f15hb0wn commited on
Commit
9080700
·
verified ·
1 Parent(s): 339cde1

Upload per-incident GraphML sharded batch 8/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/4/48ef54a0-6d11-11ee-9911-f50eb88c1287.graphml +797 -0
  2. graph/incidents_graphml/4/48fb4580-850d-11ee-89b4-37c02fa13bd9.graphml +63 -0
  3. graph/incidents_graphml/4/48ff9730-631f-11ee-b6b8-b9a4d865fde2.graphml +63 -0
  4. graph/incidents_graphml/4/49001890-efa8-11ec-88e9-cd157aceabd3.graphml +63 -0
  5. graph/incidents_graphml/4/49048aa0-2270-11ee-9fd4-59af0d5e8a32.graphml +63 -0
  6. graph/incidents_graphml/4/490670c0-30fe-11ef-82e2-b166e7a5de57.graphml +185 -0
  7. graph/incidents_graphml/4/49077fb0-5909-11ee-a459-5b20d657705e.graphml +63 -0
  8. graph/incidents_graphml/4/49096700-2cc0-11ee-9ea2-17c9a8b72baa.graphml +489 -0
  9. graph/incidents_graphml/4/49098040-d383-11ee-8aee-79d3d013c637.graphml +63 -0
  10. graph/incidents_graphml/4/490a89e0-6fe7-11ee-bec7-efacac475e54.graphml +63 -0
  11. graph/incidents_graphml/4/490bfd10-676e-11ee-acda-6b17f6d60989.graphml +841 -0
  12. graph/incidents_graphml/4/490d46e0-850d-11ee-89b4-37c02fa13bd9.graphml +63 -0
  13. graph/incidents_graphml/4/490f9cc0-631f-11ee-b6b8-b9a4d865fde2.graphml +63 -0
  14. graph/incidents_graphml/4/4914ee10-331d-11ed-b7a7-43dc40721942.graphml +63 -0
  15. graph/incidents_graphml/4/49151a40-0836-11ee-b8d0-013dce35746a.graphml +63 -0
  16. graph/incidents_graphml/4/49171290-30fe-11ef-82e2-b166e7a5de57.graphml +221 -0
  17. graph/incidents_graphml/4/491932f0-5909-11ee-a459-5b20d657705e.graphml +63 -0
  18. graph/incidents_graphml/4/491b6370-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
  19. graph/incidents_graphml/4/491d0f50-be91-11ed-9416-c54055a72e53.graphml +77 -0
  20. graph/incidents_graphml/4/491d3150-631f-11ee-b6b8-b9a4d865fde2.graphml +63 -0
  21. graph/incidents_graphml/4/491fa930-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
  22. graph/incidents_graphml/4/49221150-d383-11ee-8aee-79d3d013c637.graphml +63 -0
  23. graph/incidents_graphml/4/49222900-1f34-11ee-bd83-b52c9cbf0232.graphml +113 -0
  24. graph/incidents_graphml/4/49236a80-f286-11ec-babd-d5ed2eda1ac6.graphml +805 -0
  25. graph/incidents_graphml/4/492715a0-5909-11ee-a459-5b20d657705e.graphml +63 -0
  26. graph/incidents_graphml/4/492c7390-631f-11ee-b6b8-b9a4d865fde2.graphml +63 -0
  27. graph/incidents_graphml/4/493023f0-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
  28. graph/incidents_graphml/4/49337f50-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
  29. graph/incidents_graphml/4/4934fe50-0836-11ee-b8d0-013dce35746a.graphml +63 -0
  30. graph/incidents_graphml/4/4935a230-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
  31. graph/incidents_graphml/4/493683b0-d383-11ee-8aee-79d3d013c637.graphml +63 -0
  32. graph/incidents_graphml/4/4938af70-dba2-11ed-8f69-23b0b50da3c2.graphml +63 -0
  33. graph/incidents_graphml/4/493944d0-631f-11ee-b6b8-b9a4d865fde2.graphml +63 -0
  34. graph/incidents_graphml/4/493b60f0-5909-11ee-a459-5b20d657705e.graphml +63 -0
  35. graph/incidents_graphml/4/49458960-9ff2-11ee-b57e-09f55271957e.graphml +85 -0
  36. graph/incidents_graphml/4/4946cba0-2611-11ee-a11d-5dcee9a57544.graphml +63 -0
  37. graph/incidents_graphml/4/49487ee0-f83f-11ee-a565-4974183b9eb9.graphml +63 -0
  38. graph/incidents_graphml/4/49518c00-0ef9-11ed-ae8a-a78294a70068.graphml +63 -0
  39. graph/incidents_graphml/4/4952def0-f286-11ec-babd-d5ed2eda1ac6.graphml +77 -0
  40. graph/incidents_graphml/4/49544b20-0ef9-11ed-ae8a-a78294a70068.graphml +63 -0
  41. graph/incidents_graphml/4/49577f70-0ef9-11ed-ae8a-a78294a70068.graphml +63 -0
  42. graph/incidents_graphml/4/4958d290-f83f-11ee-a565-4974183b9eb9.graphml +63 -0
  43. graph/incidents_graphml/4/495f0ee0-0068-11ef-9e1d-8b16c75f4754.graphml +63 -0
  44. graph/incidents_graphml/4/49643eb0-2611-11ee-a11d-5dcee9a57544.graphml +63 -0
  45. graph/incidents_graphml/4/4965a3d0-f83f-11ee-a565-4974183b9eb9.graphml +63 -0
  46. graph/incidents_graphml/4/496f7b30-08cf-11ef-81ac-a7f609e446b5.graphml +63 -0
  47. graph/incidents_graphml/4/497470e0-f83f-11ee-a565-4974183b9eb9.graphml +63 -0
  48. graph/incidents_graphml/4/4977c700-0068-11ef-9e1d-8b16c75f4754.graphml +63 -0
  49. graph/incidents_graphml/4/497852f0-68ac-11ee-864e-0fda06c5b459.graphml +63 -0
  50. graph/incidents_graphml/4/497ad3f0-2611-11ee-a11d-5dcee9a57544.graphml +63 -0
graph/incidents_graphml/4/48ef54a0-6d11-11ee-9911-f50eb88c1287.graphml ADDED
@@ -0,0 +1,797 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.182.227</data>
35
+ <data key="n_hostname">172.31.182.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a9ea58d0-0c87-11ee-b6c6-6b952e97c077">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.7.75</data>
43
+ <data key="n_hostname">100.64.7.75</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="44e337c2-0833-11ee-a597-2bdd4fe21485">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.15.235</data>
51
+ <data key="n_hostname">100.64.15.235</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.31.6.172</data>
59
+ <data key="n_hostname">172.31.6.172</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="d741fe43-062f-11ee-b8fe-2b837b6c5f79">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.15.236</data>
67
+ <data key="n_hostname">100.64.15.236</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="46b76870-6c81-11ee-b899-956327f3cbfd">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.15.237</data>
75
+ <data key="n_hostname">100.64.15.237</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">172.24.191.229</data>
83
+ <data key="n_hostname">172.24.191.229</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="2cbf24e1-6d11-11ee-92a5-1786393e6e33">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.15.238</data>
91
+ <data key="n_hostname">100.64.15.238</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">172.16.233.43</data>
99
+ <data key="n_hostname">172.16.233.43</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="7e6282b0-1be5-11ee-ae44-ff8a590fe858">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.15.239</data>
107
+ <data key="n_hostname">100.64.15.239</data>
108
+ <data key="n_set_roles">["Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.25</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">172.21.61.66</data>
115
+ <data key="n_hostname">172.21.61.66</data>
116
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.25</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="3956bb80-42c5-11ee-9dea-8baa5ffd0671">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.15.240</data>
123
+ <data key="n_hostname">100.64.15.240</data>
124
+ <data key="n_set_roles">["Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.25</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="87aa9ba0-2e5f-11ee-92fd-0b49218c7f04">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.15.241</data>
131
+ <data key="n_hostname">100.64.15.241</data>
132
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
133
+ <data key="n_suspicion_score">0.25</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="4ee08ab4-42e0-11ee-a68f-ed1351d62a26">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.15.242</data>
139
+ <data key="n_hostname">100.64.15.242</data>
140
+ <data key="n_set_roles">["Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.25</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">172.18.96.192</data>
147
+ <data key="n_hostname">172.18.96.192</data>
148
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.25</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="73eb74b0-07c0-11ee-abcb-e3d6cf13af91">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.15.243</data>
155
+ <data key="n_hostname">100.64.15.243</data>
156
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
157
+ <data key="n_suspicion_score">0.25</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">172.25.222.10</data>
163
+ <data key="n_hostname">172.25.222.10</data>
164
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
165
+ <data key="n_suspicion_score">0.25</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <node id="1c33b122-4d56-11ee-8daf-734e5b623146">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">100.64.15.244</data>
171
+ <data key="n_hostname">100.64.15.244</data>
172
+ <data key="n_set_roles">["Exploiting Host"]</data>
173
+ <data key="n_suspicion_score">0.25</data>
174
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
175
+ </node>
176
+ <node id="5ea3a190-0626-11ee-ad3e-fda0da874cab">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">100.64.5.83</data>
179
+ <data key="n_hostname">100.64.5.83</data>
180
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
181
+ <data key="n_suspicion_score">0.25</data>
182
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
183
+ </node>
184
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">172.22.127.96</data>
187
+ <data key="n_hostname">172.22.127.96</data>
188
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
189
+ <data key="n_suspicion_score">0.25</data>
190
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
191
+ </node>
192
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
193
+ <data key="n_type">HOST</data>
194
+ <data key="n_ip">172.30.229.11</data>
195
+ <data key="n_hostname">172.30.229.11</data>
196
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
197
+ <data key="n_suspicion_score">0.25</data>
198
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
199
+ </node>
200
+ <node id="9110dda0-0833-11ee-9381-451180c5260b">
201
+ <data key="n_type">HOST</data>
202
+ <data key="n_ip">100.64.15.245</data>
203
+ <data key="n_hostname">100.64.15.245</data>
204
+ <data key="n_set_roles">["Exploiting Host"]</data>
205
+ <data key="n_suspicion_score">0.25</data>
206
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
207
+ </node>
208
+ <edge id="e1" source="HOST-2761" target="HOST-2712">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1697563150</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.7</data>
213
+ <data key="e_suspicion_score">0.25</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Unprocessed</data>
220
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
221
+ </edge>
222
+ <edge id="e2" source="44e337c2-0833-11ee-a597-2bdd4fe21485" target="HOST-2757">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1697563150</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.7</data>
227
+ <data key="e_suspicion_score">0.25</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Unprocessed</data>
234
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
235
+ </edge>
236
+ <edge id="e3" source="HOST-2757" target="44e337c2-0833-11ee-a597-2bdd4fe21485">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1697563150</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.7</data>
241
+ <data key="e_suspicion_score">0.25</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Unprocessed</data>
248
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
249
+ </edge>
250
+ <edge id="e4" source="d741fe43-062f-11ee-b8fe-2b837b6c5f79" target="HOST-2757">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1697563150</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.7</data>
255
+ <data key="e_suspicion_score">0.25</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Unprocessed</data>
262
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
263
+ </edge>
264
+ <edge id="e5" source="HOST-2757" target="d741fe43-062f-11ee-b8fe-2b837b6c5f79">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1697563150</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.7</data>
269
+ <data key="e_suspicion_score">0.25</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Unprocessed</data>
276
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
277
+ </edge>
278
+ <edge id="e6" source="HOST-2712" target="HOST-2757">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1697563150</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.7</data>
283
+ <data key="e_suspicion_score">0.25</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Unprocessed</data>
290
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
291
+ </edge>
292
+ <edge id="e7" source="HOST-2757" target="HOST-2712">
293
+ <data key="e_type">INCIDENT_LINK</data>
294
+ <data key="e_timestamp">1697563150</data>
295
+ <data key="e_label_binary">malicious</data>
296
+ <data key="e_label_confidence">0.7</data>
297
+ <data key="e_suspicion_score">0.25</data>
298
+ <data key="e_mo_name">Data Theft</data>
299
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
300
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
301
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
302
+ <data key="e_lifecycle_stage">complete-mission</data>
303
+ <data key="e_disposition">Unprocessed</data>
304
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
305
+ </edge>
306
+ <edge id="e8" source="46b76870-6c81-11ee-b899-956327f3cbfd" target="HOST-2839">
307
+ <data key="e_type">INCIDENT_LINK</data>
308
+ <data key="e_timestamp">1697563150</data>
309
+ <data key="e_label_binary">malicious</data>
310
+ <data key="e_label_confidence">0.7</data>
311
+ <data key="e_suspicion_score">0.25</data>
312
+ <data key="e_mo_name">Data Theft</data>
313
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
314
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
315
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
316
+ <data key="e_lifecycle_stage">complete-mission</data>
317
+ <data key="e_disposition">Unprocessed</data>
318
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
319
+ </edge>
320
+ <edge id="e9" source="HOST-2839" target="46b76870-6c81-11ee-b899-956327f3cbfd">
321
+ <data key="e_type">INCIDENT_LINK</data>
322
+ <data key="e_timestamp">1697563150</data>
323
+ <data key="e_label_binary">malicious</data>
324
+ <data key="e_label_confidence">0.7</data>
325
+ <data key="e_suspicion_score">0.25</data>
326
+ <data key="e_mo_name">Data Theft</data>
327
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
328
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
329
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
330
+ <data key="e_lifecycle_stage">complete-mission</data>
331
+ <data key="e_disposition">Unprocessed</data>
332
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
333
+ </edge>
334
+ <edge id="e10" source="2cbf24e1-6d11-11ee-92a5-1786393e6e33" target="HOST-2839">
335
+ <data key="e_type">INCIDENT_LINK</data>
336
+ <data key="e_timestamp">1697563150</data>
337
+ <data key="e_label_binary">malicious</data>
338
+ <data key="e_label_confidence">0.7</data>
339
+ <data key="e_suspicion_score">0.25</data>
340
+ <data key="e_mo_name">Data Theft</data>
341
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
342
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
343
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
344
+ <data key="e_lifecycle_stage">complete-mission</data>
345
+ <data key="e_disposition">Unprocessed</data>
346
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
347
+ </edge>
348
+ <edge id="e11" source="HOST-2839" target="2cbf24e1-6d11-11ee-92a5-1786393e6e33">
349
+ <data key="e_type">INCIDENT_LINK</data>
350
+ <data key="e_timestamp">1697563150</data>
351
+ <data key="e_label_binary">malicious</data>
352
+ <data key="e_label_confidence">0.7</data>
353
+ <data key="e_suspicion_score">0.25</data>
354
+ <data key="e_mo_name">Data Theft</data>
355
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
356
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
357
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
358
+ <data key="e_lifecycle_stage">complete-mission</data>
359
+ <data key="e_disposition">Unprocessed</data>
360
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
361
+ </edge>
362
+ <edge id="e12" source="HOST-2712" target="HOST-2839">
363
+ <data key="e_type">INCIDENT_LINK</data>
364
+ <data key="e_timestamp">1697563150</data>
365
+ <data key="e_label_binary">malicious</data>
366
+ <data key="e_label_confidence">0.7</data>
367
+ <data key="e_suspicion_score">0.25</data>
368
+ <data key="e_mo_name">Data Theft</data>
369
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
370
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
371
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
372
+ <data key="e_lifecycle_stage">complete-mission</data>
373
+ <data key="e_disposition">Unprocessed</data>
374
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
375
+ </edge>
376
+ <edge id="e13" source="HOST-2839" target="HOST-2712">
377
+ <data key="e_type">INCIDENT_LINK</data>
378
+ <data key="e_timestamp">1697563150</data>
379
+ <data key="e_label_binary">malicious</data>
380
+ <data key="e_label_confidence">0.7</data>
381
+ <data key="e_suspicion_score">0.25</data>
382
+ <data key="e_mo_name">Data Theft</data>
383
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
384
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
385
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
386
+ <data key="e_lifecycle_stage">complete-mission</data>
387
+ <data key="e_disposition">Unprocessed</data>
388
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
389
+ </edge>
390
+ <edge id="e14" source="HOST-2712" target="HOST-2758">
391
+ <data key="e_type">INCIDENT_LINK</data>
392
+ <data key="e_timestamp">1697563150</data>
393
+ <data key="e_label_binary">malicious</data>
394
+ <data key="e_label_confidence">0.7</data>
395
+ <data key="e_suspicion_score">0.25</data>
396
+ <data key="e_mo_name">Data Theft</data>
397
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
398
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
399
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
400
+ <data key="e_lifecycle_stage">complete-mission</data>
401
+ <data key="e_disposition">Unprocessed</data>
402
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
403
+ </edge>
404
+ <edge id="e15" source="7e6282b0-1be5-11ee-ae44-ff8a590fe858" target="HOST-2709">
405
+ <data key="e_type">INCIDENT_LINK</data>
406
+ <data key="e_timestamp">1697563150</data>
407
+ <data key="e_label_binary">malicious</data>
408
+ <data key="e_label_confidence">0.7</data>
409
+ <data key="e_suspicion_score">0.25</data>
410
+ <data key="e_mo_name">Data Theft</data>
411
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
412
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
413
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
414
+ <data key="e_lifecycle_stage">complete-mission</data>
415
+ <data key="e_disposition">Unprocessed</data>
416
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
417
+ </edge>
418
+ <edge id="e16" source="HOST-2709" target="7e6282b0-1be5-11ee-ae44-ff8a590fe858">
419
+ <data key="e_type">INCIDENT_LINK</data>
420
+ <data key="e_timestamp">1697563150</data>
421
+ <data key="e_label_binary">malicious</data>
422
+ <data key="e_label_confidence">0.7</data>
423
+ <data key="e_suspicion_score">0.25</data>
424
+ <data key="e_mo_name">Data Theft</data>
425
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
426
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
427
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
428
+ <data key="e_lifecycle_stage">complete-mission</data>
429
+ <data key="e_disposition">Unprocessed</data>
430
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
431
+ </edge>
432
+ <edge id="e17" source="3956bb80-42c5-11ee-9dea-8baa5ffd0671" target="HOST-2709">
433
+ <data key="e_type">INCIDENT_LINK</data>
434
+ <data key="e_timestamp">1697563150</data>
435
+ <data key="e_label_binary">malicious</data>
436
+ <data key="e_label_confidence">0.7</data>
437
+ <data key="e_suspicion_score">0.25</data>
438
+ <data key="e_mo_name">Data Theft</data>
439
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
440
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
441
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
442
+ <data key="e_lifecycle_stage">complete-mission</data>
443
+ <data key="e_disposition">Unprocessed</data>
444
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
445
+ </edge>
446
+ <edge id="e18" source="HOST-2709" target="3956bb80-42c5-11ee-9dea-8baa5ffd0671">
447
+ <data key="e_type">INCIDENT_LINK</data>
448
+ <data key="e_timestamp">1697563150</data>
449
+ <data key="e_label_binary">malicious</data>
450
+ <data key="e_label_confidence">0.7</data>
451
+ <data key="e_suspicion_score">0.25</data>
452
+ <data key="e_mo_name">Data Theft</data>
453
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
454
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
455
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
456
+ <data key="e_lifecycle_stage">complete-mission</data>
457
+ <data key="e_disposition">Unprocessed</data>
458
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
459
+ </edge>
460
+ <edge id="e19" source="HOST-2712" target="HOST-2709">
461
+ <data key="e_type">INCIDENT_LINK</data>
462
+ <data key="e_timestamp">1697563150</data>
463
+ <data key="e_label_binary">malicious</data>
464
+ <data key="e_label_confidence">0.7</data>
465
+ <data key="e_suspicion_score">0.25</data>
466
+ <data key="e_mo_name">Data Theft</data>
467
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
468
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
469
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
470
+ <data key="e_lifecycle_stage">complete-mission</data>
471
+ <data key="e_disposition">Unprocessed</data>
472
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
473
+ </edge>
474
+ <edge id="e20" source="HOST-2709" target="HOST-2712">
475
+ <data key="e_type">INCIDENT_LINK</data>
476
+ <data key="e_timestamp">1697563150</data>
477
+ <data key="e_label_binary">malicious</data>
478
+ <data key="e_label_confidence">0.7</data>
479
+ <data key="e_suspicion_score">0.25</data>
480
+ <data key="e_mo_name">Data Theft</data>
481
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
482
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
483
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
484
+ <data key="e_lifecycle_stage">complete-mission</data>
485
+ <data key="e_disposition">Unprocessed</data>
486
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
487
+ </edge>
488
+ <edge id="e21" source="87aa9ba0-2e5f-11ee-92fd-0b49218c7f04" target="HOST-2709">
489
+ <data key="e_type">INCIDENT_LINK</data>
490
+ <data key="e_timestamp">1697563150</data>
491
+ <data key="e_label_binary">malicious</data>
492
+ <data key="e_label_confidence">0.7</data>
493
+ <data key="e_suspicion_score">0.25</data>
494
+ <data key="e_mo_name">Data Theft</data>
495
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
496
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
497
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
498
+ <data key="e_lifecycle_stage">complete-mission</data>
499
+ <data key="e_disposition">Unprocessed</data>
500
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
501
+ </edge>
502
+ <edge id="e22" source="HOST-2709" target="87aa9ba0-2e5f-11ee-92fd-0b49218c7f04">
503
+ <data key="e_type">INCIDENT_LINK</data>
504
+ <data key="e_timestamp">1697563150</data>
505
+ <data key="e_label_binary">malicious</data>
506
+ <data key="e_label_confidence">0.7</data>
507
+ <data key="e_suspicion_score">0.25</data>
508
+ <data key="e_mo_name">Data Theft</data>
509
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
510
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
511
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
512
+ <data key="e_lifecycle_stage">complete-mission</data>
513
+ <data key="e_disposition">Unprocessed</data>
514
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
515
+ </edge>
516
+ <edge id="e23" source="4ee08ab4-42e0-11ee-a68f-ed1351d62a26" target="HOST-2715">
517
+ <data key="e_type">INCIDENT_LINK</data>
518
+ <data key="e_timestamp">1697563150</data>
519
+ <data key="e_label_binary">malicious</data>
520
+ <data key="e_label_confidence">0.7</data>
521
+ <data key="e_suspicion_score">0.25</data>
522
+ <data key="e_mo_name">Data Theft</data>
523
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
524
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
525
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
526
+ <data key="e_lifecycle_stage">complete-mission</data>
527
+ <data key="e_disposition">Unprocessed</data>
528
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
529
+ </edge>
530
+ <edge id="e24" source="HOST-2715" target="4ee08ab4-42e0-11ee-a68f-ed1351d62a26">
531
+ <data key="e_type">INCIDENT_LINK</data>
532
+ <data key="e_timestamp">1697563150</data>
533
+ <data key="e_label_binary">malicious</data>
534
+ <data key="e_label_confidence">0.7</data>
535
+ <data key="e_suspicion_score">0.25</data>
536
+ <data key="e_mo_name">Data Theft</data>
537
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
538
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
539
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
540
+ <data key="e_lifecycle_stage">complete-mission</data>
541
+ <data key="e_disposition">Unprocessed</data>
542
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
543
+ </edge>
544
+ <edge id="e25" source="73eb74b0-07c0-11ee-abcb-e3d6cf13af91" target="HOST-2715">
545
+ <data key="e_type">INCIDENT_LINK</data>
546
+ <data key="e_timestamp">1697563150</data>
547
+ <data key="e_label_binary">malicious</data>
548
+ <data key="e_label_confidence">0.7</data>
549
+ <data key="e_suspicion_score">0.25</data>
550
+ <data key="e_mo_name">Data Theft</data>
551
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
552
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
553
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
554
+ <data key="e_lifecycle_stage">complete-mission</data>
555
+ <data key="e_disposition">Unprocessed</data>
556
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
557
+ </edge>
558
+ <edge id="e26" source="HOST-2715" target="73eb74b0-07c0-11ee-abcb-e3d6cf13af91">
559
+ <data key="e_type">INCIDENT_LINK</data>
560
+ <data key="e_timestamp">1697563150</data>
561
+ <data key="e_label_binary">malicious</data>
562
+ <data key="e_label_confidence">0.7</data>
563
+ <data key="e_suspicion_score">0.25</data>
564
+ <data key="e_mo_name">Data Theft</data>
565
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
566
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
567
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
568
+ <data key="e_lifecycle_stage">complete-mission</data>
569
+ <data key="e_disposition">Unprocessed</data>
570
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
571
+ </edge>
572
+ <edge id="e27" source="HOST-2712" target="HOST-2715">
573
+ <data key="e_type">INCIDENT_LINK</data>
574
+ <data key="e_timestamp">1697563150</data>
575
+ <data key="e_label_binary">malicious</data>
576
+ <data key="e_label_confidence">0.7</data>
577
+ <data key="e_suspicion_score">0.25</data>
578
+ <data key="e_mo_name">Data Theft</data>
579
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
580
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
581
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
582
+ <data key="e_lifecycle_stage">complete-mission</data>
583
+ <data key="e_disposition">Unprocessed</data>
584
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
585
+ </edge>
586
+ <edge id="e28" source="HOST-2715" target="HOST-2712">
587
+ <data key="e_type">INCIDENT_LINK</data>
588
+ <data key="e_timestamp">1697563150</data>
589
+ <data key="e_label_binary">malicious</data>
590
+ <data key="e_label_confidence">0.7</data>
591
+ <data key="e_suspicion_score">0.25</data>
592
+ <data key="e_mo_name">Data Theft</data>
593
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
594
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
595
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
596
+ <data key="e_lifecycle_stage">complete-mission</data>
597
+ <data key="e_disposition">Unprocessed</data>
598
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
599
+ </edge>
600
+ <edge id="e29" source="HOST-2712" target="HOST-2768">
601
+ <data key="e_type">INCIDENT_LINK</data>
602
+ <data key="e_timestamp">1697563150</data>
603
+ <data key="e_label_binary">malicious</data>
604
+ <data key="e_label_confidence">0.7</data>
605
+ <data key="e_suspicion_score">0.25</data>
606
+ <data key="e_mo_name">Data Theft</data>
607
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
608
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
609
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
610
+ <data key="e_lifecycle_stage">complete-mission</data>
611
+ <data key="e_disposition">Unprocessed</data>
612
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
613
+ </edge>
614
+ <edge id="e30" source="1c33b122-4d56-11ee-8daf-734e5b623146" target="HOST-2709">
615
+ <data key="e_type">INCIDENT_LINK</data>
616
+ <data key="e_timestamp">1697563150</data>
617
+ <data key="e_label_binary">malicious</data>
618
+ <data key="e_label_confidence">0.7</data>
619
+ <data key="e_suspicion_score">0.25</data>
620
+ <data key="e_mo_name">Data Theft</data>
621
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
622
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
623
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
624
+ <data key="e_lifecycle_stage">complete-mission</data>
625
+ <data key="e_disposition">Unprocessed</data>
626
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
627
+ </edge>
628
+ <edge id="e31" source="HOST-2709" target="1c33b122-4d56-11ee-8daf-734e5b623146">
629
+ <data key="e_type">INCIDENT_LINK</data>
630
+ <data key="e_timestamp">1697563150</data>
631
+ <data key="e_label_binary">malicious</data>
632
+ <data key="e_label_confidence">0.7</data>
633
+ <data key="e_suspicion_score">0.25</data>
634
+ <data key="e_mo_name">Data Theft</data>
635
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
636
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
637
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
638
+ <data key="e_lifecycle_stage">complete-mission</data>
639
+ <data key="e_disposition">Unprocessed</data>
640
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
641
+ </edge>
642
+ <edge id="e32" source="5ea3a190-0626-11ee-ad3e-fda0da874cab" target="HOST-2757">
643
+ <data key="e_type">INCIDENT_LINK</data>
644
+ <data key="e_timestamp">1697563150</data>
645
+ <data key="e_label_binary">malicious</data>
646
+ <data key="e_label_confidence">0.7</data>
647
+ <data key="e_suspicion_score">0.25</data>
648
+ <data key="e_mo_name">Data Theft</data>
649
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
650
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
651
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
652
+ <data key="e_lifecycle_stage">complete-mission</data>
653
+ <data key="e_disposition">Unprocessed</data>
654
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
655
+ </edge>
656
+ <edge id="e33" source="HOST-2757" target="5ea3a190-0626-11ee-ad3e-fda0da874cab">
657
+ <data key="e_type">INCIDENT_LINK</data>
658
+ <data key="e_timestamp">1697563150</data>
659
+ <data key="e_label_binary">malicious</data>
660
+ <data key="e_label_confidence">0.7</data>
661
+ <data key="e_suspicion_score">0.25</data>
662
+ <data key="e_mo_name">Data Theft</data>
663
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
664
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
665
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
666
+ <data key="e_lifecycle_stage">complete-mission</data>
667
+ <data key="e_disposition">Unprocessed</data>
668
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
669
+ </edge>
670
+ <edge id="e34" source="87aa9ba0-2e5f-11ee-92fd-0b49218c7f04" target="HOST-2761">
671
+ <data key="e_type">INCIDENT_LINK</data>
672
+ <data key="e_timestamp">1697563150</data>
673
+ <data key="e_label_binary">malicious</data>
674
+ <data key="e_label_confidence">0.7</data>
675
+ <data key="e_suspicion_score">0.25</data>
676
+ <data key="e_mo_name">Data Theft</data>
677
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
678
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
679
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
680
+ <data key="e_lifecycle_stage">complete-mission</data>
681
+ <data key="e_disposition">Unprocessed</data>
682
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
683
+ </edge>
684
+ <edge id="e35" source="HOST-2712" target="HOST-2726">
685
+ <data key="e_type">INCIDENT_LINK</data>
686
+ <data key="e_timestamp">1697563150</data>
687
+ <data key="e_label_binary">malicious</data>
688
+ <data key="e_label_confidence">0.7</data>
689
+ <data key="e_suspicion_score">0.25</data>
690
+ <data key="e_mo_name">Data Theft</data>
691
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
692
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
693
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
694
+ <data key="e_lifecycle_stage">complete-mission</data>
695
+ <data key="e_disposition">Unprocessed</data>
696
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
697
+ </edge>
698
+ <edge id="e36" source="HOST-2712" target="HOST-2750">
699
+ <data key="e_type">INCIDENT_LINK</data>
700
+ <data key="e_timestamp">1697563150</data>
701
+ <data key="e_label_binary">malicious</data>
702
+ <data key="e_label_confidence">0.7</data>
703
+ <data key="e_suspicion_score">0.25</data>
704
+ <data key="e_mo_name">Data Theft</data>
705
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
706
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
707
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
708
+ <data key="e_lifecycle_stage">complete-mission</data>
709
+ <data key="e_disposition">Unprocessed</data>
710
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
711
+ </edge>
712
+ <edge id="e37" source="9110dda0-0833-11ee-9381-451180c5260b" target="HOST-2709">
713
+ <data key="e_type">INCIDENT_LINK</data>
714
+ <data key="e_timestamp">1697563150</data>
715
+ <data key="e_label_binary">malicious</data>
716
+ <data key="e_label_confidence">0.7</data>
717
+ <data key="e_suspicion_score">0.25</data>
718
+ <data key="e_mo_name">Data Theft</data>
719
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
720
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
721
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
722
+ <data key="e_lifecycle_stage">complete-mission</data>
723
+ <data key="e_disposition">Unprocessed</data>
724
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
725
+ </edge>
726
+ <edge id="e38" source="HOST-2709" target="9110dda0-0833-11ee-9381-451180c5260b">
727
+ <data key="e_type">INCIDENT_LINK</data>
728
+ <data key="e_timestamp">1697563150</data>
729
+ <data key="e_label_binary">malicious</data>
730
+ <data key="e_label_confidence">0.7</data>
731
+ <data key="e_suspicion_score">0.25</data>
732
+ <data key="e_mo_name">Data Theft</data>
733
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
734
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
735
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
736
+ <data key="e_lifecycle_stage">complete-mission</data>
737
+ <data key="e_disposition">Unprocessed</data>
738
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
739
+ </edge>
740
+ <edge id="e39" source="9110dda0-0833-11ee-9381-451180c5260b" target="HOST-2757">
741
+ <data key="e_type">INCIDENT_LINK</data>
742
+ <data key="e_timestamp">1697563150</data>
743
+ <data key="e_label_binary">malicious</data>
744
+ <data key="e_label_confidence">0.7</data>
745
+ <data key="e_suspicion_score">0.25</data>
746
+ <data key="e_mo_name">Data Theft</data>
747
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
748
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
749
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
750
+ <data key="e_lifecycle_stage">complete-mission</data>
751
+ <data key="e_disposition">Unprocessed</data>
752
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
753
+ </edge>
754
+ <edge id="e40" source="HOST-2757" target="9110dda0-0833-11ee-9381-451180c5260b">
755
+ <data key="e_type">INCIDENT_LINK</data>
756
+ <data key="e_timestamp">1697563150</data>
757
+ <data key="e_label_binary">malicious</data>
758
+ <data key="e_label_confidence">0.7</data>
759
+ <data key="e_suspicion_score">0.25</data>
760
+ <data key="e_mo_name">Data Theft</data>
761
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
762
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
763
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
764
+ <data key="e_lifecycle_stage">complete-mission</data>
765
+ <data key="e_disposition">Unprocessed</data>
766
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
767
+ </edge>
768
+ <edge id="e41" source="9110dda0-0833-11ee-9381-451180c5260b" target="HOST-2768">
769
+ <data key="e_type">INCIDENT_LINK</data>
770
+ <data key="e_timestamp">1697563150</data>
771
+ <data key="e_label_binary">malicious</data>
772
+ <data key="e_label_confidence">0.7</data>
773
+ <data key="e_suspicion_score">0.25</data>
774
+ <data key="e_mo_name">Data Theft</data>
775
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
776
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
777
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
778
+ <data key="e_lifecycle_stage">complete-mission</data>
779
+ <data key="e_disposition">Unprocessed</data>
780
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
781
+ </edge>
782
+ <edge id="e42" source="9110dda0-0833-11ee-9381-451180c5260b" target="HOST-2726">
783
+ <data key="e_type">INCIDENT_LINK</data>
784
+ <data key="e_timestamp">1697563150</data>
785
+ <data key="e_label_binary">malicious</data>
786
+ <data key="e_label_confidence">0.7</data>
787
+ <data key="e_suspicion_score">0.25</data>
788
+ <data key="e_mo_name">Data Theft</data>
789
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
790
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
791
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
792
+ <data key="e_lifecycle_stage">complete-mission</data>
793
+ <data key="e_disposition">Unprocessed</data>
794
+ <data key="e_incident_id">48ef54a0-6d11-11ee-9911-f50eb88c1287</data>
795
+ </edge>
796
+ </graph>
797
+ </graphml>
graph/incidents_graphml/4/48fb4580-850d-11ee-89b4-37c02fa13bd9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="97c97e81-0627-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.9.50</data>
43
+ <data key="n_hostname">100.64.9.50</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-2999">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700200260</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">48fb4580-850d-11ee-89b4-37c02fa13bd9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/48ff9730-631f-11ee-b6b8-b9a4d865fde2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.168.48</data>
35
+ <data key="n_hostname">172.30.168.48</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="5596dc42-0629-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.37.228</data>
43
+ <data key="n_hostname">100.64.37.228</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2842" target="5596dc42-0629-11ee-b19f-ed665a42340f">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696469651</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">48ff9730-631f-11ee-b6b8-b9a4d865fde2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49001890-efa8-11ec-88e9-cd157aceabd3.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="71922250-ea92-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.79.61</data>
43
+ <data key="n_hostname">USER-0015-1904.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12604" target="71922250-ea92-11ec-abf7-619673fe2558">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655626660</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">49001890-efa8-11ec-88e9-cd157aceabd3</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49048aa0-2270-11ee-9fd4-59af0d5e8a32.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="52a5cab1-16db-11ee-80e1-3d23d13d4b8a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.221.82.8</data>
35
+ <data key="n_hostname">USER-0015-1967.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="9a3b3aa2-212a-11ee-b17e-d1a81346a726">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.91.134</data>
43
+ <data key="n_hostname">100.64.91.134</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17003" target="HOST-18126">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689357615</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">49048aa0-2270-11ee-9fd4-59af0d5e8a32</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/490670c0-30fe-11ef-82e2-b166e7a5de57.graphml ADDED
@@ -0,0 +1,185 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="085fab70-28f9-11ef-8a9d-45659198471d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.46.144</data>
35
+ <data key="n_hostname">100.64.46.144</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="7e7fca11-28f4-11ef-a65d-2d26b03b63f9">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.22.127.96</data>
43
+ <data key="n_hostname">172.22.127.96</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="6d4c7b52-30fe-11ef-841f-0d3b44fd46b7">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.46.145</data>
51
+ <data key="n_hostname">100.64.46.145</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="001d48c5-2901-11ef-b28d-4b56691b41da">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.46.146</data>
59
+ <data key="n_hostname">100.64.46.146</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.7890625</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="75b23b31-28f8-11ef-aead-b741176e73de">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.40.230</data>
67
+ <data key="n_hostname">100.64.40.230</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.94375</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <edge id="e1" source="085fab70-28f9-11ef-8a9d-45659198471d" target="7e7fca11-28f4-11ef-a65d-2d26b03b63f9">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1719105417</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.94375</data>
77
+ <data key="e_suspicion_score">0.94375</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Disrupted</data>
84
+ <data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
85
+ </edge>
86
+ <edge id="e2" source="7e7fca11-28f4-11ef-a65d-2d26b03b63f9" target="085fab70-28f9-11ef-8a9d-45659198471d">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1719105417</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.94375</data>
91
+ <data key="e_suspicion_score">0.94375</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Disrupted</data>
98
+ <data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
99
+ </edge>
100
+ <edge id="e3" source="6d4c7b52-30fe-11ef-841f-0d3b44fd46b7" target="7e7fca11-28f4-11ef-a65d-2d26b03b63f9">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1719105417</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.94375</data>
105
+ <data key="e_suspicion_score">0.94375</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Disrupted</data>
112
+ <data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
113
+ </edge>
114
+ <edge id="e4" source="7e7fca11-28f4-11ef-a65d-2d26b03b63f9" target="6d4c7b52-30fe-11ef-841f-0d3b44fd46b7">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1719105417</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.94375</data>
119
+ <data key="e_suspicion_score">0.94375</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Disrupted</data>
126
+ <data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
127
+ </edge>
128
+ <edge id="e5" source="001d48c5-2901-11ef-b28d-4b56691b41da" target="7e7fca11-28f4-11ef-a65d-2d26b03b63f9">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1719105417</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.94375</data>
133
+ <data key="e_suspicion_score">0.94375</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Disrupted</data>
140
+ <data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
141
+ </edge>
142
+ <edge id="e6" source="7e7fca11-28f4-11ef-a65d-2d26b03b63f9" target="001d48c5-2901-11ef-b28d-4b56691b41da">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1719105417</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.94375</data>
147
+ <data key="e_suspicion_score">0.94375</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Disrupted</data>
154
+ <data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
155
+ </edge>
156
+ <edge id="e7" source="75b23b31-28f8-11ef-aead-b741176e73de" target="7e7fca11-28f4-11ef-a65d-2d26b03b63f9">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1719105417</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.94375</data>
161
+ <data key="e_suspicion_score">0.94375</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Disrupted</data>
168
+ <data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
169
+ </edge>
170
+ <edge id="e8" source="7e7fca11-28f4-11ef-a65d-2d26b03b63f9" target="75b23b31-28f8-11ef-aead-b741176e73de">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1719105417</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.94375</data>
175
+ <data key="e_suspicion_score">0.94375</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Disrupted</data>
182
+ <data key="e_incident_id">490670c0-30fe-11ef-82e2-b166e7a5de57</data>
183
+ </edge>
184
+ </graph>
185
+ </graphml>
graph/incidents_graphml/4/49077fb0-5909-11ee-a459-5b20d657705e.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="70e94116-0627-11ee-ad3e-fda0da874cab">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.56.243</data>
35
+ <data key="n_hostname">100.64.56.243</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.191.229</data>
43
+ <data key="n_hostname">172.24.191.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-9732" target="HOST-2839">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695360691</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">49077fb0-5909-11ee-a459-5b20d657705e</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49096700-2cc0-11ee-9ea2-17c9a8b72baa.graphml ADDED
@@ -0,0 +1,489 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b132b833-1b32-11ee-a6d3-9f15016beec0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.42.218</data>
35
+ <data key="n_hostname">100.64.42.218</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.200.243</data>
43
+ <data key="n_hostname">172.30.200.243</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="9a3f9982-0625-11ee-8860-f951c26910c1">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.14.140</data>
51
+ <data key="n_hostname">100.64.14.140</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">10.117.12.163</data>
59
+ <data key="n_hostname">10.117.12.163</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.7890625</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="1d680584-14fa-11ee-9c07-0f6b4b953b28">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.42.219</data>
67
+ <data key="n_hostname">100.64.42.219</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">172.27.202.53</data>
75
+ <data key="n_hostname">172.27.202.53</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.7890625</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="12b9a220-062b-11ee-a437-2bfcb70360ca">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.20.44</data>
83
+ <data key="n_hostname">100.64.20.44</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="62043410-1500-11ee-9c07-0f6b4b953b28">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.42.220</data>
91
+ <data key="n_hostname">100.64.42.220</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.578125</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="7844c532-062a-11ee-9a0c-b9f8978d847e">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.42.221</data>
99
+ <data key="n_hostname">100.64.42.221</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="05849802-06bf-11ee-91c7-b96dba9d7bf0">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.29.11</data>
107
+ <data key="n_hostname">100.64.29.11</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.841796875</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">172.30.208.219</data>
115
+ <data key="n_hostname">172.30.208.219</data>
116
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.71875</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="76d244b0-0aa4-11ee-9b9e-a7fb665fc5e8">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.42.222</data>
123
+ <data key="n_hostname">100.64.42.222</data>
124
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
125
+ <data key="n_suspicion_score">0.7890625</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">172.29.40.149</data>
131
+ <data key="n_hostname">172.29.40.149</data>
132
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.71875</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">172.31.6.172</data>
139
+ <data key="n_hostname">172.31.6.172</data>
140
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.71875</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <node id="e4407050-2fd2-11ee-a843-5f25ac05f17c">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.11.134</data>
147
+ <data key="n_hostname">100.64.11.134</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.578125</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <edge id="e1" source="b132b833-1b32-11ee-a6d3-9f15016beec0" target="HOST-2706">
153
+ <data key="e_type">INCIDENT_LINK</data>
154
+ <data key="e_timestamp">1690491486</data>
155
+ <data key="e_label_binary">malicious</data>
156
+ <data key="e_label_confidence">0.841796875</data>
157
+ <data key="e_suspicion_score">0.841796875</data>
158
+ <data key="e_mo_name">Data Theft</data>
159
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
160
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
161
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
162
+ <data key="e_lifecycle_stage">complete-mission</data>
163
+ <data key="e_disposition">Disrupted</data>
164
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
165
+ </edge>
166
+ <edge id="e2" source="HOST-3716" target="HOST-2773">
167
+ <data key="e_type">INCIDENT_LINK</data>
168
+ <data key="e_timestamp">1690491486</data>
169
+ <data key="e_label_binary">malicious</data>
170
+ <data key="e_label_confidence">0.841796875</data>
171
+ <data key="e_suspicion_score">0.841796875</data>
172
+ <data key="e_mo_name">Data Theft</data>
173
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
174
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
175
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
176
+ <data key="e_lifecycle_stage">complete-mission</data>
177
+ <data key="e_disposition">Disrupted</data>
178
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
179
+ </edge>
180
+ <edge id="e3" source="1d680584-14fa-11ee-9c07-0f6b4b953b28" target="HOST-2703">
181
+ <data key="e_type">INCIDENT_LINK</data>
182
+ <data key="e_timestamp">1690491486</data>
183
+ <data key="e_label_binary">malicious</data>
184
+ <data key="e_label_confidence">0.841796875</data>
185
+ <data key="e_suspicion_score">0.841796875</data>
186
+ <data key="e_mo_name">Data Theft</data>
187
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
188
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
189
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
190
+ <data key="e_lifecycle_stage">complete-mission</data>
191
+ <data key="e_disposition">Disrupted</data>
192
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
193
+ </edge>
194
+ <edge id="e4" source="HOST-2703" target="1d680584-14fa-11ee-9c07-0f6b4b953b28">
195
+ <data key="e_type">INCIDENT_LINK</data>
196
+ <data key="e_timestamp">1690491486</data>
197
+ <data key="e_label_binary">malicious</data>
198
+ <data key="e_label_confidence">0.841796875</data>
199
+ <data key="e_suspicion_score">0.841796875</data>
200
+ <data key="e_mo_name">Data Theft</data>
201
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
202
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
203
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
204
+ <data key="e_lifecycle_stage">complete-mission</data>
205
+ <data key="e_disposition">Disrupted</data>
206
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
207
+ </edge>
208
+ <edge id="e5" source="HOST-4490" target="HOST-2703">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1690491486</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.841796875</data>
213
+ <data key="e_suspicion_score">0.841796875</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Disrupted</data>
220
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
221
+ </edge>
222
+ <edge id="e6" source="HOST-2703" target="HOST-4490">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1690491486</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.841796875</data>
227
+ <data key="e_suspicion_score">0.841796875</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Disrupted</data>
234
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
235
+ </edge>
236
+ <edge id="e7" source="62043410-1500-11ee-9c07-0f6b4b953b28" target="HOST-2703">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1690491486</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.841796875</data>
241
+ <data key="e_suspicion_score">0.841796875</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Disrupted</data>
248
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
249
+ </edge>
250
+ <edge id="e8" source="HOST-2703" target="62043410-1500-11ee-9c07-0f6b4b953b28">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1690491486</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.841796875</data>
255
+ <data key="e_suspicion_score">0.841796875</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Disrupted</data>
262
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
263
+ </edge>
264
+ <edge id="e9" source="7844c532-062a-11ee-9a0c-b9f8978d847e" target="HOST-2773">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1690491486</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.841796875</data>
269
+ <data key="e_suspicion_score">0.841796875</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Disrupted</data>
276
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
277
+ </edge>
278
+ <edge id="e10" source="HOST-2773" target="7844c532-062a-11ee-9a0c-b9f8978d847e">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1690491486</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.841796875</data>
283
+ <data key="e_suspicion_score">0.841796875</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Disrupted</data>
290
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
291
+ </edge>
292
+ <edge id="e11" source="62043410-1500-11ee-9c07-0f6b4b953b28" target="HOST-2773">
293
+ <data key="e_type">INCIDENT_LINK</data>
294
+ <data key="e_timestamp">1690491486</data>
295
+ <data key="e_label_binary">malicious</data>
296
+ <data key="e_label_confidence">0.841796875</data>
297
+ <data key="e_suspicion_score">0.841796875</data>
298
+ <data key="e_mo_name">Data Theft</data>
299
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
300
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
301
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
302
+ <data key="e_lifecycle_stage">complete-mission</data>
303
+ <data key="e_disposition">Disrupted</data>
304
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
305
+ </edge>
306
+ <edge id="e12" source="HOST-2773" target="62043410-1500-11ee-9c07-0f6b4b953b28">
307
+ <data key="e_type">INCIDENT_LINK</data>
308
+ <data key="e_timestamp">1690491486</data>
309
+ <data key="e_label_binary">malicious</data>
310
+ <data key="e_label_confidence">0.841796875</data>
311
+ <data key="e_suspicion_score">0.841796875</data>
312
+ <data key="e_mo_name">Data Theft</data>
313
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
314
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
315
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
316
+ <data key="e_lifecycle_stage">complete-mission</data>
317
+ <data key="e_disposition">Disrupted</data>
318
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
319
+ </edge>
320
+ <edge id="e13" source="HOST-5747" target="HOST-2823">
321
+ <data key="e_type">INCIDENT_LINK</data>
322
+ <data key="e_timestamp">1690491486</data>
323
+ <data key="e_label_binary">malicious</data>
324
+ <data key="e_label_confidence">0.841796875</data>
325
+ <data key="e_suspicion_score">0.841796875</data>
326
+ <data key="e_mo_name">Data Theft</data>
327
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
328
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
329
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
330
+ <data key="e_lifecycle_stage">complete-mission</data>
331
+ <data key="e_disposition">Disrupted</data>
332
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
333
+ </edge>
334
+ <edge id="e14" source="HOST-2823" target="HOST-5747">
335
+ <data key="e_type">INCIDENT_LINK</data>
336
+ <data key="e_timestamp">1690491486</data>
337
+ <data key="e_label_binary">malicious</data>
338
+ <data key="e_label_confidence">0.841796875</data>
339
+ <data key="e_suspicion_score">0.841796875</data>
340
+ <data key="e_mo_name">Data Theft</data>
341
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
342
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
343
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
344
+ <data key="e_lifecycle_stage">complete-mission</data>
345
+ <data key="e_disposition">Disrupted</data>
346
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
347
+ </edge>
348
+ <edge id="e15" source="HOST-2706" target="76d244b0-0aa4-11ee-9b9e-a7fb665fc5e8">
349
+ <data key="e_type">INCIDENT_LINK</data>
350
+ <data key="e_timestamp">1690491486</data>
351
+ <data key="e_label_binary">malicious</data>
352
+ <data key="e_label_confidence">0.841796875</data>
353
+ <data key="e_suspicion_score">0.841796875</data>
354
+ <data key="e_mo_name">Data Theft</data>
355
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
356
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
357
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
358
+ <data key="e_lifecycle_stage">complete-mission</data>
359
+ <data key="e_disposition">Disrupted</data>
360
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
361
+ </edge>
362
+ <edge id="e16" source="76d244b0-0aa4-11ee-9b9e-a7fb665fc5e8" target="HOST-2834">
363
+ <data key="e_type">INCIDENT_LINK</data>
364
+ <data key="e_timestamp">1690491486</data>
365
+ <data key="e_label_binary">malicious</data>
366
+ <data key="e_label_confidence">0.841796875</data>
367
+ <data key="e_suspicion_score">0.841796875</data>
368
+ <data key="e_mo_name">Data Theft</data>
369
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
370
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
371
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
372
+ <data key="e_lifecycle_stage">complete-mission</data>
373
+ <data key="e_disposition">Disrupted</data>
374
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
375
+ </edge>
376
+ <edge id="e17" source="HOST-5747" target="HOST-2757">
377
+ <data key="e_type">INCIDENT_LINK</data>
378
+ <data key="e_timestamp">1690491486</data>
379
+ <data key="e_label_binary">malicious</data>
380
+ <data key="e_label_confidence">0.841796875</data>
381
+ <data key="e_suspicion_score">0.841796875</data>
382
+ <data key="e_mo_name">Data Theft</data>
383
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
384
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
385
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
386
+ <data key="e_lifecycle_stage">complete-mission</data>
387
+ <data key="e_disposition">Disrupted</data>
388
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
389
+ </edge>
390
+ <edge id="e18" source="HOST-2834" target="HOST-5747">
391
+ <data key="e_type">INCIDENT_LINK</data>
392
+ <data key="e_timestamp">1690491486</data>
393
+ <data key="e_label_binary">malicious</data>
394
+ <data key="e_label_confidence">0.841796875</data>
395
+ <data key="e_suspicion_score">0.841796875</data>
396
+ <data key="e_mo_name">Data Theft</data>
397
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
398
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
399
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
400
+ <data key="e_lifecycle_stage">complete-mission</data>
401
+ <data key="e_disposition">Disrupted</data>
402
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
403
+ </edge>
404
+ <edge id="e19" source="HOST-5747" target="HOST-2834">
405
+ <data key="e_type">INCIDENT_LINK</data>
406
+ <data key="e_timestamp">1690491486</data>
407
+ <data key="e_label_binary">malicious</data>
408
+ <data key="e_label_confidence">0.841796875</data>
409
+ <data key="e_suspicion_score">0.841796875</data>
410
+ <data key="e_mo_name">Data Theft</data>
411
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
412
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
413
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
414
+ <data key="e_lifecycle_stage">complete-mission</data>
415
+ <data key="e_disposition">Disrupted</data>
416
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
417
+ </edge>
418
+ <edge id="e20" source="HOST-2757" target="HOST-5747">
419
+ <data key="e_type">INCIDENT_LINK</data>
420
+ <data key="e_timestamp">1690491486</data>
421
+ <data key="e_label_binary">malicious</data>
422
+ <data key="e_label_confidence">0.841796875</data>
423
+ <data key="e_suspicion_score">0.841796875</data>
424
+ <data key="e_mo_name">Data Theft</data>
425
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
426
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
427
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
428
+ <data key="e_lifecycle_stage">complete-mission</data>
429
+ <data key="e_disposition">Disrupted</data>
430
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
431
+ </edge>
432
+ <edge id="e21" source="HOST-3716" target="HOST-2706">
433
+ <data key="e_type">INCIDENT_LINK</data>
434
+ <data key="e_timestamp">1690491486</data>
435
+ <data key="e_label_binary">malicious</data>
436
+ <data key="e_label_confidence">0.841796875</data>
437
+ <data key="e_suspicion_score">0.841796875</data>
438
+ <data key="e_mo_name">Data Theft</data>
439
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
440
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
441
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
442
+ <data key="e_lifecycle_stage">complete-mission</data>
443
+ <data key="e_disposition">Disrupted</data>
444
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
445
+ </edge>
446
+ <edge id="e22" source="HOST-2706" target="HOST-3716">
447
+ <data key="e_type">INCIDENT_LINK</data>
448
+ <data key="e_timestamp">1690491486</data>
449
+ <data key="e_label_binary">malicious</data>
450
+ <data key="e_label_confidence">0.841796875</data>
451
+ <data key="e_suspicion_score">0.841796875</data>
452
+ <data key="e_mo_name">Data Theft</data>
453
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
454
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
455
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
456
+ <data key="e_lifecycle_stage">complete-mission</data>
457
+ <data key="e_disposition">Disrupted</data>
458
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
459
+ </edge>
460
+ <edge id="e23" source="HOST-3458" target="HOST-2706">
461
+ <data key="e_type">INCIDENT_LINK</data>
462
+ <data key="e_timestamp">1690491486</data>
463
+ <data key="e_label_binary">malicious</data>
464
+ <data key="e_label_confidence">0.841796875</data>
465
+ <data key="e_suspicion_score">0.841796875</data>
466
+ <data key="e_mo_name">Data Theft</data>
467
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
468
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
469
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
470
+ <data key="e_lifecycle_stage">complete-mission</data>
471
+ <data key="e_disposition">Disrupted</data>
472
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
473
+ </edge>
474
+ <edge id="e24" source="HOST-2706" target="HOST-3458">
475
+ <data key="e_type">INCIDENT_LINK</data>
476
+ <data key="e_timestamp">1690491486</data>
477
+ <data key="e_label_binary">malicious</data>
478
+ <data key="e_label_confidence">0.841796875</data>
479
+ <data key="e_suspicion_score">0.841796875</data>
480
+ <data key="e_mo_name">Data Theft</data>
481
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
482
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
483
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
484
+ <data key="e_lifecycle_stage">complete-mission</data>
485
+ <data key="e_disposition">Disrupted</data>
486
+ <data key="e_incident_id">49096700-2cc0-11ee-9ea2-17c9a8b72baa</data>
487
+ </edge>
488
+ </graph>
489
+ </graphml>
graph/incidents_graphml/4/49098040-d383-11ee-8aee-79d3d013c637.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="19ffab32-066a-11ee-904d-db08e2329d95">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.31.240</data>
35
+ <data key="n_hostname">100.64.31.240</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.27.202.53</data>
43
+ <data key="n_hostname">172.27.202.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="19ffab32-066a-11ee-904d-db08e2329d95" target="HOST-2703">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708827131</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">49098040-d383-11ee-8aee-79d3d013c637</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/490a89e0-6fe7-11ee-bec7-efacac475e54.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b4188043-6f77-11ee-a785-95ebf72e2801">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.63.27</data>
35
+ <data key="n_hostname">100.64.63.27</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.38.152</data>
43
+ <data key="n_hostname">172.18.38.152</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="b4188043-6f77-11ee-a785-95ebf72e2801" target="HOST-2844">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697874964</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">490a89e0-6fe7-11ee-bec7-efacac475e54</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/490bfd10-676e-11ee-acda-6b17f6d60989.graphml ADDED
@@ -0,0 +1,841 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9e3016c5-0fab-11ee-bf8c-81769f9f73a8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.34.178</data>
35
+ <data key="n_hostname">USER-0015-1303.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.54.66</data>
43
+ <data key="n_hostname">172.24.54.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="7ae96220-4c64-11ee-ba45-e15e5d7b4f5f">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.34.179</data>
51
+ <data key="n_hostname">100.64.34.179</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="e6780b70-2add-11ee-a333-fbd09b27d852">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.34.180</data>
59
+ <data key="n_hostname">100.64.34.180</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.4375</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="ca1771b2-412a-11ee-9889-e7cce85e3916">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.34.181</data>
67
+ <data key="n_hostname">100.64.34.181</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.7890625</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">172.25.222.10</data>
75
+ <data key="n_hostname">172.25.222.10</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.9208984375</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="7657c3a0-5bdc-11ee-8cb7-d728671df62b">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.19.108</data>
83
+ <data key="n_hostname">100.64.19.108</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.4375</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="48f8d990-078f-11ee-b083-01471e2c7862">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.26.89</data>
91
+ <data key="n_hostname">100.64.26.89</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.71875</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="8e702451-0c13-11ee-b585-4dd8740efc4e">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.34.182</data>
99
+ <data key="n_hostname">100.64.34.182</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="0a8f09b0-0792-11ee-9293-95a29e9874f3">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.34.183</data>
107
+ <data key="n_hostname">100.64.34.183</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.71875</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="d03dd283-0798-11ee-bec9-bd41090a2a4e">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.20.217</data>
115
+ <data key="n_hostname">100.64.20.217</data>
116
+ <data key="n_set_roles">["Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.578125</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">172.21.61.66</data>
123
+ <data key="n_hostname">172.21.61.66</data>
124
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.71875</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="e714b0b4-062a-11ee-9792-13ac4ddb104c">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.34.184</data>
131
+ <data key="n_hostname">100.64.34.184</data>
132
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
133
+ <data key="n_suspicion_score">0.71875</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="a1e52331-278b-11ee-83d6-a9db21a53534">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.34.185</data>
139
+ <data key="n_hostname">100.64.34.185</data>
140
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
141
+ <data key="n_suspicion_score">0.71875</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <node id="8aab8d40-674f-11ee-b865-d3bc8ba6b5af">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.34.186</data>
147
+ <data key="n_hostname">100.64.34.186</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.578125</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="4415e821-062f-11ee-afbe-3f6ae08a44ca">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.34.187</data>
155
+ <data key="n_hostname">100.64.34.187</data>
156
+ <data key="n_set_roles">["Exploiting Host"]</data>
157
+ <data key="n_suspicion_score">0.578125</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="e1025f32-0c9a-11ee-a19b-b5cc42a65fd7">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.25.27</data>
163
+ <data key="n_hostname">100.64.25.27</data>
164
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
165
+ <data key="n_suspicion_score">0.71875</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">172.23.168.229</data>
171
+ <data key="n_hostname">172.23.168.229</data>
172
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
173
+ <data key="n_suspicion_score">0.71875</data>
174
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
175
+ </node>
176
+ <node id="dd402a64-0634-11ee-9d4e-c51fecad84f7">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">100.64.34.188</data>
179
+ <data key="n_hostname">100.64.34.188</data>
180
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
181
+ <data key="n_suspicion_score">0.71875</data>
182
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
183
+ </node>
184
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">172.29.1.127</data>
187
+ <data key="n_hostname">172.29.1.127</data>
188
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
189
+ <data key="n_suspicion_score">0.71875</data>
190
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
191
+ </node>
192
+ <node id="e20ddca2-06c4-11ee-a727-d1c21320776d">
193
+ <data key="n_type">HOST</data>
194
+ <data key="n_ip">100.64.34.189</data>
195
+ <data key="n_hostname">100.64.34.189</data>
196
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
197
+ <data key="n_suspicion_score">0.71875</data>
198
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
199
+ </node>
200
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
201
+ <data key="n_type">HOST</data>
202
+ <data key="n_ip">172.24.217.8</data>
203
+ <data key="n_hostname">172.24.217.8</data>
204
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
205
+ <data key="n_suspicion_score">0.71875</data>
206
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
207
+ </node>
208
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
209
+ <data key="n_type">HOST</data>
210
+ <data key="n_ip">172.27.202.53</data>
211
+ <data key="n_hostname">172.27.202.53</data>
212
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
213
+ <data key="n_suspicion_score">0.71875</data>
214
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
215
+ </node>
216
+ <node id="bfa38b32-350c-11ee-a042-bd687a574c51">
217
+ <data key="n_type">HOST</data>
218
+ <data key="n_ip">100.64.23.216</data>
219
+ <data key="n_hostname">100.64.23.216</data>
220
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
221
+ <data key="n_suspicion_score">0.7890625</data>
222
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
223
+ </node>
224
+ <edge id="e1" source="9e3016c5-0fab-11ee-bf8c-81769f9f73a8" target="HOST-2745">
225
+ <data key="e_type">INCIDENT_LINK</data>
226
+ <data key="e_timestamp">1696943386</data>
227
+ <data key="e_label_binary">malicious</data>
228
+ <data key="e_label_confidence">0.9208984375</data>
229
+ <data key="e_suspicion_score">0.9208984375</data>
230
+ <data key="e_mo_name">Data Theft</data>
231
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
232
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
233
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
234
+ <data key="e_lifecycle_stage">complete-mission</data>
235
+ <data key="e_disposition">Disrupted</data>
236
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
237
+ </edge>
238
+ <edge id="e2" source="HOST-2745" target="9e3016c5-0fab-11ee-bf8c-81769f9f73a8">
239
+ <data key="e_type">INCIDENT_LINK</data>
240
+ <data key="e_timestamp">1696943386</data>
241
+ <data key="e_label_binary">malicious</data>
242
+ <data key="e_label_confidence">0.9208984375</data>
243
+ <data key="e_suspicion_score">0.9208984375</data>
244
+ <data key="e_mo_name">Data Theft</data>
245
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
246
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
247
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
248
+ <data key="e_lifecycle_stage">complete-mission</data>
249
+ <data key="e_disposition">Disrupted</data>
250
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
251
+ </edge>
252
+ <edge id="e3" source="7ae96220-4c64-11ee-ba45-e15e5d7b4f5f" target="HOST-2745">
253
+ <data key="e_type">INCIDENT_LINK</data>
254
+ <data key="e_timestamp">1696943386</data>
255
+ <data key="e_label_binary">malicious</data>
256
+ <data key="e_label_confidence">0.9208984375</data>
257
+ <data key="e_suspicion_score">0.9208984375</data>
258
+ <data key="e_mo_name">Data Theft</data>
259
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
260
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
261
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
262
+ <data key="e_lifecycle_stage">complete-mission</data>
263
+ <data key="e_disposition">Disrupted</data>
264
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
265
+ </edge>
266
+ <edge id="e4" source="HOST-2745" target="7ae96220-4c64-11ee-ba45-e15e5d7b4f5f">
267
+ <data key="e_type">INCIDENT_LINK</data>
268
+ <data key="e_timestamp">1696943386</data>
269
+ <data key="e_label_binary">malicious</data>
270
+ <data key="e_label_confidence">0.9208984375</data>
271
+ <data key="e_suspicion_score">0.9208984375</data>
272
+ <data key="e_mo_name">Data Theft</data>
273
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
274
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
275
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
276
+ <data key="e_lifecycle_stage">complete-mission</data>
277
+ <data key="e_disposition">Disrupted</data>
278
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
279
+ </edge>
280
+ <edge id="e5" source="e6780b70-2add-11ee-a333-fbd09b27d852" target="HOST-2745">
281
+ <data key="e_type">INCIDENT_LINK</data>
282
+ <data key="e_timestamp">1696943386</data>
283
+ <data key="e_label_binary">malicious</data>
284
+ <data key="e_label_confidence">0.9208984375</data>
285
+ <data key="e_suspicion_score">0.9208984375</data>
286
+ <data key="e_mo_name">Data Theft</data>
287
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
288
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
289
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
290
+ <data key="e_lifecycle_stage">complete-mission</data>
291
+ <data key="e_disposition">Disrupted</data>
292
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
293
+ </edge>
294
+ <edge id="e6" source="HOST-2745" target="e6780b70-2add-11ee-a333-fbd09b27d852">
295
+ <data key="e_type">INCIDENT_LINK</data>
296
+ <data key="e_timestamp">1696943386</data>
297
+ <data key="e_label_binary">malicious</data>
298
+ <data key="e_label_confidence">0.9208984375</data>
299
+ <data key="e_suspicion_score">0.9208984375</data>
300
+ <data key="e_mo_name">Data Theft</data>
301
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
302
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
303
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
304
+ <data key="e_lifecycle_stage">complete-mission</data>
305
+ <data key="e_disposition">Disrupted</data>
306
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
307
+ </edge>
308
+ <edge id="e7" source="ca1771b2-412a-11ee-9889-e7cce85e3916" target="HOST-2768">
309
+ <data key="e_type">INCIDENT_LINK</data>
310
+ <data key="e_timestamp">1696943386</data>
311
+ <data key="e_label_binary">malicious</data>
312
+ <data key="e_label_confidence">0.9208984375</data>
313
+ <data key="e_suspicion_score">0.9208984375</data>
314
+ <data key="e_mo_name">Data Theft</data>
315
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
316
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
317
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
318
+ <data key="e_lifecycle_stage">complete-mission</data>
319
+ <data key="e_disposition">Disrupted</data>
320
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
321
+ </edge>
322
+ <edge id="e8" source="HOST-2768" target="ca1771b2-412a-11ee-9889-e7cce85e3916">
323
+ <data key="e_type">INCIDENT_LINK</data>
324
+ <data key="e_timestamp">1696943386</data>
325
+ <data key="e_label_binary">malicious</data>
326
+ <data key="e_label_confidence">0.9208984375</data>
327
+ <data key="e_suspicion_score">0.9208984375</data>
328
+ <data key="e_mo_name">Data Theft</data>
329
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
330
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
331
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
332
+ <data key="e_lifecycle_stage">complete-mission</data>
333
+ <data key="e_disposition">Disrupted</data>
334
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
335
+ </edge>
336
+ <edge id="e9" source="HOST-4391" target="HOST-2768">
337
+ <data key="e_type">INCIDENT_LINK</data>
338
+ <data key="e_timestamp">1696943386</data>
339
+ <data key="e_label_binary">malicious</data>
340
+ <data key="e_label_confidence">0.9208984375</data>
341
+ <data key="e_suspicion_score">0.9208984375</data>
342
+ <data key="e_mo_name">Data Theft</data>
343
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
344
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
345
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
346
+ <data key="e_lifecycle_stage">complete-mission</data>
347
+ <data key="e_disposition">Disrupted</data>
348
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
349
+ </edge>
350
+ <edge id="e10" source="HOST-2768" target="HOST-4391">
351
+ <data key="e_type">INCIDENT_LINK</data>
352
+ <data key="e_timestamp">1696943386</data>
353
+ <data key="e_label_binary">malicious</data>
354
+ <data key="e_label_confidence">0.9208984375</data>
355
+ <data key="e_suspicion_score">0.9208984375</data>
356
+ <data key="e_mo_name">Data Theft</data>
357
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
358
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
359
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
360
+ <data key="e_lifecycle_stage">complete-mission</data>
361
+ <data key="e_disposition">Disrupted</data>
362
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
363
+ </edge>
364
+ <edge id="e11" source="HOST-2768" target="HOST-6130">
365
+ <data key="e_type">INCIDENT_LINK</data>
366
+ <data key="e_timestamp">1696943386</data>
367
+ <data key="e_label_binary">malicious</data>
368
+ <data key="e_label_confidence">0.9208984375</data>
369
+ <data key="e_suspicion_score">0.9208984375</data>
370
+ <data key="e_mo_name">Data Theft</data>
371
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
372
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
373
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
374
+ <data key="e_lifecycle_stage">complete-mission</data>
375
+ <data key="e_disposition">Disrupted</data>
376
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
377
+ </edge>
378
+ <edge id="e12" source="HOST-6130" target="HOST-2768">
379
+ <data key="e_type">INCIDENT_LINK</data>
380
+ <data key="e_timestamp">1696943386</data>
381
+ <data key="e_label_binary">malicious</data>
382
+ <data key="e_label_confidence">0.9208984375</data>
383
+ <data key="e_suspicion_score">0.9208984375</data>
384
+ <data key="e_mo_name">Data Theft</data>
385
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
386
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
387
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
388
+ <data key="e_lifecycle_stage">complete-mission</data>
389
+ <data key="e_disposition">Disrupted</data>
390
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
391
+ </edge>
392
+ <edge id="e13" source="8e702451-0c13-11ee-b585-4dd8740efc4e" target="HOST-2768">
393
+ <data key="e_type">INCIDENT_LINK</data>
394
+ <data key="e_timestamp">1696943386</data>
395
+ <data key="e_label_binary">malicious</data>
396
+ <data key="e_label_confidence">0.9208984375</data>
397
+ <data key="e_suspicion_score">0.9208984375</data>
398
+ <data key="e_mo_name">Data Theft</data>
399
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
400
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
401
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
402
+ <data key="e_lifecycle_stage">complete-mission</data>
403
+ <data key="e_disposition">Disrupted</data>
404
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
405
+ </edge>
406
+ <edge id="e14" source="HOST-2768" target="8e702451-0c13-11ee-b585-4dd8740efc4e">
407
+ <data key="e_type">INCIDENT_LINK</data>
408
+ <data key="e_timestamp">1696943386</data>
409
+ <data key="e_label_binary">malicious</data>
410
+ <data key="e_label_confidence">0.9208984375</data>
411
+ <data key="e_suspicion_score">0.9208984375</data>
412
+ <data key="e_mo_name">Data Theft</data>
413
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
414
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
415
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
416
+ <data key="e_lifecycle_stage">complete-mission</data>
417
+ <data key="e_disposition">Disrupted</data>
418
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
419
+ </edge>
420
+ <edge id="e15" source="0a8f09b0-0792-11ee-9293-95a29e9874f3" target="HOST-2768">
421
+ <data key="e_type">INCIDENT_LINK</data>
422
+ <data key="e_timestamp">1696943386</data>
423
+ <data key="e_label_binary">malicious</data>
424
+ <data key="e_label_confidence">0.9208984375</data>
425
+ <data key="e_suspicion_score">0.9208984375</data>
426
+ <data key="e_mo_name">Data Theft</data>
427
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
428
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
429
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
430
+ <data key="e_lifecycle_stage">complete-mission</data>
431
+ <data key="e_disposition">Disrupted</data>
432
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
433
+ </edge>
434
+ <edge id="e16" source="HOST-2768" target="0a8f09b0-0792-11ee-9293-95a29e9874f3">
435
+ <data key="e_type">INCIDENT_LINK</data>
436
+ <data key="e_timestamp">1696943386</data>
437
+ <data key="e_label_binary">malicious</data>
438
+ <data key="e_label_confidence">0.9208984375</data>
439
+ <data key="e_suspicion_score">0.9208984375</data>
440
+ <data key="e_mo_name">Data Theft</data>
441
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
442
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
443
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
444
+ <data key="e_lifecycle_stage">complete-mission</data>
445
+ <data key="e_disposition">Disrupted</data>
446
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
447
+ </edge>
448
+ <edge id="e17" source="HOST-4578" target="HOST-2768">
449
+ <data key="e_type">INCIDENT_LINK</data>
450
+ <data key="e_timestamp">1696943386</data>
451
+ <data key="e_label_binary">malicious</data>
452
+ <data key="e_label_confidence">0.9208984375</data>
453
+ <data key="e_suspicion_score">0.9208984375</data>
454
+ <data key="e_mo_name">Data Theft</data>
455
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
456
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
457
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
458
+ <data key="e_lifecycle_stage">complete-mission</data>
459
+ <data key="e_disposition">Disrupted</data>
460
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
461
+ </edge>
462
+ <edge id="e18" source="HOST-2768" target="HOST-4578">
463
+ <data key="e_type">INCIDENT_LINK</data>
464
+ <data key="e_timestamp">1696943386</data>
465
+ <data key="e_label_binary">malicious</data>
466
+ <data key="e_label_confidence">0.9208984375</data>
467
+ <data key="e_suspicion_score">0.9208984375</data>
468
+ <data key="e_mo_name">Data Theft</data>
469
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
470
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
471
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
472
+ <data key="e_lifecycle_stage">complete-mission</data>
473
+ <data key="e_disposition">Disrupted</data>
474
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
475
+ </edge>
476
+ <edge id="e19" source="HOST-4578" target="HOST-2709">
477
+ <data key="e_type">INCIDENT_LINK</data>
478
+ <data key="e_timestamp">1696943386</data>
479
+ <data key="e_label_binary">malicious</data>
480
+ <data key="e_label_confidence">0.9208984375</data>
481
+ <data key="e_suspicion_score">0.9208984375</data>
482
+ <data key="e_mo_name">Data Theft</data>
483
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
484
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
485
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
486
+ <data key="e_lifecycle_stage">complete-mission</data>
487
+ <data key="e_disposition">Disrupted</data>
488
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
489
+ </edge>
490
+ <edge id="e20" source="e714b0b4-062a-11ee-9792-13ac4ddb104c" target="HOST-2768">
491
+ <data key="e_type">INCIDENT_LINK</data>
492
+ <data key="e_timestamp">1696943386</data>
493
+ <data key="e_label_binary">malicious</data>
494
+ <data key="e_label_confidence">0.9208984375</data>
495
+ <data key="e_suspicion_score">0.9208984375</data>
496
+ <data key="e_mo_name">Data Theft</data>
497
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
498
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
499
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
500
+ <data key="e_lifecycle_stage">complete-mission</data>
501
+ <data key="e_disposition">Disrupted</data>
502
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
503
+ </edge>
504
+ <edge id="e21" source="HOST-2768" target="e714b0b4-062a-11ee-9792-13ac4ddb104c">
505
+ <data key="e_type">INCIDENT_LINK</data>
506
+ <data key="e_timestamp">1696943386</data>
507
+ <data key="e_label_binary">malicious</data>
508
+ <data key="e_label_confidence">0.9208984375</data>
509
+ <data key="e_suspicion_score">0.9208984375</data>
510
+ <data key="e_mo_name">Data Theft</data>
511
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
512
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
513
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
514
+ <data key="e_lifecycle_stage">complete-mission</data>
515
+ <data key="e_disposition">Disrupted</data>
516
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
517
+ </edge>
518
+ <edge id="e22" source="9e3016c5-0fab-11ee-bf8c-81769f9f73a8" target="HOST-2768">
519
+ <data key="e_type">INCIDENT_LINK</data>
520
+ <data key="e_timestamp">1696943386</data>
521
+ <data key="e_label_binary">malicious</data>
522
+ <data key="e_label_confidence">0.9208984375</data>
523
+ <data key="e_suspicion_score">0.9208984375</data>
524
+ <data key="e_mo_name">Data Theft</data>
525
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
526
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
527
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
528
+ <data key="e_lifecycle_stage">complete-mission</data>
529
+ <data key="e_disposition">Disrupted</data>
530
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
531
+ </edge>
532
+ <edge id="e23" source="HOST-2768" target="9e3016c5-0fab-11ee-bf8c-81769f9f73a8">
533
+ <data key="e_type">INCIDENT_LINK</data>
534
+ <data key="e_timestamp">1696943386</data>
535
+ <data key="e_label_binary">malicious</data>
536
+ <data key="e_label_confidence">0.9208984375</data>
537
+ <data key="e_suspicion_score">0.9208984375</data>
538
+ <data key="e_mo_name">Data Theft</data>
539
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
540
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
541
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
542
+ <data key="e_lifecycle_stage">complete-mission</data>
543
+ <data key="e_disposition">Disrupted</data>
544
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
545
+ </edge>
546
+ <edge id="e24" source="a1e52331-278b-11ee-83d6-a9db21a53534" target="HOST-2745">
547
+ <data key="e_type">INCIDENT_LINK</data>
548
+ <data key="e_timestamp">1696943386</data>
549
+ <data key="e_label_binary">malicious</data>
550
+ <data key="e_label_confidence">0.9208984375</data>
551
+ <data key="e_suspicion_score">0.9208984375</data>
552
+ <data key="e_mo_name">Data Theft</data>
553
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
554
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
555
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
556
+ <data key="e_lifecycle_stage">complete-mission</data>
557
+ <data key="e_disposition">Disrupted</data>
558
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
559
+ </edge>
560
+ <edge id="e25" source="HOST-2745" target="a1e52331-278b-11ee-83d6-a9db21a53534">
561
+ <data key="e_type">INCIDENT_LINK</data>
562
+ <data key="e_timestamp">1696943386</data>
563
+ <data key="e_label_binary">malicious</data>
564
+ <data key="e_label_confidence">0.9208984375</data>
565
+ <data key="e_suspicion_score">0.9208984375</data>
566
+ <data key="e_mo_name">Data Theft</data>
567
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
568
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
569
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
570
+ <data key="e_lifecycle_stage">complete-mission</data>
571
+ <data key="e_disposition">Disrupted</data>
572
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
573
+ </edge>
574
+ <edge id="e26" source="8aab8d40-674f-11ee-b865-d3bc8ba6b5af" target="HOST-2768">
575
+ <data key="e_type">INCIDENT_LINK</data>
576
+ <data key="e_timestamp">1696943386</data>
577
+ <data key="e_label_binary">malicious</data>
578
+ <data key="e_label_confidence">0.9208984375</data>
579
+ <data key="e_suspicion_score">0.9208984375</data>
580
+ <data key="e_mo_name">Data Theft</data>
581
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
582
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
583
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
584
+ <data key="e_lifecycle_stage">complete-mission</data>
585
+ <data key="e_disposition">Disrupted</data>
586
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
587
+ </edge>
588
+ <edge id="e27" source="HOST-2768" target="8aab8d40-674f-11ee-b865-d3bc8ba6b5af">
589
+ <data key="e_type">INCIDENT_LINK</data>
590
+ <data key="e_timestamp">1696943386</data>
591
+ <data key="e_label_binary">malicious</data>
592
+ <data key="e_label_confidence">0.9208984375</data>
593
+ <data key="e_suspicion_score">0.9208984375</data>
594
+ <data key="e_mo_name">Data Theft</data>
595
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
596
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
597
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
598
+ <data key="e_lifecycle_stage">complete-mission</data>
599
+ <data key="e_disposition">Disrupted</data>
600
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
601
+ </edge>
602
+ <edge id="e28" source="4415e821-062f-11ee-afbe-3f6ae08a44ca" target="HOST-2745">
603
+ <data key="e_type">INCIDENT_LINK</data>
604
+ <data key="e_timestamp">1696943386</data>
605
+ <data key="e_label_binary">malicious</data>
606
+ <data key="e_label_confidence">0.9208984375</data>
607
+ <data key="e_suspicion_score">0.9208984375</data>
608
+ <data key="e_mo_name">Data Theft</data>
609
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
610
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
611
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
612
+ <data key="e_lifecycle_stage">complete-mission</data>
613
+ <data key="e_disposition">Disrupted</data>
614
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
615
+ </edge>
616
+ <edge id="e29" source="HOST-2745" target="4415e821-062f-11ee-afbe-3f6ae08a44ca">
617
+ <data key="e_type">INCIDENT_LINK</data>
618
+ <data key="e_timestamp">1696943386</data>
619
+ <data key="e_label_binary">malicious</data>
620
+ <data key="e_label_confidence">0.9208984375</data>
621
+ <data key="e_suspicion_score">0.9208984375</data>
622
+ <data key="e_mo_name">Data Theft</data>
623
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
624
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
625
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
626
+ <data key="e_lifecycle_stage">complete-mission</data>
627
+ <data key="e_disposition">Disrupted</data>
628
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
629
+ </edge>
630
+ <edge id="e30" source="HOST-5165" target="HOST-2768">
631
+ <data key="e_type">INCIDENT_LINK</data>
632
+ <data key="e_timestamp">1696943386</data>
633
+ <data key="e_label_binary">malicious</data>
634
+ <data key="e_label_confidence">0.9208984375</data>
635
+ <data key="e_suspicion_score">0.9208984375</data>
636
+ <data key="e_mo_name">Data Theft</data>
637
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
638
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
639
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
640
+ <data key="e_lifecycle_stage">complete-mission</data>
641
+ <data key="e_disposition">Disrupted</data>
642
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
643
+ </edge>
644
+ <edge id="e31" source="HOST-2768" target="HOST-5165">
645
+ <data key="e_type">INCIDENT_LINK</data>
646
+ <data key="e_timestamp">1696943386</data>
647
+ <data key="e_label_binary">malicious</data>
648
+ <data key="e_label_confidence">0.9208984375</data>
649
+ <data key="e_suspicion_score">0.9208984375</data>
650
+ <data key="e_mo_name">Data Theft</data>
651
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
652
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
653
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
654
+ <data key="e_lifecycle_stage">complete-mission</data>
655
+ <data key="e_disposition">Disrupted</data>
656
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
657
+ </edge>
658
+ <edge id="e32" source="9e3016c5-0fab-11ee-bf8c-81769f9f73a8" target="HOST-2865">
659
+ <data key="e_type">INCIDENT_LINK</data>
660
+ <data key="e_timestamp">1696943386</data>
661
+ <data key="e_label_binary">malicious</data>
662
+ <data key="e_label_confidence">0.9208984375</data>
663
+ <data key="e_suspicion_score">0.9208984375</data>
664
+ <data key="e_mo_name">Data Theft</data>
665
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
666
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
667
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
668
+ <data key="e_lifecycle_stage">complete-mission</data>
669
+ <data key="e_disposition">Disrupted</data>
670
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
671
+ </edge>
672
+ <edge id="e33" source="dd402a64-0634-11ee-9d4e-c51fecad84f7" target="HOST-2768">
673
+ <data key="e_type">INCIDENT_LINK</data>
674
+ <data key="e_timestamp">1696943386</data>
675
+ <data key="e_label_binary">malicious</data>
676
+ <data key="e_label_confidence">0.9208984375</data>
677
+ <data key="e_suspicion_score">0.9208984375</data>
678
+ <data key="e_mo_name">Data Theft</data>
679
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
680
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
681
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
682
+ <data key="e_lifecycle_stage">complete-mission</data>
683
+ <data key="e_disposition">Disrupted</data>
684
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
685
+ </edge>
686
+ <edge id="e34" source="HOST-2768" target="dd402a64-0634-11ee-9d4e-c51fecad84f7">
687
+ <data key="e_type">INCIDENT_LINK</data>
688
+ <data key="e_timestamp">1696943386</data>
689
+ <data key="e_label_binary">malicious</data>
690
+ <data key="e_label_confidence">0.9208984375</data>
691
+ <data key="e_suspicion_score">0.9208984375</data>
692
+ <data key="e_mo_name">Data Theft</data>
693
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
694
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
695
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
696
+ <data key="e_lifecycle_stage">complete-mission</data>
697
+ <data key="e_disposition">Disrupted</data>
698
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
699
+ </edge>
700
+ <edge id="e35" source="e6780b70-2add-11ee-a333-fbd09b27d852" target="HOST-2713">
701
+ <data key="e_type">INCIDENT_LINK</data>
702
+ <data key="e_timestamp">1696943386</data>
703
+ <data key="e_label_binary">malicious</data>
704
+ <data key="e_label_confidence">0.9208984375</data>
705
+ <data key="e_suspicion_score">0.9208984375</data>
706
+ <data key="e_mo_name">Data Theft</data>
707
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
708
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
709
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
710
+ <data key="e_lifecycle_stage">complete-mission</data>
711
+ <data key="e_disposition">Disrupted</data>
712
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
713
+ </edge>
714
+ <edge id="e36" source="e20ddca2-06c4-11ee-a727-d1c21320776d" target="HOST-2768">
715
+ <data key="e_type">INCIDENT_LINK</data>
716
+ <data key="e_timestamp">1696943386</data>
717
+ <data key="e_label_binary">malicious</data>
718
+ <data key="e_label_confidence">0.9208984375</data>
719
+ <data key="e_suspicion_score">0.9208984375</data>
720
+ <data key="e_mo_name">Data Theft</data>
721
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
722
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
723
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
724
+ <data key="e_lifecycle_stage">complete-mission</data>
725
+ <data key="e_disposition">Disrupted</data>
726
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
727
+ </edge>
728
+ <edge id="e37" source="HOST-2768" target="e20ddca2-06c4-11ee-a727-d1c21320776d">
729
+ <data key="e_type">INCIDENT_LINK</data>
730
+ <data key="e_timestamp">1696943386</data>
731
+ <data key="e_label_binary">malicious</data>
732
+ <data key="e_label_confidence">0.9208984375</data>
733
+ <data key="e_suspicion_score">0.9208984375</data>
734
+ <data key="e_mo_name">Data Theft</data>
735
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
736
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
737
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
738
+ <data key="e_lifecycle_stage">complete-mission</data>
739
+ <data key="e_disposition">Disrupted</data>
740
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
741
+ </edge>
742
+ <edge id="e38" source="a1e52331-278b-11ee-83d6-a9db21a53534" target="HOST-2731">
743
+ <data key="e_type">INCIDENT_LINK</data>
744
+ <data key="e_timestamp">1696943386</data>
745
+ <data key="e_label_binary">malicious</data>
746
+ <data key="e_label_confidence">0.9208984375</data>
747
+ <data key="e_suspicion_score">0.9208984375</data>
748
+ <data key="e_mo_name">Data Theft</data>
749
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
750
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
751
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
752
+ <data key="e_lifecycle_stage">complete-mission</data>
753
+ <data key="e_disposition">Disrupted</data>
754
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
755
+ </edge>
756
+ <edge id="e39" source="HOST-2703" target="HOST-4987">
757
+ <data key="e_type">INCIDENT_LINK</data>
758
+ <data key="e_timestamp">1696943386</data>
759
+ <data key="e_label_binary">malicious</data>
760
+ <data key="e_label_confidence">0.9208984375</data>
761
+ <data key="e_suspicion_score">0.9208984375</data>
762
+ <data key="e_mo_name">Data Theft</data>
763
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
764
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
765
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
766
+ <data key="e_lifecycle_stage">complete-mission</data>
767
+ <data key="e_disposition">Disrupted</data>
768
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
769
+ </edge>
770
+ <edge id="e40" source="HOST-2745" target="HOST-4987">
771
+ <data key="e_type">INCIDENT_LINK</data>
772
+ <data key="e_timestamp">1696943386</data>
773
+ <data key="e_label_binary">malicious</data>
774
+ <data key="e_label_confidence">0.9208984375</data>
775
+ <data key="e_suspicion_score">0.9208984375</data>
776
+ <data key="e_mo_name">Data Theft</data>
777
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
778
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
779
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
780
+ <data key="e_lifecycle_stage">complete-mission</data>
781
+ <data key="e_disposition">Disrupted</data>
782
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
783
+ </edge>
784
+ <edge id="e41" source="HOST-4987" target="HOST-2745">
785
+ <data key="e_type">INCIDENT_LINK</data>
786
+ <data key="e_timestamp">1696943386</data>
787
+ <data key="e_label_binary">malicious</data>
788
+ <data key="e_label_confidence">0.9208984375</data>
789
+ <data key="e_suspicion_score">0.9208984375</data>
790
+ <data key="e_mo_name">Data Theft</data>
791
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
792
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
793
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
794
+ <data key="e_lifecycle_stage">complete-mission</data>
795
+ <data key="e_disposition">Disrupted</data>
796
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
797
+ </edge>
798
+ <edge id="e42" source="9e3016c5-0fab-11ee-bf8c-81769f9f73a8" target="HOST-2709">
799
+ <data key="e_type">INCIDENT_LINK</data>
800
+ <data key="e_timestamp">1696943386</data>
801
+ <data key="e_label_binary">malicious</data>
802
+ <data key="e_label_confidence">0.9208984375</data>
803
+ <data key="e_suspicion_score">0.9208984375</data>
804
+ <data key="e_mo_name">Data Theft</data>
805
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
806
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
807
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
808
+ <data key="e_lifecycle_stage">complete-mission</data>
809
+ <data key="e_disposition">Disrupted</data>
810
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
811
+ </edge>
812
+ <edge id="e43" source="9e3016c5-0fab-11ee-bf8c-81769f9f73a8" target="HOST-2713">
813
+ <data key="e_type">INCIDENT_LINK</data>
814
+ <data key="e_timestamp">1696943386</data>
815
+ <data key="e_label_binary">malicious</data>
816
+ <data key="e_label_confidence">0.9208984375</data>
817
+ <data key="e_suspicion_score">0.9208984375</data>
818
+ <data key="e_mo_name">Data Theft</data>
819
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
820
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
821
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
822
+ <data key="e_lifecycle_stage">complete-mission</data>
823
+ <data key="e_disposition">Disrupted</data>
824
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
825
+ </edge>
826
+ <edge id="e44" source="0a8f09b0-0792-11ee-9293-95a29e9874f3" target="HOST-2703">
827
+ <data key="e_type">INCIDENT_LINK</data>
828
+ <data key="e_timestamp">1696943386</data>
829
+ <data key="e_label_binary">malicious</data>
830
+ <data key="e_label_confidence">0.9208984375</data>
831
+ <data key="e_suspicion_score">0.9208984375</data>
832
+ <data key="e_mo_name">Data Theft</data>
833
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
834
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
835
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
836
+ <data key="e_lifecycle_stage">complete-mission</data>
837
+ <data key="e_disposition">Disrupted</data>
838
+ <data key="e_incident_id">490bfd10-676e-11ee-acda-6b17f6d60989</data>
839
+ </edge>
840
+ </graph>
841
+ </graphml>
graph/incidents_graphml/4/490d46e0-850d-11ee-89b4-37c02fa13bd9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.40.149</data>
35
+ <data key="n_hostname">172.29.40.149</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="6086a723-84d2-11ee-800f-b537e9e44803">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.9.52</data>
43
+ <data key="n_hostname">100.64.9.52</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2834" target="6086a723-84d2-11ee-800f-b537e9e44803">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700200260</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">490d46e0-850d-11ee-89b4-37c02fa13bd9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/490f9cc0-631f-11ee-b6b8-b9a4d865fde2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5596dc42-0629-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.37.228</data>
35
+ <data key="n_hostname">100.64.37.228</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.168.48</data>
43
+ <data key="n_hostname">172.30.168.48</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-7339" target="HOST-2842">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696469651</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">490f9cc0-631f-11ee-b6b8-b9a4d865fde2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/4914ee10-331d-11ed-b7a7-43dc40721942.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2e3de200-0d47-11ed-9630-f9bf7dfe9f05">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">192.168.147.151</data>
35
+ <data key="n_hostname">192.168.147.151</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.9296875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="0d798eb4-1bee-11ed-9108-69d970162826">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">HOST-14470</data>
43
+ <data key="n_hostname">USER-0015-1751.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.9296875</data>
46
+ <data key="n_products">["Precinct","Umbrella","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="2e3de200-0d47-11ed-9630-f9bf7dfe9f05" target="0d798eb4-1bee-11ed-9108-69d970162826">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1663043639</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.9296875</data>
53
+ <data key="e_suspicion_score">0.9296875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">4914ee10-331d-11ed-b7a7-43dc40721942</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49151a40-0836-11ee-b8d0-013dce35746a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2be74f06-0625-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.19.46</data>
35
+ <data key="n_hostname">100.64.19.46</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.233.43</data>
43
+ <data key="n_hostname">172.16.233.43</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4360" target="HOST-2758">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686473974</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">49151a40-0836-11ee-b8d0-013dce35746a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49171290-30fe-11ef-82e2-b166e7a5de57.graphml ADDED
@@ -0,0 +1,221 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="cf67b0c7-2901-11ef-8b71-dd8359e7840d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.46.150</data>
35
+ <data key="n_hostname">100.64.46.150</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="59c1d061-28f4-11ef-aead-b741176e73de">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.191.229</data>
43
+ <data key="n_hostname">172.24.191.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="2fac0a76-28f4-11ef-a65d-2d26b03b63f9">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.21.179</data>
51
+ <data key="n_hostname">100.64.21.179</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="6577bbb3-28fc-11ef-a816-c17e11a63509">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.46.151</data>
59
+ <data key="n_hostname">100.64.46.151</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="776971e4-2f6b-11ef-88d3-bb4a48f2113c">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.46.152</data>
67
+ <data key="n_hostname">100.64.46.152</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="6947acd2-2e49-11ef-856f-adbfcc562a8b">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.21.25</data>
75
+ <data key="n_hostname">100.64.21.25</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.578125</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <edge id="e1" source="cf67b0c7-2901-11ef-8b71-dd8359e7840d" target="HOST-4705">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1719105417</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.7890625</data>
85
+ <data key="e_suspicion_score">0.7890625</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Disrupted</data>
92
+ <data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
93
+ </edge>
94
+ <edge id="e2" source="HOST-4705" target="cf67b0c7-2901-11ef-8b71-dd8359e7840d">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1719105417</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.7890625</data>
99
+ <data key="e_suspicion_score">0.7890625</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Disrupted</data>
106
+ <data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
107
+ </edge>
108
+ <edge id="e3" source="HOST-4705" target="2fac0a76-28f4-11ef-a65d-2d26b03b63f9">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1719105417</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.7890625</data>
113
+ <data key="e_suspicion_score">0.7890625</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Disrupted</data>
120
+ <data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
121
+ </edge>
122
+ <edge id="e4" source="2fac0a76-28f4-11ef-a65d-2d26b03b63f9" target="HOST-4705">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1719105417</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.7890625</data>
127
+ <data key="e_suspicion_score">0.7890625</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Disrupted</data>
134
+ <data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
135
+ </edge>
136
+ <edge id="e5" source="6577bbb3-28fc-11ef-a816-c17e11a63509" target="HOST-4705">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1719105417</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.7890625</data>
141
+ <data key="e_suspicion_score">0.7890625</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Disrupted</data>
148
+ <data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
149
+ </edge>
150
+ <edge id="e6" source="HOST-4705" target="6577bbb3-28fc-11ef-a816-c17e11a63509">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1719105417</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.7890625</data>
155
+ <data key="e_suspicion_score">0.7890625</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Disrupted</data>
162
+ <data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
163
+ </edge>
164
+ <edge id="e7" source="776971e4-2f6b-11ef-88d3-bb4a48f2113c" target="HOST-4705">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1719105417</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.7890625</data>
169
+ <data key="e_suspicion_score">0.7890625</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Disrupted</data>
176
+ <data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
177
+ </edge>
178
+ <edge id="e8" source="HOST-4705" target="776971e4-2f6b-11ef-88d3-bb4a48f2113c">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1719105417</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.7890625</data>
183
+ <data key="e_suspicion_score">0.7890625</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Disrupted</data>
190
+ <data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
191
+ </edge>
192
+ <edge id="e9" source="6947acd2-2e49-11ef-856f-adbfcc562a8b" target="HOST-4705">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1719105417</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.7890625</data>
197
+ <data key="e_suspicion_score">0.7890625</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
205
+ </edge>
206
+ <edge id="e10" source="HOST-4705" target="6947acd2-2e49-11ef-856f-adbfcc562a8b">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1719105417</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.7890625</data>
211
+ <data key="e_suspicion_score">0.7890625</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">49171290-30fe-11ef-82e2-b166e7a5de57</data>
219
+ </edge>
220
+ </graph>
221
+ </graphml>
graph/incidents_graphml/4/491932f0-5909-11ee-a459-5b20d657705e.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="70e94116-0627-11ee-ad3e-fda0da874cab">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.56.243</data>
43
+ <data key="n_hostname">100.64.56.243</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="HOST-9732">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695360691</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">491932f0-5909-11ee-a459-5b20d657705e</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/491b6370-dba2-11ed-8f69-23b0b50da3c2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a1c44121-9d88-11ed-9ba1-69c845a45d44">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.75.139</data>
35
+ <data key="n_hostname">100.64.75.139</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall"]</data>
39
+ </node>
40
+ <node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="a1c44121-9d88-11ed-9ba1-69c845a45d44" target="HOST-12749">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1681572557</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">491b6370-dba2-11ed-8f69-23b0b50da3c2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/491d0f50-be91-11ed-9416-c54055a72e53.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ec6c26d0-9d87-11ed-9ba1-69c845a45d44">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.75.177</data>
35
+ <data key="n_hostname">100.64.75.177</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
39
+ </node>
40
+ <node id="64604862-b9ee-11ed-8ab1-01931714985f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.79.186</data>
43
+ <data key="n_hostname">100.64.79.186</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13830" target="64604862-b9ee-11ed-8ab1-01931714985f">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1678376672</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">491d0f50-be91-11ed-9416-c54055a72e53</data>
61
+ </edge>
62
+ <edge id="e2" source="64604862-b9ee-11ed-8ab1-01931714985f" target="HOST-13830">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1678376672</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7890625</data>
67
+ <data key="e_suspicion_score">0.7890625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">491d0f50-be91-11ed-9416-c54055a72e53</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/4/491d3150-631f-11ee-b6b8-b9a4d865fde2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="336e6311-6306-11ee-a0f6-3ff0cce90972">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.40.242</data>
35
+ <data key="n_hostname">100.64.40.242</data>
36
+ <data key="n_set_roles">["Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.217.8</data>
43
+ <data key="n_hostname">172.24.217.8</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="336e6311-6306-11ee-a0f6-3ff0cce90972" target="HOST-2731">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696469651</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">491d3150-631f-11ee-b6b8-b9a4d865fde2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/491fa930-dba2-11ed-8f69-23b0b50da3c2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
39
+ </node>
40
+ <node id="a1c44121-9d88-11ed-9ba1-69c845a45d44">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.75.139</data>
43
+ <data key="n_hostname">100.64.75.139</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12749" target="HOST-13987">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1681572557</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">491fa930-dba2-11ed-8f69-23b0b50da3c2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49221150-d383-11ee-8aee-79d3d013c637.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.27.202.53</data>
35
+ <data key="n_hostname">172.27.202.53</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="19ffab32-066a-11ee-904d-db08e2329d95">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.31.240</data>
43
+ <data key="n_hostname">100.64.31.240</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2703" target="HOST-6139">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708827131</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">49221150-d383-11ee-8aee-79d3d013c637</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49222900-1f34-11ee-bd83-b52c9cbf0232.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="82db80b1-0639-11ee-9d16-b90ac473a2f2">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.34.131</data>
35
+ <data key="n_hostname">100.64.34.131</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="cdd3fa90-063c-11ee-bf36-a5053098164b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.234</data>
43
+ <data key="n_hostname">100.64.71.234</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="f5a73b53-09f1-11ee-a800-190966dcb66f">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.68.136</data>
51
+ <data key="n_hostname">100.64.68.136</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <edge id="e1" source="82db80b1-0639-11ee-9d16-b90ac473a2f2" target="HOST-12921">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1689001992</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">49222900-1f34-11ee-bd83-b52c9cbf0232</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-12921" target="82db80b1-0639-11ee-9d16-b90ac473a2f2">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1689001992</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">49222900-1f34-11ee-bd83-b52c9cbf0232</data>
83
+ </edge>
84
+ <edge id="e3" source="f5a73b53-09f1-11ee-a800-190966dcb66f" target="HOST-12921">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1689001992</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7</data>
89
+ <data key="e_suspicion_score">0.25</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Unprocessed</data>
96
+ <data key="e_incident_id">49222900-1f34-11ee-bd83-b52c9cbf0232</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-12921" target="f5a73b53-09f1-11ee-a800-190966dcb66f">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1689001992</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7</data>
103
+ <data key="e_suspicion_score">0.25</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Unprocessed</data>
110
+ <data key="e_incident_id">49222900-1f34-11ee-bd83-b52c9cbf0232</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/4/49236a80-f286-11ec-babd-d5ed2eda1ac6.graphml ADDED
@@ -0,0 +1,805 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e951f4f0-ea92-11ec-abf7-619673fe2558">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.79.153</data>
35
+ <data key="n_hostname">USER-0015-1853.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="dedebea0-ea91-11ec-abf7-619673fe2558">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.71.202</data>
51
+ <data key="n_hostname">USER-0015-1870.example.internal</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="f11addb0-ea91-11ec-90c7-eff83c975df3">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.74.55</data>
59
+ <data key="n_hostname">USER-0015-1871.example.internal</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="d35d04c5-ec20-11ec-8458-0365874c31b8">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.81.81</data>
67
+ <data key="n_hostname">100.64.81.81</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <node id="7b77b410-ea92-11ec-90c7-eff83c975df3">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.81.82</data>
75
+ <data key="n_hostname">USER-0015-1872.example.internal</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","Meraki"]</data>
79
+ </node>
80
+ <node id="067fdb10-ea92-11ec-90c7-eff83c975df3">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.77.247</data>
83
+ <data key="n_hostname">USER-0015-1873.example.internal</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","Meraki"]</data>
87
+ </node>
88
+ <node id="55b4cd80-ea92-11ec-abf7-619673fe2558">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.80.152</data>
91
+ <data key="n_hostname">USER-0015-1874.example.internal</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","Meraki"]</data>
95
+ </node>
96
+ <node id="723b4f10-ea9c-11ec-b0c9-e7fa908a3ccf">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.81.83</data>
99
+ <data key="n_hostname">USER-0015-1875.example.internal</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","Meraki"]</data>
103
+ </node>
104
+ <node id="fab5d1e0-ea91-11ec-abf7-619673fe2558">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.75.39</data>
107
+ <data key="n_hostname">USER-0015-1706.example.internal</data>
108
+ <data key="n_set_roles">["Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.25</data>
110
+ <data key="n_products">["Precinct","Meraki"]</data>
111
+ </node>
112
+ <node id="eea7a8e0-ea93-11ec-abf7-619673fe2558">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.71.193</data>
115
+ <data key="n_hostname">USER-0015-1876.example.internal</data>
116
+ <data key="n_set_roles">["Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.25</data>
118
+ <data key="n_products">["Precinct","Meraki"]</data>
119
+ </node>
120
+ <node id="03862310-ea92-11ec-90c7-eff83c975df3">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.81.84</data>
123
+ <data key="n_hostname">USER-0015-1877.example.internal</data>
124
+ <data key="n_set_roles">["Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.25</data>
126
+ <data key="n_products">["Precinct","Meraki"]</data>
127
+ </node>
128
+ <node id="2c39c0f0-ea92-11ec-90c7-eff83c975df3">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.72.182</data>
131
+ <data key="n_hostname">USER-0015-1639.example.internal</data>
132
+ <data key="n_set_roles">["Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.25</data>
134
+ <data key="n_products">["Precinct","Meraki"]</data>
135
+ </node>
136
+ <node id="182bdd30-ea94-11ec-90c7-eff83c975df3">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.71.165</data>
139
+ <data key="n_hostname">USER-0015-1878.example.internal</data>
140
+ <data key="n_set_roles">["Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.25</data>
142
+ <data key="n_products">["Precinct","Meraki"]</data>
143
+ </node>
144
+ <node id="06094b80-ea92-11ec-abf7-619673fe2558">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.73.120</data>
147
+ <data key="n_hostname">USER-0015-1661.example.internal</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.25</data>
150
+ <data key="n_products">["Precinct","Meraki"]</data>
151
+ </node>
152
+ <node id="34096b00-ea92-11ec-90c7-eff83c975df3">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.73.155</data>
155
+ <data key="n_hostname">USER-0015-1879.example.internal</data>
156
+ <data key="n_set_roles">["Exploiting Host"]</data>
157
+ <data key="n_suspicion_score">0.25</data>
158
+ <data key="n_products">["Precinct","Meraki"]</data>
159
+ </node>
160
+ <node id="6e6154c0-ea92-11ec-abf7-619673fe2558">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.72.241</data>
163
+ <data key="n_hostname">USER-0015-1880.example.internal</data>
164
+ <data key="n_set_roles">["Exploiting Host"]</data>
165
+ <data key="n_suspicion_score">0.25</data>
166
+ <data key="n_products">["Precinct","Meraki"]</data>
167
+ </node>
168
+ <node id="e0429460-ea91-11ec-abf7-619673fe2558">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">100.64.75.19</data>
171
+ <data key="n_hostname">USER-0015-1881.example.internal</data>
172
+ <data key="n_set_roles">["Exploiting Host"]</data>
173
+ <data key="n_suspicion_score">0.25</data>
174
+ <data key="n_products">["Precinct","Meraki"]</data>
175
+ </node>
176
+ <node id="0e2c6560-ea95-11ec-90c7-eff83c975df3">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">100.64.79.72</data>
179
+ <data key="n_hostname">USER-0015-1882.example.internal</data>
180
+ <data key="n_set_roles">["Exploiting Host"]</data>
181
+ <data key="n_suspicion_score">0.25</data>
182
+ <data key="n_products">["Precinct","Meraki"]</data>
183
+ </node>
184
+ <node id="1bfd1b60-ea92-11ec-90c7-eff83c975df3">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">100.64.73.136</data>
187
+ <data key="n_hostname">USER-0015-1708.example.internal</data>
188
+ <data key="n_set_roles">["Exploiting Host"]</data>
189
+ <data key="n_suspicion_score">0.25</data>
190
+ <data key="n_products">["Precinct","Meraki"]</data>
191
+ </node>
192
+ <node id="0daf9ba0-ea92-11ec-abf7-619673fe2558">
193
+ <data key="n_type">HOST</data>
194
+ <data key="n_ip">100.64.73.166</data>
195
+ <data key="n_hostname">USER-0015-1883.example.internal</data>
196
+ <data key="n_set_roles">["Exploiting Host"]</data>
197
+ <data key="n_suspicion_score">0.25</data>
198
+ <data key="n_products">["Precinct","Meraki"]</data>
199
+ </node>
200
+ <node id="e9783710-ea91-11ec-90c7-eff83c975df3">
201
+ <data key="n_type">HOST</data>
202
+ <data key="n_ip">100.64.77.171</data>
203
+ <data key="n_hostname">USER-0015-1884.example.internal</data>
204
+ <data key="n_set_roles">["Exploiting Host"]</data>
205
+ <data key="n_suspicion_score">0.25</data>
206
+ <data key="n_products">["Precinct","Meraki"]</data>
207
+ </node>
208
+ <node id="e36ed8a0-ea92-11ec-abf7-619673fe2558">
209
+ <data key="n_type">HOST</data>
210
+ <data key="n_ip">100.64.80.222</data>
211
+ <data key="n_hostname">USER-0015-1885.example.internal</data>
212
+ <data key="n_set_roles">["Exploiting Host"]</data>
213
+ <data key="n_suspicion_score">0.25</data>
214
+ <data key="n_products">["Precinct","Meraki"]</data>
215
+ </node>
216
+ <node id="1c0be870-ea92-11ec-90c7-eff83c975df3">
217
+ <data key="n_type">HOST</data>
218
+ <data key="n_ip">100.64.72.47</data>
219
+ <data key="n_hostname">USER-0015-1886.example.internal</data>
220
+ <data key="n_set_roles">["Exploiting Host"]</data>
221
+ <data key="n_suspicion_score">0.25</data>
222
+ <data key="n_products">["Precinct","Meraki"]</data>
223
+ </node>
224
+ <node id="2fdb66d0-ea94-11ec-90c7-eff83c975df3">
225
+ <data key="n_type">HOST</data>
226
+ <data key="n_ip">100.64.75.151</data>
227
+ <data key="n_hostname">USER-0015-1887.example.internal</data>
228
+ <data key="n_set_roles">["Exploiting Host"]</data>
229
+ <data key="n_suspicion_score">0.25</data>
230
+ <data key="n_products">["Precinct","Meraki"]</data>
231
+ </node>
232
+ <node id="60a10461-ea93-11ec-90c7-eff83c975df3">
233
+ <data key="n_type">HOST</data>
234
+ <data key="n_ip">100.64.77.248</data>
235
+ <data key="n_hostname">USER-0015-1888.example.internal</data>
236
+ <data key="n_set_roles">["Exploiting Host"]</data>
237
+ <data key="n_suspicion_score">0.25</data>
238
+ <data key="n_products">["Precinct","Meraki"]</data>
239
+ </node>
240
+ <node id="f867c330-ea91-11ec-90c7-eff83c975df3">
241
+ <data key="n_type">HOST</data>
242
+ <data key="n_ip">100.64.75.47</data>
243
+ <data key="n_hostname">USER-0015-1889.example.internal</data>
244
+ <data key="n_set_roles">["Exploiting Host"]</data>
245
+ <data key="n_suspicion_score">0.25</data>
246
+ <data key="n_products">["Precinct","Meraki"]</data>
247
+ </node>
248
+ <node id="448e6430-ea92-11ec-90c7-eff83c975df3">
249
+ <data key="n_type">HOST</data>
250
+ <data key="n_ip">100.64.81.85</data>
251
+ <data key="n_hostname">USER-0015-1890.example.internal</data>
252
+ <data key="n_set_roles">["Exploiting Host"]</data>
253
+ <data key="n_suspicion_score">0.25</data>
254
+ <data key="n_products">["Precinct","Meraki"]</data>
255
+ </node>
256
+ <node id="3d038b50-ea92-11ec-90c7-eff83c975df3">
257
+ <data key="n_type">HOST</data>
258
+ <data key="n_ip">100.64.73.181</data>
259
+ <data key="n_hostname">USER-0015-1891.example.internal</data>
260
+ <data key="n_set_roles">["Exploiting Host"]</data>
261
+ <data key="n_suspicion_score">0.25</data>
262
+ <data key="n_products">["Precinct","Meraki"]</data>
263
+ </node>
264
+ <node id="886a10a0-ea92-11ec-abf7-619673fe2558">
265
+ <data key="n_type">HOST</data>
266
+ <data key="n_ip">100.64.81.86</data>
267
+ <data key="n_hostname">USER-0015-1892.example.internal</data>
268
+ <data key="n_set_roles">["Exploiting Host"]</data>
269
+ <data key="n_suspicion_score">0.25</data>
270
+ <data key="n_products">["Precinct","Meraki"]</data>
271
+ </node>
272
+ <edge id="e1" source="HOST-15813" target="HOST-12604">
273
+ <data key="e_type">INCIDENT_LINK</data>
274
+ <data key="e_timestamp">1655941910</data>
275
+ <data key="e_label_binary">malicious</data>
276
+ <data key="e_label_confidence">0.7</data>
277
+ <data key="e_suspicion_score">0.25</data>
278
+ <data key="e_mo_name">Data Theft</data>
279
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
280
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
281
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
282
+ <data key="e_lifecycle_stage">complete-mission</data>
283
+ <data key="e_disposition">Unprocessed</data>
284
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
285
+ </edge>
286
+ <edge id="e2" source="HOST-12604" target="HOST-15813">
287
+ <data key="e_type">INCIDENT_LINK</data>
288
+ <data key="e_timestamp">1655941910</data>
289
+ <data key="e_label_binary">malicious</data>
290
+ <data key="e_label_confidence">0.7</data>
291
+ <data key="e_suspicion_score">0.25</data>
292
+ <data key="e_mo_name">Data Theft</data>
293
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
294
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
295
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
296
+ <data key="e_lifecycle_stage">complete-mission</data>
297
+ <data key="e_disposition">Unprocessed</data>
298
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
299
+ </edge>
300
+ <edge id="e3" source="dedebea0-ea91-11ec-abf7-619673fe2558" target="HOST-12604">
301
+ <data key="e_type">INCIDENT_LINK</data>
302
+ <data key="e_timestamp">1655941910</data>
303
+ <data key="e_label_binary">malicious</data>
304
+ <data key="e_label_confidence">0.7</data>
305
+ <data key="e_suspicion_score">0.25</data>
306
+ <data key="e_mo_name">Data Theft</data>
307
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
308
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
309
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
310
+ <data key="e_lifecycle_stage">complete-mission</data>
311
+ <data key="e_disposition">Unprocessed</data>
312
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
313
+ </edge>
314
+ <edge id="e4" source="HOST-12604" target="dedebea0-ea91-11ec-abf7-619673fe2558">
315
+ <data key="e_type">INCIDENT_LINK</data>
316
+ <data key="e_timestamp">1655941910</data>
317
+ <data key="e_label_binary">malicious</data>
318
+ <data key="e_label_confidence">0.7</data>
319
+ <data key="e_suspicion_score">0.25</data>
320
+ <data key="e_mo_name">Data Theft</data>
321
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
322
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
323
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
324
+ <data key="e_lifecycle_stage">complete-mission</data>
325
+ <data key="e_disposition">Unprocessed</data>
326
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
327
+ </edge>
328
+ <edge id="e5" source="HOST-12604" target="f11addb0-ea91-11ec-90c7-eff83c975df3">
329
+ <data key="e_type">INCIDENT_LINK</data>
330
+ <data key="e_timestamp">1655941910</data>
331
+ <data key="e_label_binary">malicious</data>
332
+ <data key="e_label_confidence">0.7</data>
333
+ <data key="e_suspicion_score">0.25</data>
334
+ <data key="e_mo_name">Data Theft</data>
335
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
336
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
337
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
338
+ <data key="e_lifecycle_stage">complete-mission</data>
339
+ <data key="e_disposition">Unprocessed</data>
340
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
341
+ </edge>
342
+ <edge id="e6" source="d35d04c5-ec20-11ec-8458-0365874c31b8" target="HOST-12604">
343
+ <data key="e_type">INCIDENT_LINK</data>
344
+ <data key="e_timestamp">1655941910</data>
345
+ <data key="e_label_binary">malicious</data>
346
+ <data key="e_label_confidence">0.7</data>
347
+ <data key="e_suspicion_score">0.25</data>
348
+ <data key="e_mo_name">Data Theft</data>
349
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
350
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
351
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
352
+ <data key="e_lifecycle_stage">complete-mission</data>
353
+ <data key="e_disposition">Unprocessed</data>
354
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
355
+ </edge>
356
+ <edge id="e7" source="HOST-12604" target="d35d04c5-ec20-11ec-8458-0365874c31b8">
357
+ <data key="e_type">INCIDENT_LINK</data>
358
+ <data key="e_timestamp">1655941910</data>
359
+ <data key="e_label_binary">malicious</data>
360
+ <data key="e_label_confidence">0.7</data>
361
+ <data key="e_suspicion_score">0.25</data>
362
+ <data key="e_mo_name">Data Theft</data>
363
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
364
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
365
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
366
+ <data key="e_lifecycle_stage">complete-mission</data>
367
+ <data key="e_disposition">Unprocessed</data>
368
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
369
+ </edge>
370
+ <edge id="e8" source="7b77b410-ea92-11ec-90c7-eff83c975df3" target="HOST-12604">
371
+ <data key="e_type">INCIDENT_LINK</data>
372
+ <data key="e_timestamp">1655941910</data>
373
+ <data key="e_label_binary">malicious</data>
374
+ <data key="e_label_confidence">0.7</data>
375
+ <data key="e_suspicion_score">0.25</data>
376
+ <data key="e_mo_name">Data Theft</data>
377
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
378
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
379
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
380
+ <data key="e_lifecycle_stage">complete-mission</data>
381
+ <data key="e_disposition">Unprocessed</data>
382
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
383
+ </edge>
384
+ <edge id="e9" source="067fdb10-ea92-11ec-90c7-eff83c975df3" target="HOST-12604">
385
+ <data key="e_type">INCIDENT_LINK</data>
386
+ <data key="e_timestamp">1655941910</data>
387
+ <data key="e_label_binary">malicious</data>
388
+ <data key="e_label_confidence">0.7</data>
389
+ <data key="e_suspicion_score">0.25</data>
390
+ <data key="e_mo_name">Data Theft</data>
391
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
392
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
393
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
394
+ <data key="e_lifecycle_stage">complete-mission</data>
395
+ <data key="e_disposition">Unprocessed</data>
396
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
397
+ </edge>
398
+ <edge id="e10" source="HOST-12604" target="067fdb10-ea92-11ec-90c7-eff83c975df3">
399
+ <data key="e_type">INCIDENT_LINK</data>
400
+ <data key="e_timestamp">1655941910</data>
401
+ <data key="e_label_binary">malicious</data>
402
+ <data key="e_label_confidence">0.7</data>
403
+ <data key="e_suspicion_score">0.25</data>
404
+ <data key="e_mo_name">Data Theft</data>
405
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
406
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
407
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
408
+ <data key="e_lifecycle_stage">complete-mission</data>
409
+ <data key="e_disposition">Unprocessed</data>
410
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
411
+ </edge>
412
+ <edge id="e11" source="55b4cd80-ea92-11ec-abf7-619673fe2558" target="HOST-12604">
413
+ <data key="e_type">INCIDENT_LINK</data>
414
+ <data key="e_timestamp">1655941910</data>
415
+ <data key="e_label_binary">malicious</data>
416
+ <data key="e_label_confidence">0.7</data>
417
+ <data key="e_suspicion_score">0.25</data>
418
+ <data key="e_mo_name">Data Theft</data>
419
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
420
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
421
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
422
+ <data key="e_lifecycle_stage">complete-mission</data>
423
+ <data key="e_disposition">Unprocessed</data>
424
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
425
+ </edge>
426
+ <edge id="e12" source="HOST-12604" target="55b4cd80-ea92-11ec-abf7-619673fe2558">
427
+ <data key="e_type">INCIDENT_LINK</data>
428
+ <data key="e_timestamp">1655941910</data>
429
+ <data key="e_label_binary">malicious</data>
430
+ <data key="e_label_confidence">0.7</data>
431
+ <data key="e_suspicion_score">0.25</data>
432
+ <data key="e_mo_name">Data Theft</data>
433
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
434
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
435
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
436
+ <data key="e_lifecycle_stage">complete-mission</data>
437
+ <data key="e_disposition">Unprocessed</data>
438
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
439
+ </edge>
440
+ <edge id="e13" source="HOST-12604" target="723b4f10-ea9c-11ec-b0c9-e7fa908a3ccf">
441
+ <data key="e_type">INCIDENT_LINK</data>
442
+ <data key="e_timestamp">1655941910</data>
443
+ <data key="e_label_binary">malicious</data>
444
+ <data key="e_label_confidence">0.7</data>
445
+ <data key="e_suspicion_score">0.25</data>
446
+ <data key="e_mo_name">Data Theft</data>
447
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
448
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
449
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
450
+ <data key="e_lifecycle_stage">complete-mission</data>
451
+ <data key="e_disposition">Unprocessed</data>
452
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
453
+ </edge>
454
+ <edge id="e14" source="HOST-12604" target="HOST-13701">
455
+ <data key="e_type">INCIDENT_LINK</data>
456
+ <data key="e_timestamp">1655941910</data>
457
+ <data key="e_label_binary">malicious</data>
458
+ <data key="e_label_confidence">0.7</data>
459
+ <data key="e_suspicion_score">0.25</data>
460
+ <data key="e_mo_name">Data Theft</data>
461
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
462
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
463
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
464
+ <data key="e_lifecycle_stage">complete-mission</data>
465
+ <data key="e_disposition">Unprocessed</data>
466
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
467
+ </edge>
468
+ <edge id="e15" source="eea7a8e0-ea93-11ec-abf7-619673fe2558" target="HOST-12604">
469
+ <data key="e_type">INCIDENT_LINK</data>
470
+ <data key="e_timestamp">1655941910</data>
471
+ <data key="e_label_binary">malicious</data>
472
+ <data key="e_label_confidence">0.7</data>
473
+ <data key="e_suspicion_score">0.25</data>
474
+ <data key="e_mo_name">Data Theft</data>
475
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
476
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
477
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
478
+ <data key="e_lifecycle_stage">complete-mission</data>
479
+ <data key="e_disposition">Unprocessed</data>
480
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
481
+ </edge>
482
+ <edge id="e16" source="HOST-12604" target="eea7a8e0-ea93-11ec-abf7-619673fe2558">
483
+ <data key="e_type">INCIDENT_LINK</data>
484
+ <data key="e_timestamp">1655941910</data>
485
+ <data key="e_label_binary">malicious</data>
486
+ <data key="e_label_confidence">0.7</data>
487
+ <data key="e_suspicion_score">0.25</data>
488
+ <data key="e_mo_name">Data Theft</data>
489
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
490
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
491
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
492
+ <data key="e_lifecycle_stage">complete-mission</data>
493
+ <data key="e_disposition">Unprocessed</data>
494
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
495
+ </edge>
496
+ <edge id="e17" source="HOST-12604" target="03862310-ea92-11ec-90c7-eff83c975df3">
497
+ <data key="e_type">INCIDENT_LINK</data>
498
+ <data key="e_timestamp">1655941910</data>
499
+ <data key="e_label_binary">malicious</data>
500
+ <data key="e_label_confidence">0.7</data>
501
+ <data key="e_suspicion_score">0.25</data>
502
+ <data key="e_mo_name">Data Theft</data>
503
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
504
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
505
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
506
+ <data key="e_lifecycle_stage">complete-mission</data>
507
+ <data key="e_disposition">Unprocessed</data>
508
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
509
+ </edge>
510
+ <edge id="e18" source="HOST-12604" target="HOST-13054">
511
+ <data key="e_type">INCIDENT_LINK</data>
512
+ <data key="e_timestamp">1655941910</data>
513
+ <data key="e_label_binary">malicious</data>
514
+ <data key="e_label_confidence">0.7</data>
515
+ <data key="e_suspicion_score">0.25</data>
516
+ <data key="e_mo_name">Data Theft</data>
517
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
518
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
519
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
520
+ <data key="e_lifecycle_stage">complete-mission</data>
521
+ <data key="e_disposition">Unprocessed</data>
522
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
523
+ </edge>
524
+ <edge id="e19" source="182bdd30-ea94-11ec-90c7-eff83c975df3" target="HOST-12604">
525
+ <data key="e_type">INCIDENT_LINK</data>
526
+ <data key="e_timestamp">1655941910</data>
527
+ <data key="e_label_binary">malicious</data>
528
+ <data key="e_label_confidence">0.7</data>
529
+ <data key="e_suspicion_score">0.25</data>
530
+ <data key="e_mo_name">Data Theft</data>
531
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
532
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
533
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
534
+ <data key="e_lifecycle_stage">complete-mission</data>
535
+ <data key="e_disposition">Unprocessed</data>
536
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
537
+ </edge>
538
+ <edge id="e20" source="HOST-12604" target="182bdd30-ea94-11ec-90c7-eff83c975df3">
539
+ <data key="e_type">INCIDENT_LINK</data>
540
+ <data key="e_timestamp">1655941910</data>
541
+ <data key="e_label_binary">malicious</data>
542
+ <data key="e_label_confidence">0.7</data>
543
+ <data key="e_suspicion_score">0.25</data>
544
+ <data key="e_mo_name">Data Theft</data>
545
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
546
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
547
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
548
+ <data key="e_lifecycle_stage">complete-mission</data>
549
+ <data key="e_disposition">Unprocessed</data>
550
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
551
+ </edge>
552
+ <edge id="e21" source="HOST-12604" target="HOST-13322">
553
+ <data key="e_type">INCIDENT_LINK</data>
554
+ <data key="e_timestamp">1655941910</data>
555
+ <data key="e_label_binary">malicious</data>
556
+ <data key="e_label_confidence">0.7</data>
557
+ <data key="e_suspicion_score">0.25</data>
558
+ <data key="e_mo_name">Data Theft</data>
559
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
560
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
561
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
562
+ <data key="e_lifecycle_stage">complete-mission</data>
563
+ <data key="e_disposition">Unprocessed</data>
564
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
565
+ </edge>
566
+ <edge id="e22" source="HOST-12604" target="34096b00-ea92-11ec-90c7-eff83c975df3">
567
+ <data key="e_type">INCIDENT_LINK</data>
568
+ <data key="e_timestamp">1655941910</data>
569
+ <data key="e_label_binary">malicious</data>
570
+ <data key="e_label_confidence">0.7</data>
571
+ <data key="e_suspicion_score">0.25</data>
572
+ <data key="e_mo_name">Data Theft</data>
573
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
574
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
575
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
576
+ <data key="e_lifecycle_stage">complete-mission</data>
577
+ <data key="e_disposition">Unprocessed</data>
578
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
579
+ </edge>
580
+ <edge id="e23" source="HOST-12604" target="6e6154c0-ea92-11ec-abf7-619673fe2558">
581
+ <data key="e_type">INCIDENT_LINK</data>
582
+ <data key="e_timestamp">1655941910</data>
583
+ <data key="e_label_binary">malicious</data>
584
+ <data key="e_label_confidence">0.7</data>
585
+ <data key="e_suspicion_score">0.25</data>
586
+ <data key="e_mo_name">Data Theft</data>
587
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
588
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
589
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
590
+ <data key="e_lifecycle_stage">complete-mission</data>
591
+ <data key="e_disposition">Unprocessed</data>
592
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
593
+ </edge>
594
+ <edge id="e24" source="HOST-12604" target="e0429460-ea91-11ec-abf7-619673fe2558">
595
+ <data key="e_type">INCIDENT_LINK</data>
596
+ <data key="e_timestamp">1655941910</data>
597
+ <data key="e_label_binary">malicious</data>
598
+ <data key="e_label_confidence">0.7</data>
599
+ <data key="e_suspicion_score">0.25</data>
600
+ <data key="e_mo_name">Data Theft</data>
601
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
602
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
603
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
604
+ <data key="e_lifecycle_stage">complete-mission</data>
605
+ <data key="e_disposition">Unprocessed</data>
606
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
607
+ </edge>
608
+ <edge id="e25" source="0e2c6560-ea95-11ec-90c7-eff83c975df3" target="HOST-12604">
609
+ <data key="e_type">INCIDENT_LINK</data>
610
+ <data key="e_timestamp">1655941910</data>
611
+ <data key="e_label_binary">malicious</data>
612
+ <data key="e_label_confidence">0.7</data>
613
+ <data key="e_suspicion_score">0.25</data>
614
+ <data key="e_mo_name">Data Theft</data>
615
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
616
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
617
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
618
+ <data key="e_lifecycle_stage">complete-mission</data>
619
+ <data key="e_disposition">Unprocessed</data>
620
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
621
+ </edge>
622
+ <edge id="e26" source="HOST-12604" target="0e2c6560-ea95-11ec-90c7-eff83c975df3">
623
+ <data key="e_type">INCIDENT_LINK</data>
624
+ <data key="e_timestamp">1655941910</data>
625
+ <data key="e_label_binary">malicious</data>
626
+ <data key="e_label_confidence">0.7</data>
627
+ <data key="e_suspicion_score">0.25</data>
628
+ <data key="e_mo_name">Data Theft</data>
629
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
630
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
631
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
632
+ <data key="e_lifecycle_stage">complete-mission</data>
633
+ <data key="e_disposition">Unprocessed</data>
634
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
635
+ </edge>
636
+ <edge id="e27" source="HOST-12604" target="HOST-13705">
637
+ <data key="e_type">INCIDENT_LINK</data>
638
+ <data key="e_timestamp">1655941910</data>
639
+ <data key="e_label_binary">malicious</data>
640
+ <data key="e_label_confidence">0.7</data>
641
+ <data key="e_suspicion_score">0.25</data>
642
+ <data key="e_mo_name">Data Theft</data>
643
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
644
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
645
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
646
+ <data key="e_lifecycle_stage">complete-mission</data>
647
+ <data key="e_disposition">Unprocessed</data>
648
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
649
+ </edge>
650
+ <edge id="e28" source="HOST-12604" target="0daf9ba0-ea92-11ec-abf7-619673fe2558">
651
+ <data key="e_type">INCIDENT_LINK</data>
652
+ <data key="e_timestamp">1655941910</data>
653
+ <data key="e_label_binary">malicious</data>
654
+ <data key="e_label_confidence">0.7</data>
655
+ <data key="e_suspicion_score">0.25</data>
656
+ <data key="e_mo_name">Data Theft</data>
657
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
658
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
659
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
660
+ <data key="e_lifecycle_stage">complete-mission</data>
661
+ <data key="e_disposition">Unprocessed</data>
662
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
663
+ </edge>
664
+ <edge id="e29" source="HOST-12604" target="e9783710-ea91-11ec-90c7-eff83c975df3">
665
+ <data key="e_type">INCIDENT_LINK</data>
666
+ <data key="e_timestamp">1655941910</data>
667
+ <data key="e_label_binary">malicious</data>
668
+ <data key="e_label_confidence">0.7</data>
669
+ <data key="e_suspicion_score">0.25</data>
670
+ <data key="e_mo_name">Data Theft</data>
671
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
672
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
673
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
674
+ <data key="e_lifecycle_stage">complete-mission</data>
675
+ <data key="e_disposition">Unprocessed</data>
676
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
677
+ </edge>
678
+ <edge id="e30" source="HOST-12604" target="e36ed8a0-ea92-11ec-abf7-619673fe2558">
679
+ <data key="e_type">INCIDENT_LINK</data>
680
+ <data key="e_timestamp">1655941910</data>
681
+ <data key="e_label_binary">malicious</data>
682
+ <data key="e_label_confidence">0.7</data>
683
+ <data key="e_suspicion_score">0.25</data>
684
+ <data key="e_mo_name">Data Theft</data>
685
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
686
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
687
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
688
+ <data key="e_lifecycle_stage">complete-mission</data>
689
+ <data key="e_disposition">Unprocessed</data>
690
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
691
+ </edge>
692
+ <edge id="e31" source="1c0be870-ea92-11ec-90c7-eff83c975df3" target="HOST-12604">
693
+ <data key="e_type">INCIDENT_LINK</data>
694
+ <data key="e_timestamp">1655941910</data>
695
+ <data key="e_label_binary">malicious</data>
696
+ <data key="e_label_confidence">0.7</data>
697
+ <data key="e_suspicion_score">0.25</data>
698
+ <data key="e_mo_name">Data Theft</data>
699
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
700
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
701
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
702
+ <data key="e_lifecycle_stage">complete-mission</data>
703
+ <data key="e_disposition">Unprocessed</data>
704
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
705
+ </edge>
706
+ <edge id="e32" source="HOST-12604" target="2fdb66d0-ea94-11ec-90c7-eff83c975df3">
707
+ <data key="e_type">INCIDENT_LINK</data>
708
+ <data key="e_timestamp">1655941910</data>
709
+ <data key="e_label_binary">malicious</data>
710
+ <data key="e_label_confidence">0.7</data>
711
+ <data key="e_suspicion_score">0.25</data>
712
+ <data key="e_mo_name">Data Theft</data>
713
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
714
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
715
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
716
+ <data key="e_lifecycle_stage">complete-mission</data>
717
+ <data key="e_disposition">Unprocessed</data>
718
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
719
+ </edge>
720
+ <edge id="e33" source="60a10461-ea93-11ec-90c7-eff83c975df3" target="HOST-12604">
721
+ <data key="e_type">INCIDENT_LINK</data>
722
+ <data key="e_timestamp">1655941910</data>
723
+ <data key="e_label_binary">malicious</data>
724
+ <data key="e_label_confidence">0.7</data>
725
+ <data key="e_suspicion_score">0.25</data>
726
+ <data key="e_mo_name">Data Theft</data>
727
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
728
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
729
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
730
+ <data key="e_lifecycle_stage">complete-mission</data>
731
+ <data key="e_disposition">Unprocessed</data>
732
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
733
+ </edge>
734
+ <edge id="e34" source="HOST-12604" target="f867c330-ea91-11ec-90c7-eff83c975df3">
735
+ <data key="e_type">INCIDENT_LINK</data>
736
+ <data key="e_timestamp">1655941910</data>
737
+ <data key="e_label_binary">malicious</data>
738
+ <data key="e_label_confidence">0.7</data>
739
+ <data key="e_suspicion_score">0.25</data>
740
+ <data key="e_mo_name">Data Theft</data>
741
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
742
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
743
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
744
+ <data key="e_lifecycle_stage">complete-mission</data>
745
+ <data key="e_disposition">Unprocessed</data>
746
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
747
+ </edge>
748
+ <edge id="e35" source="HOST-12604" target="448e6430-ea92-11ec-90c7-eff83c975df3">
749
+ <data key="e_type">INCIDENT_LINK</data>
750
+ <data key="e_timestamp">1655941910</data>
751
+ <data key="e_label_binary">malicious</data>
752
+ <data key="e_label_confidence">0.7</data>
753
+ <data key="e_suspicion_score">0.25</data>
754
+ <data key="e_mo_name">Data Theft</data>
755
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
756
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
757
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
758
+ <data key="e_lifecycle_stage">complete-mission</data>
759
+ <data key="e_disposition">Unprocessed</data>
760
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
761
+ </edge>
762
+ <edge id="e36" source="3d038b50-ea92-11ec-90c7-eff83c975df3" target="HOST-12604">
763
+ <data key="e_type">INCIDENT_LINK</data>
764
+ <data key="e_timestamp">1655941910</data>
765
+ <data key="e_label_binary">malicious</data>
766
+ <data key="e_label_confidence">0.7</data>
767
+ <data key="e_suspicion_score">0.25</data>
768
+ <data key="e_mo_name">Data Theft</data>
769
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
770
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
771
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
772
+ <data key="e_lifecycle_stage">complete-mission</data>
773
+ <data key="e_disposition">Unprocessed</data>
774
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
775
+ </edge>
776
+ <edge id="e37" source="HOST-12604" target="3d038b50-ea92-11ec-90c7-eff83c975df3">
777
+ <data key="e_type">INCIDENT_LINK</data>
778
+ <data key="e_timestamp">1655941910</data>
779
+ <data key="e_label_binary">malicious</data>
780
+ <data key="e_label_confidence">0.7</data>
781
+ <data key="e_suspicion_score">0.25</data>
782
+ <data key="e_mo_name">Data Theft</data>
783
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
784
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
785
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
786
+ <data key="e_lifecycle_stage">complete-mission</data>
787
+ <data key="e_disposition">Unprocessed</data>
788
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
789
+ </edge>
790
+ <edge id="e38" source="HOST-12604" target="886a10a0-ea92-11ec-abf7-619673fe2558">
791
+ <data key="e_type">INCIDENT_LINK</data>
792
+ <data key="e_timestamp">1655941910</data>
793
+ <data key="e_label_binary">malicious</data>
794
+ <data key="e_label_confidence">0.7</data>
795
+ <data key="e_suspicion_score">0.25</data>
796
+ <data key="e_mo_name">Data Theft</data>
797
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
798
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
799
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
800
+ <data key="e_lifecycle_stage">complete-mission</data>
801
+ <data key="e_disposition">Unprocessed</data>
802
+ <data key="e_incident_id">49236a80-f286-11ec-babd-d5ed2eda1ac6</data>
803
+ </edge>
804
+ </graph>
805
+ </graphml>
graph/incidents_graphml/4/492715a0-5909-11ee-a459-5b20d657705e.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9017bcb1-0627-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.61.10</data>
35
+ <data key="n_hostname">100.64.61.10</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.182.227</data>
43
+ <data key="n_hostname">172.31.182.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="9017bcb1-0627-11ee-b404-ff2ea490fc35" target="HOST-2761">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695360691</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">492715a0-5909-11ee-a459-5b20d657705e</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/492c7390-631f-11ee-b6b8-b9a4d865fde2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.217.8</data>
35
+ <data key="n_hostname">172.24.217.8</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="336e6311-6306-11ee-a0f6-3ff0cce90972">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.40.242</data>
43
+ <data key="n_hostname">100.64.40.242</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2731" target="HOST-7340">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696469651</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">492c7390-631f-11ee-b6b8-b9a4d865fde2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/493023f0-dba2-11ed-8f69-23b0b50da3c2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3ca40520-9d9a-11ed-9840-cf13fb390d2c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.76.10</data>
35
+ <data key="n_hostname">100.64.76.10</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
39
+ </node>
40
+ <node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="3ca40520-9d9a-11ed-9840-cf13fb390d2c" target="HOST-12749">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1681572557</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">493023f0-dba2-11ed-8f69-23b0b50da3c2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49337f50-dba2-11ed-8f69-23b0b50da3c2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
39
+ </node>
40
+ <node id="3ca40520-9d9a-11ed-9840-cf13fb390d2c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.76.10</data>
43
+ <data key="n_hostname">100.64.76.10</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12749" target="HOST-13988">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1681572557</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">49337f50-dba2-11ed-8f69-23b0b50da3c2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/4934fe50-0836-11ee-b8d0-013dce35746a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.233.43</data>
35
+ <data key="n_hostname">172.16.233.43</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2be74f06-0625-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.19.46</data>
43
+ <data key="n_hostname">100.64.19.46</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2758" target="HOST-4360">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686473974</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">4934fe50-0836-11ee-b8d0-013dce35746a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/4935a230-dba2-11ed-8f69-23b0b50da3c2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9062cdd2-9d8c-11ed-9ba1-69c845a45d44">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.76.11</data>
35
+ <data key="n_hostname">100.64.76.11</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
39
+ </node>
40
+ <node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="9062cdd2-9d8c-11ed-9ba1-69c845a45d44" target="HOST-12749">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1681572557</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">4935a230-dba2-11ed-8f69-23b0b50da3c2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/493683b0-d383-11ee-8aee-79d3d013c637.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e995fc21-cf53-11ee-91bf-c50629b24e9f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.31.242</data>
35
+ <data key="n_hostname">100.64.31.242</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.200.243</data>
43
+ <data key="n_hostname">172.30.200.243</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="e995fc21-cf53-11ee-91bf-c50629b24e9f" target="HOST-2706">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708827131</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">493683b0-d383-11ee-8aee-79d3d013c637</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/4938af70-dba2-11ed-8f69-23b0b50da3c2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c7c6a1b1-9d88-11ed-98f8-cd6642d241c0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
39
+ </node>
40
+ <node id="9062cdd2-9d8c-11ed-9ba1-69c845a45d44">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.76.11</data>
43
+ <data key="n_hostname">100.64.76.11</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12749" target="HOST-13989">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1681572557</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">4938af70-dba2-11ed-8f69-23b0b50da3c2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/493944d0-631f-11ee-b6b8-b9a4d865fde2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b8c78f60-063a-11ee-9f2c-63aa0a31eb0a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.40.243</data>
35
+ <data key="n_hostname">100.64.40.243</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.217.8</data>
43
+ <data key="n_hostname">172.24.217.8</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="b8c78f60-063a-11ee-9f2c-63aa0a31eb0a" target="HOST-2731">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696469651</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">493944d0-631f-11ee-b6b8-b9a4d865fde2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/493b60f0-5909-11ee-a459-5b20d657705e.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.182.227</data>
35
+ <data key="n_hostname">172.31.182.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9017bcb1-0627-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.61.10</data>
43
+ <data key="n_hostname">100.64.61.10</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2761" target="HOST-10341">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695360691</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">493b60f0-5909-11ee-a459-5b20d657705e</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49458960-9ff2-11ee-b57e-09f55271957e.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f29f66f2-062a-11ee-ad81-3d49a1dfb70d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.7.252</data>
35
+ <data key="n_hostname">100.64.7.252</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.27.202.53</data>
43
+ <data key="n_hostname">172.27.202.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.31.6.172</data>
51
+ <data key="n_hostname">172.31.6.172</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-2827" target="HOST-2703">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1703157345</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">49458960-9ff2-11ee-b57e-09f55271957e</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-2827" target="HOST-2757">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1703157345</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">49458960-9ff2-11ee-b57e-09f55271957e</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/4/4946cba0-2611-11ee-a11d-5dcee9a57544.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9b6daac0-07fd-11ee-9d60-2f49364b9928">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.57.115</data>
35
+ <data key="n_hostname">100.64.57.115</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.233.43</data>
43
+ <data key="n_hostname">172.16.233.43</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="9b6daac0-07fd-11ee-9d60-2f49364b9928" target="HOST-2758">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689756618</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">4946cba0-2611-11ee-a11d-5dcee9a57544</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49487ee0-f83f-11ee-a565-4974183b9eb9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e7f8c640-cac6-11ee-9222-b5c91e8078aa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.22.199</data>
35
+ <data key="n_hostname">100.64.22.199</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.217.8</data>
43
+ <data key="n_hostname">172.24.217.8</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="e7f8c640-cac6-11ee-9222-b5c91e8078aa" target="HOST-2731">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1712866119</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">49487ee0-f83f-11ee-a565-4974183b9eb9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49518c00-0ef9-11ed-ae8a-a78294a70068.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a40cf3b2-f968-11ec-a6f1-eb5b708b2bba">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.207.79.45</data>
35
+ <data key="n_hostname">USER-0015-1985.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Barracuda WAF","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="eb573e60-034a-11ed-b34c-f1e75604c15f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.12.47</data>
43
+ <data key="n_hostname">100.64.12.47</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17687" target="eb573e60-034a-11ed-b34c-f1e75604c15f">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1659069935</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">49518c00-0ef9-11ed-ae8a-a78294a70068</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/4952def0-f286-11ec-babd-d5ed2eda1ac6.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="48f5cad2-f286-11ec-ae5f-7d2c41c6d898">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.81.100</data>
35
+ <data key="n_hostname">100.64.81.100</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="e04f1780-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.88</data>
43
+ <data key="n_hostname">100.64.72.88</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="48f5cad2-f286-11ec-ae5f-7d2c41c6d898" target="HOST-13312">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655941911</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">4952def0-f286-11ec-babd-d5ed2eda1ac6</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13312" target="48f5cad2-f286-11ec-ae5f-7d2c41c6d898">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1655941911</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">4952def0-f286-11ec-babd-d5ed2eda1ac6</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/4/49544b20-0ef9-11ed-ae8a-a78294a70068.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4bf6d901-03a1-11ed-ac3f-e7a0e3c0cc5f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.97.224</data>
35
+ <data key="n_hostname">100.64.97.224</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="38840493-0a79-11ed-8674-598372048324">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.221.82.8</data>
43
+ <data key="n_hostname">10.221.82.8</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="4bf6d901-03a1-11ed-ac3f-e7a0e3c0cc5f" target="HOST-16884">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1659069935</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">49544b20-0ef9-11ed-ae8a-a78294a70068</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49577f70-0ef9-11ed-ae8a-a78294a70068.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="38840493-0a79-11ed-8674-598372048324">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.221.82.8</data>
35
+ <data key="n_hostname">10.221.82.8</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="4bf6d901-03a1-11ed-ac3f-e7a0e3c0cc5f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.97.224</data>
43
+ <data key="n_hostname">100.64.97.224</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16884" target="HOST-19353">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1659069935</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">49577f70-0ef9-11ed-ae8a-a78294a70068</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/4958d290-f83f-11ee-a565-4974183b9eb9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.217.8</data>
35
+ <data key="n_hostname">172.24.217.8</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="e7f8c640-cac6-11ee-9222-b5c91e8078aa">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.22.199</data>
43
+ <data key="n_hostname">100.64.22.199</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2731" target="HOST-4847">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1712866119</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">4958d290-f83f-11ee-a565-4974183b9eb9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/495f0ee0-0068-11ef-9e1d-8b16c75f4754.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.229.11</data>
35
+ <data key="n_hostname">172.30.229.11</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="4d8fd433-0050-11ef-a31a-4faed8d2fc36">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.59.182</data>
43
+ <data key="n_hostname">100.64.59.182</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2750" target="HOST-10125">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713763338</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.841796875</data>
53
+ <data key="e_suspicion_score">0.841796875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">495f0ee0-0068-11ef-9e1d-8b16c75f4754</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/49643eb0-2611-11ee-a11d-5dcee9a57544.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.233.43</data>
35
+ <data key="n_hostname">172.16.233.43</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9b6daac0-07fd-11ee-9d60-2f49364b9928">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.57.115</data>
43
+ <data key="n_hostname">100.64.57.115</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2758" target="HOST-9815">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689756618</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">49643eb0-2611-11ee-a11d-5dcee9a57544</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/4965a3d0-f83f-11ee-a565-4974183b9eb9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="82d11080-0625-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.22.201</data>
35
+ <data key="n_hostname">100.64.22.201</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.233.43</data>
43
+ <data key="n_hostname">172.16.233.43</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="82d11080-0625-11ee-b173-c9921719c2f8" target="HOST-2758">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1712866119</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">4965a3d0-f83f-11ee-a565-4974183b9eb9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/496f7b30-08cf-11ef-81ac-a7f609e446b5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="07d63475-1389-11ee-98ae-c11e532db376">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.30.211</data>
35
+ <data key="n_hostname">USER-0015-2066.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f86d912-0627-11ee-bc2f-8356f14253be">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.207.79.45</data>
43
+ <data key="n_hostname">USER-0015-1999.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]</data>
47
+ </node>
48
+ <edge id="e1" source="07d63475-1389-11ee-98ae-c11e532db376" target="HOST-16986">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714687185</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">496f7b30-08cf-11ef-81ac-a7f609e446b5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/497470e0-f83f-11ee-a565-4974183b9eb9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.233.43</data>
35
+ <data key="n_hostname">172.16.233.43</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="82d11080-0625-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.22.201</data>
43
+ <data key="n_hostname">100.64.22.201</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Stealthwatch"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2758" target="HOST-4848">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1712866119</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">497470e0-f83f-11ee-a565-4974183b9eb9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/4977c700-0068-11ef-9e1d-8b16c75f4754.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4d8fd433-0050-11ef-a31a-4faed8d2fc36">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.59.182</data>
35
+ <data key="n_hostname">100.64.59.182</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.229.11</data>
43
+ <data key="n_hostname">172.30.229.11</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-10125" target="HOST-2750">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713763338</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">4977c700-0068-11ef-9e1d-8b16c75f4754</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/497852f0-68ac-11ee-864e-0fda06c5b459.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.191.229</data>
35
+ <data key="n_hostname">172.24.191.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="02b8b3c1-0630-11ee-b40c-412a652124a2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.80</data>
43
+ <data key="n_hostname">100.64.18.80</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2839" target="02b8b3c1-0630-11ee-b40c-412a652124a2">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697079967</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">497852f0-68ac-11ee-864e-0fda06c5b459</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/4/497ad3f0-2611-11ee-a11d-5dcee9a57544.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="343c4c50-063e-11ee-b9e4-8dff6f886deb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.39.54</data>
35
+ <data key="n_hostname">100.64.39.54</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.229.11</data>
43
+ <data key="n_hostname">172.30.229.11</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-7094" target="HOST-2750">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689756618</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">497ad3f0-2611-11ee-a11d-5dcee9a57544</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>