.75.177</data>
|
| 35 |
+
<data key="n_hostname">100.64.75.177</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="64604862-b9ee-11ed-8ab1-01931714985f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.79.186</data>
|
| 43 |
+
<data key="n_hostname">100.64.79.186</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-13830" target="64604862-b9ee-11ed-8ab1-01931714985f">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1678376672</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">491d0f50-be91-11ed-9416-c54055a72e53</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="64604862-b9ee-11ed-8ab1-01931714985f" target="HOST-13830">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1678376672</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 67 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">491d0f50-be91-11ed-9416-c54055a72e53</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/4/491d3150-631f-11ee-b6b8-b9a4d865fde2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="336e6311-6306-11ee-a0f6-3ff0cce90972">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.40.242</data>
|
| 35 |
+
<data key="n_hostname">100.64.40.242</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.217.8</data>
|
| 43 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="336e6311-6306-11ee-a0f6-3ff0cce90972" target="HOST-2731">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1696469651</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">491d3150-631f-11ee-b6b8-b9a4d865fde2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/491fa930-dba2-11ed-8f69-23b0b50da3c2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.70.227</data>
|
| 35 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a1c44121-9d88-11ed-9ba1-69c845a45d44">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.75.139</data>
|
| 43 |
+
<data key="n_hostname">100.64.75.139</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-12749" target="HOST-13987">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1681572557</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">491fa930-dba2-11ed-8f69-23b0b50da3c2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49221150-d383-11ee-8aee-79d3d013c637.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.27.202.53</data>
|
| 35 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="19ffab32-066a-11ee-904d-db08e2329d95">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.31.240</data>
|
| 43 |
+
<data key="n_hostname">100.64.31.240</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2703" target="HOST-6139">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1708827131</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">49221150-d383-11ee-8aee-79d3d013c637</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49222900-1f34-11ee-bd83-b52c9cbf0232.graphml
ADDED
|
@@ -0,0 +1,113 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="82db80b1-0639-11ee-9d16-b90ac473a2f2">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.34.131</data>
|
| 35 |
+
<data key="n_hostname">100.64.34.131</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="cdd3fa90-063c-11ee-bf36-a5053098164b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.234</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.234</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="f5a73b53-09f1-11ee-a800-190966dcb66f">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.68.136</data>
|
| 51 |
+
<data key="n_hostname">100.64.68.136</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="82db80b1-0639-11ee-9d16-b90ac473a2f2" target="HOST-12921">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1689001992</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.7</data>
|
| 61 |
+
<data key="e_suspicion_score">0.25</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Unprocessed</data>
|
| 68 |
+
<data key="e_incident_id">49222900-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="HOST-12921" target="82db80b1-0639-11ee-9d16-b90ac473a2f2">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1689001992</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.7</data>
|
| 75 |
+
<data key="e_suspicion_score">0.25</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Unprocessed</data>
|
| 82 |
+
<data key="e_incident_id">49222900-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 83 |
+
</edge>
|
| 84 |
+
<edge id="e3" source="f5a73b53-09f1-11ee-a800-190966dcb66f" target="HOST-12921">
|
| 85 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 86 |
+
<data key="e_timestamp">1689001992</data>
|
| 87 |
+
<data key="e_label_binary">malicious</data>
|
| 88 |
+
<data key="e_label_confidence">0.7</data>
|
| 89 |
+
<data key="e_suspicion_score">0.25</data>
|
| 90 |
+
<data key="e_mo_name">Data Theft</data>
|
| 91 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 92 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 93 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 94 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 95 |
+
<data key="e_disposition">Unprocessed</data>
|
| 96 |
+
<data key="e_incident_id">49222900-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 97 |
+
</edge>
|
| 98 |
+
<edge id="e4" source="HOST-12921" target="f5a73b53-09f1-11ee-a800-190966dcb66f">
|
| 99 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 100 |
+
<data key="e_timestamp">1689001992</data>
|
| 101 |
+
<data key="e_label_binary">malicious</data>
|
| 102 |
+
<data key="e_label_confidence">0.7</data>
|
| 103 |
+
<data key="e_suspicion_score">0.25</data>
|
| 104 |
+
<data key="e_mo_name">Data Theft</data>
|
| 105 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 106 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 107 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 108 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 109 |
+
<data key="e_disposition">Unprocessed</data>
|
| 110 |
+
<data key="e_incident_id">49222900-1f34-11ee-bd83-b52c9cbf0232</data>
|
| 111 |
+
</edge>
|
| 112 |
+
</graph>
|
| 113 |
+
</graphml>
|
graph/incidents_graphml/4/49236a80-f286-11ec-babd-d5ed2eda1ac6.graphml
ADDED
|
@@ -0,0 +1,805 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="e951f4f0-ea92-11ec-abf7-619673fe2558">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.79.153</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-1853.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.70.227</data>
|
| 43 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="dedebea0-ea91-11ec-abf7-619673fe2558">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.71.202</data>
|
| 51 |
+
<data key="n_hostname">USER-0015-1870.example.internal</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="f11addb0-ea91-11ec-90c7-eff83c975df3">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.74.55</data>
|
| 59 |
+
<data key="n_hostname">USER-0015-1871.example.internal</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="d35d04c5-ec20-11ec-8458-0365874c31b8">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.81.81</data>
|
| 67 |
+
<data key="n_hostname">100.64.81.81</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="7b77b410-ea92-11ec-90c7-eff83c975df3">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.81.82</data>
|
| 75 |
+
<data key="n_hostname">USER-0015-1872.example.internal</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="067fdb10-ea92-11ec-90c7-eff83c975df3">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.77.247</data>
|
| 83 |
+
<data key="n_hostname">USER-0015-1873.example.internal</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="55b4cd80-ea92-11ec-abf7-619673fe2558">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.80.152</data>
|
| 91 |
+
<data key="n_hostname">USER-0015-1874.example.internal</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.25</data>
|
| 94 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="723b4f10-ea9c-11ec-b0c9-e7fa908a3ccf">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.81.83</data>
|
| 99 |
+
<data key="n_hostname">USER-0015-1875.example.internal</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.25</data>
|
| 102 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="fab5d1e0-ea91-11ec-abf7-619673fe2558">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.75.39</data>
|
| 107 |
+
<data key="n_hostname">USER-0015-1706.example.internal</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.25</data>
|
| 110 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="eea7a8e0-ea93-11ec-abf7-619673fe2558">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.71.193</data>
|
| 115 |
+
<data key="n_hostname">USER-0015-1876.example.internal</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.25</data>
|
| 118 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="03862310-ea92-11ec-90c7-eff83c975df3">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">100.64.81.84</data>
|
| 123 |
+
<data key="n_hostname">USER-0015-1877.example.internal</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.25</data>
|
| 126 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="2c39c0f0-ea92-11ec-90c7-eff83c975df3">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">100.64.72.182</data>
|
| 131 |
+
<data key="n_hostname">USER-0015-1639.example.internal</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.25</data>
|
| 134 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="182bdd30-ea94-11ec-90c7-eff83c975df3">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">100.64.71.165</data>
|
| 139 |
+
<data key="n_hostname">USER-0015-1878.example.internal</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.25</data>
|
| 142 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="06094b80-ea92-11ec-abf7-619673fe2558">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">100.64.73.120</data>
|
| 147 |
+
<data key="n_hostname">USER-0015-1661.example.internal</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.25</data>
|
| 150 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<node id="34096b00-ea92-11ec-90c7-eff83c975df3">
|
| 153 |
+
<data key="n_type">HOST</data>
|
| 154 |
+
<data key="n_ip">100.64.73.155</data>
|
| 155 |
+
<data key="n_hostname">USER-0015-1879.example.internal</data>
|
| 156 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 157 |
+
<data key="n_suspicion_score">0.25</data>
|
| 158 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 159 |
+
</node>
|
| 160 |
+
<node id="6e6154c0-ea92-11ec-abf7-619673fe2558">
|
| 161 |
+
<data key="n_type">HOST</data>
|
| 162 |
+
<data key="n_ip">100.64.72.241</data>
|
| 163 |
+
<data key="n_hostname">USER-0015-1880.example.internal</data>
|
| 164 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 165 |
+
<data key="n_suspicion_score">0.25</data>
|
| 166 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 167 |
+
</node>
|
| 168 |
+
<node id="e0429460-ea91-11ec-abf7-619673fe2558">
|
| 169 |
+
<data key="n_type">HOST</data>
|
| 170 |
+
<data key="n_ip">100.64.75.19</data>
|
| 171 |
+
<data key="n_hostname">USER-0015-1881.example.internal</data>
|
| 172 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 173 |
+
<data key="n_suspicion_score">0.25</data>
|
| 174 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 175 |
+
</node>
|
| 176 |
+
<node id="0e2c6560-ea95-11ec-90c7-eff83c975df3">
|
| 177 |
+
<data key="n_type">HOST</data>
|
| 178 |
+
<data key="n_ip">100.64.79.72</data>
|
| 179 |
+
<data key="n_hostname">USER-0015-1882.example.internal</data>
|
| 180 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 181 |
+
<data key="n_suspicion_score">0.25</data>
|
| 182 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 183 |
+
</node>
|
| 184 |
+
<node id="1bfd1b60-ea92-11ec-90c7-eff83c975df3">
|
| 185 |
+
<data key="n_type">HOST</data>
|
| 186 |
+
<data key="n_ip">100.64.73.136</data>
|
| 187 |
+
<data key="n_hostname">USER-0015-1708.example.internal</data>
|
| 188 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 189 |
+
<data key="n_suspicion_score">0.25</data>
|
| 190 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 191 |
+
</node>
|
| 192 |
+
<node id="0daf9ba0-ea92-11ec-abf7-619673fe2558">
|
| 193 |
+
<data key="n_type">HOST</data>
|
| 194 |
+
<data key="n_ip">100.64.73.166</data>
|
| 195 |
+
<data key="n_hostname">USER-0015-1883.example.internal</data>
|
| 196 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 197 |
+
<data key="n_suspicion_score">0.25</data>
|
| 198 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 199 |
+
</node>
|
| 200 |
+
<node id="e9783710-ea91-11ec-90c7-eff83c975df3">
|
| 201 |
+
<data key="n_type">HOST</data>
|
| 202 |
+
<data key="n_ip">100.64.77.171</data>
|
| 203 |
+
<data key="n_hostname">USER-0015-1884.example.internal</data>
|
| 204 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 205 |
+
<data key="n_suspicion_score">0.25</data>
|
| 206 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 207 |
+
</node>
|
| 208 |
+
<node id="e36ed8a0-ea92-11ec-abf7-619673fe2558">
|
| 209 |
+
<data key="n_type">HOST</data>
|
| 210 |
+
<data key="n_ip">100.64.80.222</data>
|
| 211 |
+
<data key="n_hostname">USER-0015-1885.example.internal</data>
|
| 212 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 213 |
+
<data key="n_suspicion_score">0.25</data>
|
| 214 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 215 |
+
</node>
|
| 216 |
+
<node id="1c0be870-ea92-11ec-90c7-eff83c975df3">
|
| 217 |
+
<data key="n_type">HOST</data>
|
| 218 |
+
<data key="n_ip">100.64.72.47</data>
|
| 219 |
+
<data key="n_hostname">USER-0015-1886.example.internal</data>
|
| 220 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 221 |
+
<data key="n_suspicion_score">0.25</data>
|
| 222 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 223 |
+
</node>
|
| 224 |
+
<node id="2fdb66d0-ea94-11ec-90c7-eff83c975df3">
|
| 225 |
+
<data key="n_type">HOST</data>
|
| 226 |
+
<data key="n_ip">100.64.75.151</data>
|
| 227 |
+
<data key="n_hostname">USER-0015-1887.example.internal</data>
|
| 228 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 229 |
+
<data key="n_suspicion_score">0.25</data>
|
| 230 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 231 |
+
</node>
|
| 232 |
+
<node id="60a10461-ea93-11ec-90c7-eff83c975df3">
|
| 233 |
+
<data key="n_type">HOST</data>
|
| 234 |
+
<data key="n_ip">100.64.77.248</data>
|
| 235 |
+
<data key="n_hostname">USER-0015-1888.example.internal</data>
|
| 236 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 237 |
+
<data key="n_suspicion_score">0.25</data>
|
| 238 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 239 |
+
</node>
|
| 240 |
+
<node id="f867c330-ea91-11ec-90c7-eff83c975df3">
|
| 241 |
+
<data key="n_type">HOST</data>
|
| 242 |
+
<data key="n_ip">100.64.75.47</data>
|
| 243 |
+
<data key="n_hostname">USER-0015-1889.example.internal</data>
|
| 244 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 245 |
+
<data key="n_suspicion_score">0.25</data>
|
| 246 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 247 |
+
</node>
|
| 248 |
+
<node id="448e6430-ea92-11ec-90c7-eff83c975df3">
|
| 249 |
+
<data key="n_type">HOST</data>
|
| 250 |
+
<data key="n_ip">100.64.81.85</data>
|
| 251 |
+
<data key="n_hostname">USER-0015-1890.example.internal</data>
|
| 252 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 253 |
+
<data key="n_suspicion_score">0.25</data>
|
| 254 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 255 |
+
</node>
|
| 256 |
+
<node id="3d038b50-ea92-11ec-90c7-eff83c975df3">
|
| 257 |
+
<data key="n_type">HOST</data>
|
| 258 |
+
<data key="n_ip">100.64.73.181</data>
|
| 259 |
+
<data key="n_hostname">USER-0015-1891.example.internal</data>
|
| 260 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 261 |
+
<data key="n_suspicion_score">0.25</data>
|
| 262 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 263 |
+
</node>
|
| 264 |
+
<node id="886a10a0-ea92-11ec-abf7-619673fe2558">
|
| 265 |
+
<data key="n_type">HOST</data>
|
| 266 |
+
<data key="n_ip">100.64.81.86</data>
|
| 267 |
+
<data key="n_hostname">USER-0015-1892.example.internal</data>
|
| 268 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 269 |
+
<data key="n_suspicion_score">0.25</data>
|
| 270 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 271 |
+
</node>
|
| 272 |
+
<edge id="e1" source="HOST-15813" target="HOST-12604">
|
| 273 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 274 |
+
<data key="e_timestamp">1655941910</data>
|
| 275 |
+
<data key="e_label_binary">malicious</data>
|
| 276 |
+
<data key="e_label_confidence">0.7</data>
|
| 277 |
+
<data key="e_suspicion_score">0.25</data>
|
| 278 |
+
<data key="e_mo_name">Data Theft</data>
|
| 279 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 280 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 281 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 282 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 283 |
+
<data key="e_disposition">Unprocessed</data>
|
| 284 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 285 |
+
</edge>
|
| 286 |
+
<edge id="e2" source="HOST-12604" target="HOST-15813">
|
| 287 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 288 |
+
<data key="e_timestamp">1655941910</data>
|
| 289 |
+
<data key="e_label_binary">malicious</data>
|
| 290 |
+
<data key="e_label_confidence">0.7</data>
|
| 291 |
+
<data key="e_suspicion_score">0.25</data>
|
| 292 |
+
<data key="e_mo_name">Data Theft</data>
|
| 293 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 294 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 295 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 296 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 297 |
+
<data key="e_disposition">Unprocessed</data>
|
| 298 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 299 |
+
</edge>
|
| 300 |
+
<edge id="e3" source="dedebea0-ea91-11ec-abf7-619673fe2558" target="HOST-12604">
|
| 301 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 302 |
+
<data key="e_timestamp">1655941910</data>
|
| 303 |
+
<data key="e_label_binary">malicious</data>
|
| 304 |
+
<data key="e_label_confidence">0.7</data>
|
| 305 |
+
<data key="e_suspicion_score">0.25</data>
|
| 306 |
+
<data key="e_mo_name">Data Theft</data>
|
| 307 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 308 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 309 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 310 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 311 |
+
<data key="e_disposition">Unprocessed</data>
|
| 312 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 313 |
+
</edge>
|
| 314 |
+
<edge id="e4" source="HOST-12604" target="dedebea0-ea91-11ec-abf7-619673fe2558">
|
| 315 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 316 |
+
<data key="e_timestamp">1655941910</data>
|
| 317 |
+
<data key="e_label_binary">malicious</data>
|
| 318 |
+
<data key="e_label_confidence">0.7</data>
|
| 319 |
+
<data key="e_suspicion_score">0.25</data>
|
| 320 |
+
<data key="e_mo_name">Data Theft</data>
|
| 321 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 322 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 323 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 324 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 325 |
+
<data key="e_disposition">Unprocessed</data>
|
| 326 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 327 |
+
</edge>
|
| 328 |
+
<edge id="e5" source="HOST-12604" target="f11addb0-ea91-11ec-90c7-eff83c975df3">
|
| 329 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 330 |
+
<data key="e_timestamp">1655941910</data>
|
| 331 |
+
<data key="e_label_binary">malicious</data>
|
| 332 |
+
<data key="e_label_confidence">0.7</data>
|
| 333 |
+
<data key="e_suspicion_score">0.25</data>
|
| 334 |
+
<data key="e_mo_name">Data Theft</data>
|
| 335 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 336 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 337 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 338 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 339 |
+
<data key="e_disposition">Unprocessed</data>
|
| 340 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 341 |
+
</edge>
|
| 342 |
+
<edge id="e6" source="d35d04c5-ec20-11ec-8458-0365874c31b8" target="HOST-12604">
|
| 343 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 344 |
+
<data key="e_timestamp">1655941910</data>
|
| 345 |
+
<data key="e_label_binary">malicious</data>
|
| 346 |
+
<data key="e_label_confidence">0.7</data>
|
| 347 |
+
<data key="e_suspicion_score">0.25</data>
|
| 348 |
+
<data key="e_mo_name">Data Theft</data>
|
| 349 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 350 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 351 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 352 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 353 |
+
<data key="e_disposition">Unprocessed</data>
|
| 354 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 355 |
+
</edge>
|
| 356 |
+
<edge id="e7" source="HOST-12604" target="d35d04c5-ec20-11ec-8458-0365874c31b8">
|
| 357 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 358 |
+
<data key="e_timestamp">1655941910</data>
|
| 359 |
+
<data key="e_label_binary">malicious</data>
|
| 360 |
+
<data key="e_label_confidence">0.7</data>
|
| 361 |
+
<data key="e_suspicion_score">0.25</data>
|
| 362 |
+
<data key="e_mo_name">Data Theft</data>
|
| 363 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 364 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 365 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 366 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 367 |
+
<data key="e_disposition">Unprocessed</data>
|
| 368 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 369 |
+
</edge>
|
| 370 |
+
<edge id="e8" source="7b77b410-ea92-11ec-90c7-eff83c975df3" target="HOST-12604">
|
| 371 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 372 |
+
<data key="e_timestamp">1655941910</data>
|
| 373 |
+
<data key="e_label_binary">malicious</data>
|
| 374 |
+
<data key="e_label_confidence">0.7</data>
|
| 375 |
+
<data key="e_suspicion_score">0.25</data>
|
| 376 |
+
<data key="e_mo_name">Data Theft</data>
|
| 377 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 378 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 379 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 380 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 381 |
+
<data key="e_disposition">Unprocessed</data>
|
| 382 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 383 |
+
</edge>
|
| 384 |
+
<edge id="e9" source="067fdb10-ea92-11ec-90c7-eff83c975df3" target="HOST-12604">
|
| 385 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 386 |
+
<data key="e_timestamp">1655941910</data>
|
| 387 |
+
<data key="e_label_binary">malicious</data>
|
| 388 |
+
<data key="e_label_confidence">0.7</data>
|
| 389 |
+
<data key="e_suspicion_score">0.25</data>
|
| 390 |
+
<data key="e_mo_name">Data Theft</data>
|
| 391 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 392 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 393 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 394 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 395 |
+
<data key="e_disposition">Unprocessed</data>
|
| 396 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 397 |
+
</edge>
|
| 398 |
+
<edge id="e10" source="HOST-12604" target="067fdb10-ea92-11ec-90c7-eff83c975df3">
|
| 399 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 400 |
+
<data key="e_timestamp">1655941910</data>
|
| 401 |
+
<data key="e_label_binary">malicious</data>
|
| 402 |
+
<data key="e_label_confidence">0.7</data>
|
| 403 |
+
<data key="e_suspicion_score">0.25</data>
|
| 404 |
+
<data key="e_mo_name">Data Theft</data>
|
| 405 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 406 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 407 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 408 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 409 |
+
<data key="e_disposition">Unprocessed</data>
|
| 410 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 411 |
+
</edge>
|
| 412 |
+
<edge id="e11" source="55b4cd80-ea92-11ec-abf7-619673fe2558" target="HOST-12604">
|
| 413 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 414 |
+
<data key="e_timestamp">1655941910</data>
|
| 415 |
+
<data key="e_label_binary">malicious</data>
|
| 416 |
+
<data key="e_label_confidence">0.7</data>
|
| 417 |
+
<data key="e_suspicion_score">0.25</data>
|
| 418 |
+
<data key="e_mo_name">Data Theft</data>
|
| 419 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 420 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 421 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 422 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 423 |
+
<data key="e_disposition">Unprocessed</data>
|
| 424 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 425 |
+
</edge>
|
| 426 |
+
<edge id="e12" source="HOST-12604" target="55b4cd80-ea92-11ec-abf7-619673fe2558">
|
| 427 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 428 |
+
<data key="e_timestamp">1655941910</data>
|
| 429 |
+
<data key="e_label_binary">malicious</data>
|
| 430 |
+
<data key="e_label_confidence">0.7</data>
|
| 431 |
+
<data key="e_suspicion_score">0.25</data>
|
| 432 |
+
<data key="e_mo_name">Data Theft</data>
|
| 433 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 434 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 435 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 436 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 437 |
+
<data key="e_disposition">Unprocessed</data>
|
| 438 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 439 |
+
</edge>
|
| 440 |
+
<edge id="e13" source="HOST-12604" target="723b4f10-ea9c-11ec-b0c9-e7fa908a3ccf">
|
| 441 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 442 |
+
<data key="e_timestamp">1655941910</data>
|
| 443 |
+
<data key="e_label_binary">malicious</data>
|
| 444 |
+
<data key="e_label_confidence">0.7</data>
|
| 445 |
+
<data key="e_suspicion_score">0.25</data>
|
| 446 |
+
<data key="e_mo_name">Data Theft</data>
|
| 447 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 448 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 449 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 450 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 451 |
+
<data key="e_disposition">Unprocessed</data>
|
| 452 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 453 |
+
</edge>
|
| 454 |
+
<edge id="e14" source="HOST-12604" target="HOST-13701">
|
| 455 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 456 |
+
<data key="e_timestamp">1655941910</data>
|
| 457 |
+
<data key="e_label_binary">malicious</data>
|
| 458 |
+
<data key="e_label_confidence">0.7</data>
|
| 459 |
+
<data key="e_suspicion_score">0.25</data>
|
| 460 |
+
<data key="e_mo_name">Data Theft</data>
|
| 461 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 462 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 463 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 464 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 465 |
+
<data key="e_disposition">Unprocessed</data>
|
| 466 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 467 |
+
</edge>
|
| 468 |
+
<edge id="e15" source="eea7a8e0-ea93-11ec-abf7-619673fe2558" target="HOST-12604">
|
| 469 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 470 |
+
<data key="e_timestamp">1655941910</data>
|
| 471 |
+
<data key="e_label_binary">malicious</data>
|
| 472 |
+
<data key="e_label_confidence">0.7</data>
|
| 473 |
+
<data key="e_suspicion_score">0.25</data>
|
| 474 |
+
<data key="e_mo_name">Data Theft</data>
|
| 475 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 476 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 477 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 478 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 479 |
+
<data key="e_disposition">Unprocessed</data>
|
| 480 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 481 |
+
</edge>
|
| 482 |
+
<edge id="e16" source="HOST-12604" target="eea7a8e0-ea93-11ec-abf7-619673fe2558">
|
| 483 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 484 |
+
<data key="e_timestamp">1655941910</data>
|
| 485 |
+
<data key="e_label_binary">malicious</data>
|
| 486 |
+
<data key="e_label_confidence">0.7</data>
|
| 487 |
+
<data key="e_suspicion_score">0.25</data>
|
| 488 |
+
<data key="e_mo_name">Data Theft</data>
|
| 489 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 490 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 491 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 492 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 493 |
+
<data key="e_disposition">Unprocessed</data>
|
| 494 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 495 |
+
</edge>
|
| 496 |
+
<edge id="e17" source="HOST-12604" target="03862310-ea92-11ec-90c7-eff83c975df3">
|
| 497 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 498 |
+
<data key="e_timestamp">1655941910</data>
|
| 499 |
+
<data key="e_label_binary">malicious</data>
|
| 500 |
+
<data key="e_label_confidence">0.7</data>
|
| 501 |
+
<data key="e_suspicion_score">0.25</data>
|
| 502 |
+
<data key="e_mo_name">Data Theft</data>
|
| 503 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 504 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 505 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 506 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 507 |
+
<data key="e_disposition">Unprocessed</data>
|
| 508 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 509 |
+
</edge>
|
| 510 |
+
<edge id="e18" source="HOST-12604" target="HOST-13054">
|
| 511 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 512 |
+
<data key="e_timestamp">1655941910</data>
|
| 513 |
+
<data key="e_label_binary">malicious</data>
|
| 514 |
+
<data key="e_label_confidence">0.7</data>
|
| 515 |
+
<data key="e_suspicion_score">0.25</data>
|
| 516 |
+
<data key="e_mo_name">Data Theft</data>
|
| 517 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 518 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 519 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 520 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 521 |
+
<data key="e_disposition">Unprocessed</data>
|
| 522 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 523 |
+
</edge>
|
| 524 |
+
<edge id="e19" source="182bdd30-ea94-11ec-90c7-eff83c975df3" target="HOST-12604">
|
| 525 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 526 |
+
<data key="e_timestamp">1655941910</data>
|
| 527 |
+
<data key="e_label_binary">malicious</data>
|
| 528 |
+
<data key="e_label_confidence">0.7</data>
|
| 529 |
+
<data key="e_suspicion_score">0.25</data>
|
| 530 |
+
<data key="e_mo_name">Data Theft</data>
|
| 531 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 532 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 533 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 534 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 535 |
+
<data key="e_disposition">Unprocessed</data>
|
| 536 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 537 |
+
</edge>
|
| 538 |
+
<edge id="e20" source="HOST-12604" target="182bdd30-ea94-11ec-90c7-eff83c975df3">
|
| 539 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 540 |
+
<data key="e_timestamp">1655941910</data>
|
| 541 |
+
<data key="e_label_binary">malicious</data>
|
| 542 |
+
<data key="e_label_confidence">0.7</data>
|
| 543 |
+
<data key="e_suspicion_score">0.25</data>
|
| 544 |
+
<data key="e_mo_name">Data Theft</data>
|
| 545 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 546 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 547 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 548 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 549 |
+
<data key="e_disposition">Unprocessed</data>
|
| 550 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 551 |
+
</edge>
|
| 552 |
+
<edge id="e21" source="HOST-12604" target="HOST-13322">
|
| 553 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 554 |
+
<data key="e_timestamp">1655941910</data>
|
| 555 |
+
<data key="e_label_binary">malicious</data>
|
| 556 |
+
<data key="e_label_confidence">0.7</data>
|
| 557 |
+
<data key="e_suspicion_score">0.25</data>
|
| 558 |
+
<data key="e_mo_name">Data Theft</data>
|
| 559 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 560 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 561 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 562 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 563 |
+
<data key="e_disposition">Unprocessed</data>
|
| 564 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 565 |
+
</edge>
|
| 566 |
+
<edge id="e22" source="HOST-12604" target="34096b00-ea92-11ec-90c7-eff83c975df3">
|
| 567 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 568 |
+
<data key="e_timestamp">1655941910</data>
|
| 569 |
+
<data key="e_label_binary">malicious</data>
|
| 570 |
+
<data key="e_label_confidence">0.7</data>
|
| 571 |
+
<data key="e_suspicion_score">0.25</data>
|
| 572 |
+
<data key="e_mo_name">Data Theft</data>
|
| 573 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 574 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 575 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 576 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 577 |
+
<data key="e_disposition">Unprocessed</data>
|
| 578 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 579 |
+
</edge>
|
| 580 |
+
<edge id="e23" source="HOST-12604" target="6e6154c0-ea92-11ec-abf7-619673fe2558">
|
| 581 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 582 |
+
<data key="e_timestamp">1655941910</data>
|
| 583 |
+
<data key="e_label_binary">malicious</data>
|
| 584 |
+
<data key="e_label_confidence">0.7</data>
|
| 585 |
+
<data key="e_suspicion_score">0.25</data>
|
| 586 |
+
<data key="e_mo_name">Data Theft</data>
|
| 587 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 588 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 589 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 590 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 591 |
+
<data key="e_disposition">Unprocessed</data>
|
| 592 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 593 |
+
</edge>
|
| 594 |
+
<edge id="e24" source="HOST-12604" target="e0429460-ea91-11ec-abf7-619673fe2558">
|
| 595 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 596 |
+
<data key="e_timestamp">1655941910</data>
|
| 597 |
+
<data key="e_label_binary">malicious</data>
|
| 598 |
+
<data key="e_label_confidence">0.7</data>
|
| 599 |
+
<data key="e_suspicion_score">0.25</data>
|
| 600 |
+
<data key="e_mo_name">Data Theft</data>
|
| 601 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 602 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 603 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 604 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 605 |
+
<data key="e_disposition">Unprocessed</data>
|
| 606 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 607 |
+
</edge>
|
| 608 |
+
<edge id="e25" source="0e2c6560-ea95-11ec-90c7-eff83c975df3" target="HOST-12604">
|
| 609 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 610 |
+
<data key="e_timestamp">1655941910</data>
|
| 611 |
+
<data key="e_label_binary">malicious</data>
|
| 612 |
+
<data key="e_label_confidence">0.7</data>
|
| 613 |
+
<data key="e_suspicion_score">0.25</data>
|
| 614 |
+
<data key="e_mo_name">Data Theft</data>
|
| 615 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 616 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 617 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 618 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 619 |
+
<data key="e_disposition">Unprocessed</data>
|
| 620 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 621 |
+
</edge>
|
| 622 |
+
<edge id="e26" source="HOST-12604" target="0e2c6560-ea95-11ec-90c7-eff83c975df3">
|
| 623 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 624 |
+
<data key="e_timestamp">1655941910</data>
|
| 625 |
+
<data key="e_label_binary">malicious</data>
|
| 626 |
+
<data key="e_label_confidence">0.7</data>
|
| 627 |
+
<data key="e_suspicion_score">0.25</data>
|
| 628 |
+
<data key="e_mo_name">Data Theft</data>
|
| 629 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 630 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 631 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 632 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 633 |
+
<data key="e_disposition">Unprocessed</data>
|
| 634 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 635 |
+
</edge>
|
| 636 |
+
<edge id="e27" source="HOST-12604" target="HOST-13705">
|
| 637 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 638 |
+
<data key="e_timestamp">1655941910</data>
|
| 639 |
+
<data key="e_label_binary">malicious</data>
|
| 640 |
+
<data key="e_label_confidence">0.7</data>
|
| 641 |
+
<data key="e_suspicion_score">0.25</data>
|
| 642 |
+
<data key="e_mo_name">Data Theft</data>
|
| 643 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 644 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 645 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 646 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 647 |
+
<data key="e_disposition">Unprocessed</data>
|
| 648 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 649 |
+
</edge>
|
| 650 |
+
<edge id="e28" source="HOST-12604" target="0daf9ba0-ea92-11ec-abf7-619673fe2558">
|
| 651 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 652 |
+
<data key="e_timestamp">1655941910</data>
|
| 653 |
+
<data key="e_label_binary">malicious</data>
|
| 654 |
+
<data key="e_label_confidence">0.7</data>
|
| 655 |
+
<data key="e_suspicion_score">0.25</data>
|
| 656 |
+
<data key="e_mo_name">Data Theft</data>
|
| 657 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 658 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 659 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 660 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 661 |
+
<data key="e_disposition">Unprocessed</data>
|
| 662 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 663 |
+
</edge>
|
| 664 |
+
<edge id="e29" source="HOST-12604" target="e9783710-ea91-11ec-90c7-eff83c975df3">
|
| 665 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 666 |
+
<data key="e_timestamp">1655941910</data>
|
| 667 |
+
<data key="e_label_binary">malicious</data>
|
| 668 |
+
<data key="e_label_confidence">0.7</data>
|
| 669 |
+
<data key="e_suspicion_score">0.25</data>
|
| 670 |
+
<data key="e_mo_name">Data Theft</data>
|
| 671 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 672 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 673 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 674 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 675 |
+
<data key="e_disposition">Unprocessed</data>
|
| 676 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 677 |
+
</edge>
|
| 678 |
+
<edge id="e30" source="HOST-12604" target="e36ed8a0-ea92-11ec-abf7-619673fe2558">
|
| 679 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 680 |
+
<data key="e_timestamp">1655941910</data>
|
| 681 |
+
<data key="e_label_binary">malicious</data>
|
| 682 |
+
<data key="e_label_confidence">0.7</data>
|
| 683 |
+
<data key="e_suspicion_score">0.25</data>
|
| 684 |
+
<data key="e_mo_name">Data Theft</data>
|
| 685 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 686 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 687 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 688 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 689 |
+
<data key="e_disposition">Unprocessed</data>
|
| 690 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 691 |
+
</edge>
|
| 692 |
+
<edge id="e31" source="1c0be870-ea92-11ec-90c7-eff83c975df3" target="HOST-12604">
|
| 693 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 694 |
+
<data key="e_timestamp">1655941910</data>
|
| 695 |
+
<data key="e_label_binary">malicious</data>
|
| 696 |
+
<data key="e_label_confidence">0.7</data>
|
| 697 |
+
<data key="e_suspicion_score">0.25</data>
|
| 698 |
+
<data key="e_mo_name">Data Theft</data>
|
| 699 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 700 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 701 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 702 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 703 |
+
<data key="e_disposition">Unprocessed</data>
|
| 704 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 705 |
+
</edge>
|
| 706 |
+
<edge id="e32" source="HOST-12604" target="2fdb66d0-ea94-11ec-90c7-eff83c975df3">
|
| 707 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 708 |
+
<data key="e_timestamp">1655941910</data>
|
| 709 |
+
<data key="e_label_binary">malicious</data>
|
| 710 |
+
<data key="e_label_confidence">0.7</data>
|
| 711 |
+
<data key="e_suspicion_score">0.25</data>
|
| 712 |
+
<data key="e_mo_name">Data Theft</data>
|
| 713 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 714 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 715 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 716 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 717 |
+
<data key="e_disposition">Unprocessed</data>
|
| 718 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 719 |
+
</edge>
|
| 720 |
+
<edge id="e33" source="60a10461-ea93-11ec-90c7-eff83c975df3" target="HOST-12604">
|
| 721 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 722 |
+
<data key="e_timestamp">1655941910</data>
|
| 723 |
+
<data key="e_label_binary">malicious</data>
|
| 724 |
+
<data key="e_label_confidence">0.7</data>
|
| 725 |
+
<data key="e_suspicion_score">0.25</data>
|
| 726 |
+
<data key="e_mo_name">Data Theft</data>
|
| 727 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 728 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 729 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 730 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 731 |
+
<data key="e_disposition">Unprocessed</data>
|
| 732 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 733 |
+
</edge>
|
| 734 |
+
<edge id="e34" source="HOST-12604" target="f867c330-ea91-11ec-90c7-eff83c975df3">
|
| 735 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 736 |
+
<data key="e_timestamp">1655941910</data>
|
| 737 |
+
<data key="e_label_binary">malicious</data>
|
| 738 |
+
<data key="e_label_confidence">0.7</data>
|
| 739 |
+
<data key="e_suspicion_score">0.25</data>
|
| 740 |
+
<data key="e_mo_name">Data Theft</data>
|
| 741 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 742 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 743 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 744 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 745 |
+
<data key="e_disposition">Unprocessed</data>
|
| 746 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 747 |
+
</edge>
|
| 748 |
+
<edge id="e35" source="HOST-12604" target="448e6430-ea92-11ec-90c7-eff83c975df3">
|
| 749 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 750 |
+
<data key="e_timestamp">1655941910</data>
|
| 751 |
+
<data key="e_label_binary">malicious</data>
|
| 752 |
+
<data key="e_label_confidence">0.7</data>
|
| 753 |
+
<data key="e_suspicion_score">0.25</data>
|
| 754 |
+
<data key="e_mo_name">Data Theft</data>
|
| 755 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 756 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 757 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 758 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 759 |
+
<data key="e_disposition">Unprocessed</data>
|
| 760 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 761 |
+
</edge>
|
| 762 |
+
<edge id="e36" source="3d038b50-ea92-11ec-90c7-eff83c975df3" target="HOST-12604">
|
| 763 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 764 |
+
<data key="e_timestamp">1655941910</data>
|
| 765 |
+
<data key="e_label_binary">malicious</data>
|
| 766 |
+
<data key="e_label_confidence">0.7</data>
|
| 767 |
+
<data key="e_suspicion_score">0.25</data>
|
| 768 |
+
<data key="e_mo_name">Data Theft</data>
|
| 769 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 770 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 771 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 772 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 773 |
+
<data key="e_disposition">Unprocessed</data>
|
| 774 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 775 |
+
</edge>
|
| 776 |
+
<edge id="e37" source="HOST-12604" target="3d038b50-ea92-11ec-90c7-eff83c975df3">
|
| 777 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 778 |
+
<data key="e_timestamp">1655941910</data>
|
| 779 |
+
<data key="e_label_binary">malicious</data>
|
| 780 |
+
<data key="e_label_confidence">0.7</data>
|
| 781 |
+
<data key="e_suspicion_score">0.25</data>
|
| 782 |
+
<data key="e_mo_name">Data Theft</data>
|
| 783 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 784 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 785 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 786 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 787 |
+
<data key="e_disposition">Unprocessed</data>
|
| 788 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 789 |
+
</edge>
|
| 790 |
+
<edge id="e38" source="HOST-12604" target="886a10a0-ea92-11ec-abf7-619673fe2558">
|
| 791 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 792 |
+
<data key="e_timestamp">1655941910</data>
|
| 793 |
+
<data key="e_label_binary">malicious</data>
|
| 794 |
+
<data key="e_label_confidence">0.7</data>
|
| 795 |
+
<data key="e_suspicion_score">0.25</data>
|
| 796 |
+
<data key="e_mo_name">Data Theft</data>
|
| 797 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 798 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 799 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 800 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 801 |
+
<data key="e_disposition">Unprocessed</data>
|
| 802 |
+
<data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 803 |
+
</edge>
|
| 804 |
+
</graph>
|
| 805 |
+
</graphml>
|
graph/incidents_graphml/4/492715a0-5909-11ee-a459-5b20d657705e.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="9017bcb1-0627-11ee-b404-ff2ea490fc35">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.61.10</data>
|
| 35 |
+
<data key="n_hostname">100.64.61.10</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.31.182.227</data>
|
| 43 |
+
<data key="n_hostname">172.31.182.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="9017bcb1-0627-11ee-b404-ff2ea490fc35" target="HOST-2761">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1695360691</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">492715a0-5909-11ee-a459-5b20d657705e</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/492c7390-631f-11ee-b6b8-b9a4d865fde2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.217.8</data>
|
| 35 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="336e6311-6306-11ee-a0f6-3ff0cce90972">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.40.242</data>
|
| 43 |
+
<data key="n_hostname">100.64.40.242</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2731" target="HOST-7340">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1696469651</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">492c7390-631f-11ee-b6b8-b9a4d865fde2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/493023f0-dba2-11ed-8f69-23b0b50da3c2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="3ca40520-9d9a-11ed-9840-cf13fb390d2c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.76.10</data>
|
| 35 |
+
<data key="n_hostname">100.64.76.10</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.70.227</data>
|
| 43 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="3ca40520-9d9a-11ed-9840-cf13fb390d2c" target="HOST-12749">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1681572557</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">493023f0-dba2-11ed-8f69-23b0b50da3c2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49337f50-dba2-11ed-8f69-23b0b50da3c2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.70.227</data>
|
| 35 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.89453125</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="3ca40520-9d9a-11ed-9840-cf13fb390d2c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.76.10</data>
|
| 43 |
+
<data key="n_hostname">100.64.76.10</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-12749" target="HOST-13988">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1681572557</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.89453125</data>
|
| 53 |
+
<data key="e_suspicion_score">0.89453125</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">49337f50-dba2-11ed-8f69-23b0b50da3c2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/4934fe50-0836-11ee-b8d0-013dce35746a.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.16.233.43</data>
|
| 35 |
+
<data key="n_hostname">172.16.233.43</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2be74f06-0625-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.19.46</data>
|
| 43 |
+
<data key="n_hostname">100.64.19.46</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2758" target="HOST-4360">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1686473974</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">4934fe50-0836-11ee-b8d0-013dce35746a</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/4935a230-dba2-11ed-8f69-23b0b50da3c2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="9062cdd2-9d8c-11ed-9ba1-69c845a45d44">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.76.11</data>
|
| 35 |
+
<data key="n_hostname">100.64.76.11</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.70.227</data>
|
| 43 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="9062cdd2-9d8c-11ed-9ba1-69c845a45d44" target="HOST-12749">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1681572557</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">4935a230-dba2-11ed-8f69-23b0b50da3c2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/493683b0-d383-11ee-8aee-79d3d013c637.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="e995fc21-cf53-11ee-91bf-c50629b24e9f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.31.242</data>
|
| 35 |
+
<data key="n_hostname">100.64.31.242</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.200.243</data>
|
| 43 |
+
<data key="n_hostname">172.30.200.243</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="e995fc21-cf53-11ee-91bf-c50629b24e9f" target="HOST-2706">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1708827131</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">493683b0-d383-11ee-8aee-79d3d013c637</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/4938af70-dba2-11ed-8f69-23b0b50da3c2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.70.227</data>
|
| 35 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.89453125</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9062cdd2-9d8c-11ed-9ba1-69c845a45d44">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.76.11</data>
|
| 43 |
+
<data key="n_hostname">100.64.76.11</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-12749" target="HOST-13989">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1681572557</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.89453125</data>
|
| 53 |
+
<data key="e_suspicion_score">0.89453125</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">4938af70-dba2-11ed-8f69-23b0b50da3c2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/493944d0-631f-11ee-b6b8-b9a4d865fde2.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b8c78f60-063a-11ee-9f2c-63aa0a31eb0a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.40.243</data>
|
| 35 |
+
<data key="n_hostname">100.64.40.243</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.217.8</data>
|
| 43 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="b8c78f60-063a-11ee-9f2c-63aa0a31eb0a" target="HOST-2731">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1696469651</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">493944d0-631f-11ee-b6b8-b9a4d865fde2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/493b60f0-5909-11ee-a459-5b20d657705e.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.31.182.227</data>
|
| 35 |
+
<data key="n_hostname">172.31.182.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9017bcb1-0627-11ee-b404-ff2ea490fc35">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.61.10</data>
|
| 43 |
+
<data key="n_hostname">100.64.61.10</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2761" target="HOST-10341">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1695360691</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">493b60f0-5909-11ee-a459-5b20d657705e</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49458960-9ff2-11ee-b57e-09f55271957e.graphml
ADDED
|
@@ -0,0 +1,85 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="f29f66f2-062a-11ee-ad81-3d49a1dfb70d">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.7.252</data>
|
| 35 |
+
<data key="n_hostname">100.64.7.252</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.27.202.53</data>
|
| 43 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">172.31.6.172</data>
|
| 51 |
+
<data key="n_hostname">172.31.6.172</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="HOST-2827" target="HOST-2703">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1703157345</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.7</data>
|
| 61 |
+
<data key="e_suspicion_score">0.25</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Unprocessed</data>
|
| 68 |
+
<data key="e_incident_id">49458960-9ff2-11ee-b57e-09f55271957e</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="HOST-2827" target="HOST-2757">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1703157345</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.7</data>
|
| 75 |
+
<data key="e_suspicion_score">0.25</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Unprocessed</data>
|
| 82 |
+
<data key="e_incident_id">49458960-9ff2-11ee-b57e-09f55271957e</data>
|
| 83 |
+
</edge>
|
| 84 |
+
</graph>
|
| 85 |
+
</graphml>
|
graph/incidents_graphml/4/4946cba0-2611-11ee-a11d-5dcee9a57544.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="9b6daac0-07fd-11ee-9d60-2f49364b9928">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.57.115</data>
|
| 35 |
+
<data key="n_hostname">100.64.57.115</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.16.233.43</data>
|
| 43 |
+
<data key="n_hostname">172.16.233.43</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="9b6daac0-07fd-11ee-9d60-2f49364b9928" target="HOST-2758">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689756618</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">4946cba0-2611-11ee-a11d-5dcee9a57544</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49487ee0-f83f-11ee-a565-4974183b9eb9.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="e7f8c640-cac6-11ee-9222-b5c91e8078aa">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.22.199</data>
|
| 35 |
+
<data key="n_hostname">100.64.22.199</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.217.8</data>
|
| 43 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="e7f8c640-cac6-11ee-9222-b5c91e8078aa" target="HOST-2731">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1712866119</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">49487ee0-f83f-11ee-a565-4974183b9eb9</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49518c00-0ef9-11ed-ae8a-a78294a70068.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="a40cf3b2-f968-11ec-a6f1-eb5b708b2bba">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.207.79.45</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-1985.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Barracuda WAF","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="eb573e60-034a-11ed-b34c-f1e75604c15f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.12.47</data>
|
| 43 |
+
<data key="n_hostname">100.64.12.47</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17687" target="eb573e60-034a-11ed-b34c-f1e75604c15f">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1659069935</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">49518c00-0ef9-11ed-ae8a-a78294a70068</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/4952def0-f286-11ec-babd-d5ed2eda1ac6.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="48f5cad2-f286-11ec-ae5f-7d2c41c6d898">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.81.100</data>
|
| 35 |
+
<data key="n_hostname">100.64.81.100</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e04f1780-ea91-11ec-abf7-619673fe2558">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.72.88</data>
|
| 43 |
+
<data key="n_hostname">100.64.72.88</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="48f5cad2-f286-11ec-ae5f-7d2c41c6d898" target="HOST-13312">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1655941911</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">4952def0-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-13312" target="48f5cad2-f286-11ec-ae5f-7d2c41c6d898">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1655941911</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7</data>
|
| 67 |
+
<data key="e_suspicion_score">0.25</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Unprocessed</data>
|
| 74 |
+
<data key="e_incident_id">4952def0-f286-11ec-babd-d5ed2eda1ac6</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/4/49544b20-0ef9-11ed-ae8a-a78294a70068.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="4bf6d901-03a1-11ed-ac3f-e7a0e3c0cc5f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.97.224</data>
|
| 35 |
+
<data key="n_hostname">100.64.97.224</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="38840493-0a79-11ed-8674-598372048324">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.221.82.8</data>
|
| 43 |
+
<data key="n_hostname">10.221.82.8</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="4bf6d901-03a1-11ed-ac3f-e7a0e3c0cc5f" target="HOST-16884">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1659069935</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">49544b20-0ef9-11ed-ae8a-a78294a70068</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49577f70-0ef9-11ed-ae8a-a78294a70068.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="38840493-0a79-11ed-8674-598372048324">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.221.82.8</data>
|
| 35 |
+
<data key="n_hostname">10.221.82.8</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="4bf6d901-03a1-11ed-ac3f-e7a0e3c0cc5f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.97.224</data>
|
| 43 |
+
<data key="n_hostname">100.64.97.224</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-16884" target="HOST-19353">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1659069935</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">49577f70-0ef9-11ed-ae8a-a78294a70068</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/4958d290-f83f-11ee-a565-4974183b9eb9.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.217.8</data>
|
| 35 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e7f8c640-cac6-11ee-9222-b5c91e8078aa">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.22.199</data>
|
| 43 |
+
<data key="n_hostname">100.64.22.199</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2731" target="HOST-4847">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1712866119</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">4958d290-f83f-11ee-a565-4974183b9eb9</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/495f0ee0-0068-11ef-9e1d-8b16c75f4754.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.229.11</data>
|
| 35 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="4d8fd433-0050-11ef-a31a-4faed8d2fc36">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.59.182</data>
|
| 43 |
+
<data key="n_hostname">100.64.59.182</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.841796875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2750" target="HOST-10125">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1713763338</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.841796875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.841796875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">495f0ee0-0068-11ef-9e1d-8b16c75f4754</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/49643eb0-2611-11ee-a11d-5dcee9a57544.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.16.233.43</data>
|
| 35 |
+
<data key="n_hostname">172.16.233.43</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9b6daac0-07fd-11ee-9d60-2f49364b9928">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.57.115</data>
|
| 43 |
+
<data key="n_hostname">100.64.57.115</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2758" target="HOST-9815">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689756618</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">49643eb0-2611-11ee-a11d-5dcee9a57544</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/4965a3d0-f83f-11ee-a565-4974183b9eb9.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="82d11080-0625-11ee-b173-c9921719c2f8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.22.201</data>
|
| 35 |
+
<data key="n_hostname">100.64.22.201</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Stealthwatch"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.16.233.43</data>
|
| 43 |
+
<data key="n_hostname">172.16.233.43</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="82d11080-0625-11ee-b173-c9921719c2f8" target="HOST-2758">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1712866119</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">4965a3d0-f83f-11ee-a565-4974183b9eb9</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/496f7b30-08cf-11ef-81ac-a7f609e446b5.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="07d63475-1389-11ee-98ae-c11e532db376">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.30.211</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-2066.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="9f86d912-0627-11ee-bc2f-8356f14253be">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.207.79.45</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-1999.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="07d63475-1389-11ee-98ae-c11e532db376" target="HOST-16986">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1714687185</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">496f7b30-08cf-11ef-81ac-a7f609e446b5</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/497470e0-f83f-11ee-a565-4974183b9eb9.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.16.233.43</data>
|
| 35 |
+
<data key="n_hostname">172.16.233.43</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="82d11080-0625-11ee-b173-c9921719c2f8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.22.201</data>
|
| 43 |
+
<data key="n_hostname">100.64.22.201</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Stealthwatch"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2758" target="HOST-4848">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1712866119</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">497470e0-f83f-11ee-a565-4974183b9eb9</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/4977c700-0068-11ef-9e1d-8b16c75f4754.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="4d8fd433-0050-11ef-a31a-4faed8d2fc36">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.59.182</data>
|
| 35 |
+
<data key="n_hostname">100.64.59.182</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.229.11</data>
|
| 43 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-10125" target="HOST-2750">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1713763338</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">4977c700-0068-11ef-9e1d-8b16c75f4754</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/497852f0-68ac-11ee-864e-0fda06c5b459.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.191.229</data>
|
| 35 |
+
<data key="n_hostname">172.24.191.229</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="02b8b3c1-0630-11ee-b40c-412a652124a2">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.18.80</data>
|
| 43 |
+
<data key="n_hostname">100.64.18.80</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2839" target="02b8b3c1-0630-11ee-b40c-412a652124a2">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697079967</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">497852f0-68ac-11ee-864e-0fda06c5b459</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/4/497ad3f0-2611-11ee-a11d-5dcee9a57544.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="343c4c50-063e-11ee-b9e4-8dff6f886deb">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.39.54</data>
|
| 35 |
+
<data key="n_hostname">100.64.39.54</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.229.11</data>
|
| 43 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-7094" target="HOST-2750">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689756618</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">497ad3f0-2611-11ee-a11d-5dcee9a57544</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|