diff --git a/graph/incidents_graphml/4/48ef54a0-6d11-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/4/48ef54a0-6d11-11ee-9911-f50eb88c1287.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ee64db7638f99cb71a70706949dcfcb04d333b1
--- /dev/null
+++ b/graph/incidents_graphml/4/48ef54a0-6d11-11ee-9911-f50eb88c1287.graphml
@@ -0,0 +1,797 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.75
+ 100.64.7.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.235
+ 100.64.15.235
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.236
+ 100.64.15.236
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.237
+ 100.64.15.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.238
+ 100.64.15.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.239
+ 100.64.15.239
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.240
+ 100.64.15.240
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.241
+ 100.64.15.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.242
+ 100.64.15.242
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.243
+ 100.64.15.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.244
+ 100.64.15.244
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.83
+ 100.64.5.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.245
+ 100.64.15.245
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+ INCIDENT_LINK
+ 1697563150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48ef54a0-6d11-11ee-9911-f50eb88c1287
+
+
+
diff --git a/graph/incidents_graphml/4/48fb4580-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/48fb4580-850d-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..532e5bc708ea57ac9fd6260161e24a1383b76de5
--- /dev/null
+++ b/graph/incidents_graphml/4/48fb4580-850d-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.50
+ 100.64.9.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700200260
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48fb4580-850d-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/4/48ff9730-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/48ff9730-631f-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a5579c40160de186c42c3d332b41e0f1945c7e8
--- /dev/null
+++ b/graph/incidents_graphml/4/48ff9730-631f-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.228
+ 100.64.37.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696469651
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48ff9730-631f-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/4/49001890-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/49001890-efa8-11ec-88e9-cd157aceabd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..73ed79f9a853154842a57aedd8795ef53d029457
--- /dev/null
+++ b/graph/incidents_graphml/4/49001890-efa8-11ec-88e9-cd157aceabd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.61
+ USER-0015-1904.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655626660
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 49001890-efa8-11ec-88e9-cd157aceabd3
+
+
+
diff --git a/graph/incidents_graphml/4/49048aa0-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/49048aa0-2270-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae9eee9458d3c77b6b22573d01cdd1d3d04641e8
--- /dev/null
+++ b/graph/incidents_graphml/4/49048aa0-2270-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.134
+ 100.64.91.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689357615
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 49048aa0-2270-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/4/490670c0-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/4/490670c0-30fe-11ef-82e2-b166e7a5de57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc72c629f09b8719405bea9e8108f3b3cc3491e7
--- /dev/null
+++ b/graph/incidents_graphml/4/490670c0-30fe-11ef-82e2-b166e7a5de57.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.144
+ 100.64.46.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.145
+ 100.64.46.145
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.146
+ 100.64.46.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.230
+ 100.64.40.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490670c0-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490670c0-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490670c0-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490670c0-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490670c0-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490670c0-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490670c0-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490670c0-30fe-11ef-82e2-b166e7a5de57
+
+
+
diff --git a/graph/incidents_graphml/4/49077fb0-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/49077fb0-5909-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6942cd465e310033181de1b167406931d3d8ec0f
--- /dev/null
+++ b/graph/incidents_graphml/4/49077fb0-5909-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.243
+ 100.64.56.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360691
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49077fb0-5909-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/4/49096700-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/49096700-2cc0-11ee-9ea2-17c9a8b72baa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc362357ad3a27a3e751d3f5f980a629e6f9a2a7
--- /dev/null
+++ b/graph/incidents_graphml/4/49096700-2cc0-11ee-9ea2-17c9a8b72baa.graphml
@@ -0,0 +1,489 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.218
+ 100.64.42.218
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.140
+ 100.64.14.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.219
+ 100.64.42.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.44
+ 100.64.20.44
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.220
+ 100.64.42.220
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.221
+ 100.64.42.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.11
+ 100.64.29.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.222
+ 100.64.42.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491486
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49096700-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+
diff --git a/graph/incidents_graphml/4/49098040-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/49098040-d383-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03104a3135d559bf793aa1464b8d64df758cd893
--- /dev/null
+++ b/graph/incidents_graphml/4/49098040-d383-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.240
+ 100.64.31.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708827131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49098040-d383-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/490a89e0-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/490a89e0-6fe7-11ee-bec7-efacac475e54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e7a6bca6d9d724ce44294c6bac7960312425d92
--- /dev/null
+++ b/graph/incidents_graphml/4/490a89e0-6fe7-11ee-bec7-efacac475e54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.27
+ 100.64.63.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697874964
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 490a89e0-6fe7-11ee-bec7-efacac475e54
+
+
+
diff --git a/graph/incidents_graphml/4/490bfd10-676e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/4/490bfd10-676e-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0387a69f596bbe1171a437819566f82923e1505
--- /dev/null
+++ b/graph/incidents_graphml/4/490bfd10-676e-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,841 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.178
+ USER-0015-1303.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.179
+ 100.64.34.179
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.180
+ 100.64.34.180
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.181
+ 100.64.34.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.108
+ 100.64.19.108
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.89
+ 100.64.26.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.182
+ 100.64.34.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.183
+ 100.64.34.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.217
+ 100.64.20.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.184
+ 100.64.34.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.185
+ 100.64.34.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.186
+ 100.64.34.186
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.187
+ 100.64.34.187
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.27
+ 100.64.25.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.188
+ 100.64.34.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.189
+ 100.64.34.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.216
+ 100.64.23.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943386
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 490bfd10-676e-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/4/490d46e0-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/490d46e0-850d-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0dd98da21469e2223fd78a49bd88232fee4d578c
--- /dev/null
+++ b/graph/incidents_graphml/4/490d46e0-850d-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.52
+ 100.64.9.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700200260
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 490d46e0-850d-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/4/490f9cc0-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/490f9cc0-631f-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a550e04c0ac579a2644ee7b5053d1078724f1aa
--- /dev/null
+++ b/graph/incidents_graphml/4/490f9cc0-631f-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.228
+ 100.64.37.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696469651
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 490f9cc0-631f-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/4/4914ee10-331d-11ed-b7a7-43dc40721942.graphml b/graph/incidents_graphml/4/4914ee10-331d-11ed-b7a7-43dc40721942.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c4a18c534168075f76e1df399b4e8f0c75828b2
--- /dev/null
+++ b/graph/incidents_graphml/4/4914ee10-331d-11ed-b7a7-43dc40721942.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.147.151
+ 192.168.147.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.9296875
+ ["Precinct","Meraki","Umbrella","Windows Active Directory"]
+
+
+ HOST
+ HOST-14470
+ USER-0015-1751.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.9296875
+ ["Precinct","Umbrella","Meraki"]
+
+
+ INCIDENT_LINK
+ 1663043639
+ malicious
+ 0.9296875
+ 0.9296875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4914ee10-331d-11ed-b7a7-43dc40721942
+
+
+
diff --git a/graph/incidents_graphml/4/49151a40-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/49151a40-0836-11ee-b8d0-013dce35746a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dcac184bce5e1c8f504e1e5973ca244869c2a13f
--- /dev/null
+++ b/graph/incidents_graphml/4/49151a40-0836-11ee-b8d0-013dce35746a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.46
+ 100.64.19.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49151a40-0836-11ee-b8d0-013dce35746a
+
+
+
diff --git a/graph/incidents_graphml/4/49171290-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/4/49171290-30fe-11ef-82e2-b166e7a5de57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da3d8337922e3ed7b82353138f1e822b1965ac77
--- /dev/null
+++ b/graph/incidents_graphml/4/49171290-30fe-11ef-82e2-b166e7a5de57.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.150
+ 100.64.46.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.179
+ 100.64.21.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.151
+ 100.64.46.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.152
+ 100.64.46.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.25
+ 100.64.21.25
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49171290-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49171290-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49171290-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49171290-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49171290-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49171290-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49171290-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49171290-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49171290-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105417
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49171290-30fe-11ef-82e2-b166e7a5de57
+
+
+
diff --git a/graph/incidents_graphml/4/491932f0-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/491932f0-5909-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..365df023d9eac7641781f013c52932eb55771184
--- /dev/null
+++ b/graph/incidents_graphml/4/491932f0-5909-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.243
+ 100.64.56.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360691
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 491932f0-5909-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/4/491b6370-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/491b6370-dba2-11ed-8f69-23b0b50da3c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a980ec8276637c6819703eccdf81cca27b6cc4cf
--- /dev/null
+++ b/graph/incidents_graphml/4/491b6370-dba2-11ed-8f69-23b0b50da3c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.139
+ 100.64.75.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681572557
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 491b6370-dba2-11ed-8f69-23b0b50da3c2
+
+
+
diff --git a/graph/incidents_graphml/4/491d0f50-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/4/491d0f50-be91-11ed-9416-c54055a72e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a03adb119401720cc4b6e6a4d62567ed1fc1daad
--- /dev/null
+++ b/graph/incidents_graphml/4/491d0f50-be91-11ed-9416-c54055a72e53.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.177
+ 100.64.75.177
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.79.186
+ 100.64.79.186
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1678376672
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 491d0f50-be91-11ed-9416-c54055a72e53
+
+
+ INCIDENT_LINK
+ 1678376672
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 491d0f50-be91-11ed-9416-c54055a72e53
+
+
+
diff --git a/graph/incidents_graphml/4/491d3150-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/491d3150-631f-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52d31a1a4978c1bcb745f0e0a85009023fa1596a
--- /dev/null
+++ b/graph/incidents_graphml/4/491d3150-631f-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.242
+ 100.64.40.242
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696469651
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 491d3150-631f-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/4/491fa930-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/491fa930-dba2-11ed-8f69-23b0b50da3c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c24051b7d7e549286e86f8bff3f1c980e7b9ea9f
--- /dev/null
+++ b/graph/incidents_graphml/4/491fa930-dba2-11ed-8f69-23b0b50da3c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.139
+ 100.64.75.139
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1681572557
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 491fa930-dba2-11ed-8f69-23b0b50da3c2
+
+
+
diff --git a/graph/incidents_graphml/4/49221150-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/49221150-d383-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..973482a6f3c54fb725a5d80c71a12e7ae1ee7d91
--- /dev/null
+++ b/graph/incidents_graphml/4/49221150-d383-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.240
+ 100.64.31.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708827131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 49221150-d383-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/49222900-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/4/49222900-1f34-11ee-bd83-b52c9cbf0232.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cc03074dc437d53c53452f23e2b705449a8a873
--- /dev/null
+++ b/graph/incidents_graphml/4/49222900-1f34-11ee-bd83-b52c9cbf0232.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.131
+ 100.64.34.131
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.234
+ 100.64.71.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.68.136
+ 100.64.68.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689001992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49222900-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49222900-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49222900-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49222900-1f34-11ee-bd83-b52c9cbf0232
+
+
+
diff --git a/graph/incidents_graphml/4/49236a80-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/4/49236a80-f286-11ec-babd-d5ed2eda1ac6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0192f27082a96f8b9363d372a381e7fd59e5a83c
--- /dev/null
+++ b/graph/incidents_graphml/4/49236a80-f286-11ec-babd-d5ed2eda1ac6.graphml
@@ -0,0 +1,805 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.153
+ USER-0015-1853.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.202
+ USER-0015-1870.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.55
+ USER-0015-1871.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.81
+ 100.64.81.81
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.82
+ USER-0015-1872.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.247
+ USER-0015-1873.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.152
+ USER-0015-1874.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.83
+ USER-0015-1875.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.39
+ USER-0015-1706.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.193
+ USER-0015-1876.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.84
+ USER-0015-1877.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.182
+ USER-0015-1639.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.165
+ USER-0015-1878.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.120
+ USER-0015-1661.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.155
+ USER-0015-1879.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.241
+ USER-0015-1880.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.19
+ USER-0015-1881.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.72
+ USER-0015-1882.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.136
+ USER-0015-1708.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.166
+ USER-0015-1883.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.171
+ USER-0015-1884.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.222
+ USER-0015-1885.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.47
+ USER-0015-1886.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.151
+ USER-0015-1887.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.248
+ USER-0015-1888.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.47
+ USER-0015-1889.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.85
+ USER-0015-1890.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.181
+ USER-0015-1891.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.86
+ USER-0015-1892.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49236a80-f286-11ec-babd-d5ed2eda1ac6
+
+
+
diff --git a/graph/incidents_graphml/4/492715a0-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/492715a0-5909-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae73e5438211f1411b542f7a88f22ff890c707a0
--- /dev/null
+++ b/graph/incidents_graphml/4/492715a0-5909-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.10
+ 100.64.61.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360691
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 492715a0-5909-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/4/492c7390-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/492c7390-631f-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4884c3ea9e09c15ed238699eaf60e233381b0eac
--- /dev/null
+++ b/graph/incidents_graphml/4/492c7390-631f-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.242
+ 100.64.40.242
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696469651
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 492c7390-631f-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/4/493023f0-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/493023f0-dba2-11ed-8f69-23b0b50da3c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96b9793552104521adcf5de0e7eab9abad25c774
--- /dev/null
+++ b/graph/incidents_graphml/4/493023f0-dba2-11ed-8f69-23b0b50da3c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.10
+ 100.64.76.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681572557
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 493023f0-dba2-11ed-8f69-23b0b50da3c2
+
+
+
diff --git a/graph/incidents_graphml/4/49337f50-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/49337f50-dba2-11ed-8f69-23b0b50da3c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4896b8afdb3647a81bb11827ab48a9dda6262354
--- /dev/null
+++ b/graph/incidents_graphml/4/49337f50-dba2-11ed-8f69-23b0b50da3c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.76.10
+ 100.64.76.10
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681572557
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 49337f50-dba2-11ed-8f69-23b0b50da3c2
+
+
+
diff --git a/graph/incidents_graphml/4/4934fe50-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/4934fe50-0836-11ee-b8d0-013dce35746a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d44ce4d82ff8a0c6ca8a6054f95f3426bec8cb00
--- /dev/null
+++ b/graph/incidents_graphml/4/4934fe50-0836-11ee-b8d0-013dce35746a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.46
+ 100.64.19.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473974
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4934fe50-0836-11ee-b8d0-013dce35746a
+
+
+
diff --git a/graph/incidents_graphml/4/4935a230-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/4935a230-dba2-11ed-8f69-23b0b50da3c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8fa864e87fa6d7bc4052015a34f04e9f4526f265
--- /dev/null
+++ b/graph/incidents_graphml/4/4935a230-dba2-11ed-8f69-23b0b50da3c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.11
+ 100.64.76.11
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681572557
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4935a230-dba2-11ed-8f69-23b0b50da3c2
+
+
+
diff --git a/graph/incidents_graphml/4/493683b0-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/493683b0-d383-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25b3f8edc6760cdbaf6575cec4666db103b4e0d1
--- /dev/null
+++ b/graph/incidents_graphml/4/493683b0-d383-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.242
+ 100.64.31.242
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708827131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 493683b0-d383-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/4938af70-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/4938af70-dba2-11ed-8f69-23b0b50da3c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5bf20def7a770324ea7a56ddc2f6c03c1a934f6b
--- /dev/null
+++ b/graph/incidents_graphml/4/4938af70-dba2-11ed-8f69-23b0b50da3c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.76.11
+ 100.64.76.11
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681572557
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4938af70-dba2-11ed-8f69-23b0b50da3c2
+
+
+
diff --git a/graph/incidents_graphml/4/493944d0-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/493944d0-631f-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1b531b484934636fdbd058c17d9b9fee47006c5
--- /dev/null
+++ b/graph/incidents_graphml/4/493944d0-631f-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.243
+ 100.64.40.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696469651
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 493944d0-631f-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/4/493b60f0-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/493b60f0-5909-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc035c5901e54d62fe96e84e51ece96571bb2927
--- /dev/null
+++ b/graph/incidents_graphml/4/493b60f0-5909-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.10
+ 100.64.61.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360691
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 493b60f0-5909-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/4/49458960-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/49458960-9ff2-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad8a370cde933f4510117673bbac68fe8be27189
--- /dev/null
+++ b/graph/incidents_graphml/4/49458960-9ff2-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.252
+ 100.64.7.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703157345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49458960-9ff2-11ee-b57e-09f55271957e
+
+
+ INCIDENT_LINK
+ 1703157345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49458960-9ff2-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/4946cba0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/4946cba0-2611-11ee-a11d-5dcee9a57544.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..873b1d0e5eb00d670970ad6839bef2c80d3d4868
--- /dev/null
+++ b/graph/incidents_graphml/4/4946cba0-2611-11ee-a11d-5dcee9a57544.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.115
+ 100.64.57.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689756618
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4946cba0-2611-11ee-a11d-5dcee9a57544
+
+
+
diff --git a/graph/incidents_graphml/4/49487ee0-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/49487ee0-f83f-11ee-a565-4974183b9eb9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ede2efd6dd29ec9f6dff671fb7f334936f1a1023
--- /dev/null
+++ b/graph/incidents_graphml/4/49487ee0-f83f-11ee-a565-4974183b9eb9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.199
+ 100.64.22.199
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712866119
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49487ee0-f83f-11ee-a565-4974183b9eb9
+
+
+
diff --git a/graph/incidents_graphml/4/49518c00-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/49518c00-0ef9-11ed-ae8a-a78294a70068.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f50c6057ca2138f8ce79c05f6d475bcc691ff74
--- /dev/null
+++ b/graph/incidents_graphml/4/49518c00-0ef9-11ed-ae8a-a78294a70068.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1985.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659069935
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 49518c00-0ef9-11ed-ae8a-a78294a70068
+
+
+
diff --git a/graph/incidents_graphml/4/4952def0-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/4/4952def0-f286-11ec-babd-d5ed2eda1ac6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f58d7cf74ade4be86e8afa92dee00ac19693bef
--- /dev/null
+++ b/graph/incidents_graphml/4/4952def0-f286-11ec-babd-d5ed2eda1ac6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.100
+ 100.64.81.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655941911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4952def0-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4952def0-f286-11ec-babd-d5ed2eda1ac6
+
+
+
diff --git a/graph/incidents_graphml/4/49544b20-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/49544b20-0ef9-11ed-ae8a-a78294a70068.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d48984d7e02c327231d0a98dde898e98715c1b3
--- /dev/null
+++ b/graph/incidents_graphml/4/49544b20-0ef9-11ed-ae8a-a78294a70068.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.224
+ 100.64.97.224
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1659069935
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49544b20-0ef9-11ed-ae8a-a78294a70068
+
+
+
diff --git a/graph/incidents_graphml/4/49577f70-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/49577f70-0ef9-11ed-ae8a-a78294a70068.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1642b4765853e9d85d2af7e00b2c65ed3f1a28dc
--- /dev/null
+++ b/graph/incidents_graphml/4/49577f70-0ef9-11ed-ae8a-a78294a70068.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.224
+ 100.64.97.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659069935
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 49577f70-0ef9-11ed-ae8a-a78294a70068
+
+
+
diff --git a/graph/incidents_graphml/4/4958d290-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4958d290-f83f-11ee-a565-4974183b9eb9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ed357d0325336c1b243cf0b89073bc40042c89e
--- /dev/null
+++ b/graph/incidents_graphml/4/4958d290-f83f-11ee-a565-4974183b9eb9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.199
+ 100.64.22.199
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712866119
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4958d290-f83f-11ee-a565-4974183b9eb9
+
+
+
diff --git a/graph/incidents_graphml/4/495f0ee0-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/495f0ee0-0068-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e99a36d866fcfe98a80c8e970ee72ed03df9514
--- /dev/null
+++ b/graph/incidents_graphml/4/495f0ee0-0068-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.182
+ 100.64.59.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713763338
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 495f0ee0-0068-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/4/49643eb0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/49643eb0-2611-11ee-a11d-5dcee9a57544.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b60b249389732870780489015e110c4822ccd98
--- /dev/null
+++ b/graph/incidents_graphml/4/49643eb0-2611-11ee-a11d-5dcee9a57544.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.115
+ 100.64.57.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689756618
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 49643eb0-2611-11ee-a11d-5dcee9a57544
+
+
+
diff --git a/graph/incidents_graphml/4/4965a3d0-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4965a3d0-f83f-11ee-a565-4974183b9eb9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c66d741bab49be5bdca302e403cc44337772b1a
--- /dev/null
+++ b/graph/incidents_graphml/4/4965a3d0-f83f-11ee-a565-4974183b9eb9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.201
+ 100.64.22.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712866119
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4965a3d0-f83f-11ee-a565-4974183b9eb9
+
+
+
diff --git a/graph/incidents_graphml/4/496f7b30-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/496f7b30-08cf-11ef-81ac-a7f609e446b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71d0c6637bea515a2515eab2fa718ee224e5c922
--- /dev/null
+++ b/graph/incidents_graphml/4/496f7b30-08cf-11ef-81ac-a7f609e446b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.211
+ USER-0015-2066.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1999.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1714687185
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 496f7b30-08cf-11ef-81ac-a7f609e446b5
+
+
+
diff --git a/graph/incidents_graphml/4/497470e0-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/497470e0-f83f-11ee-a565-4974183b9eb9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be562873a99fca917c36061bb02b855b35c8b58b
--- /dev/null
+++ b/graph/incidents_graphml/4/497470e0-f83f-11ee-a565-4974183b9eb9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.201
+ 100.64.22.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1712866119
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 497470e0-f83f-11ee-a565-4974183b9eb9
+
+
+
diff --git a/graph/incidents_graphml/4/4977c700-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4977c700-0068-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04621d4b1cc103da4d2b9727bb14d7bd65cca727
--- /dev/null
+++ b/graph/incidents_graphml/4/4977c700-0068-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.182
+ 100.64.59.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713763338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4977c700-0068-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/4/497852f0-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/4/497852f0-68ac-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29052077a040071b101667f65dced286b09a0b24
--- /dev/null
+++ b/graph/incidents_graphml/4/497852f0-68ac-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.80
+ 100.64.18.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697079967
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 497852f0-68ac-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/4/497ad3f0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/497ad3f0-2611-11ee-a11d-5dcee9a57544.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0aae71cd2b47324b39ddaf1b4696dae5248337df
--- /dev/null
+++ b/graph/incidents_graphml/4/497ad3f0-2611-11ee-a11d-5dcee9a57544.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.54
+ 100.64.39.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689756618
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 497ad3f0-2611-11ee-a11d-5dcee9a57544
+
+
+
diff --git a/graph/incidents_graphml/4/49807ea0-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/49807ea0-40ff-11ee-b8c2-77c1ecbb2825.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8511cd1bda3fcc279dfb5216462c855a43e42ad6
--- /dev/null
+++ b/graph/incidents_graphml/4/49807ea0-40ff-11ee-b8c2-77c1ecbb2825.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.117
+ 100.64.18.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692717568
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49807ea0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+
diff --git a/graph/incidents_graphml/4/4982b510-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/4982b510-08cf-11ef-81ac-a7f609e446b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84027cce57e0ee3d586d64907ca481b654dcf5fa
--- /dev/null
+++ b/graph/incidents_graphml/4/4982b510-08cf-11ef-81ac-a7f609e446b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1999.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.30.211
+ USER-0015-2066.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714687185
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4982b510-08cf-11ef-81ac-a7f609e446b5
+
+
+
diff --git a/graph/incidents_graphml/4/4984fa40-2824-11ef-b581-4d62d2263ef1.graphml b/graph/incidents_graphml/4/4984fa40-2824-11ef-b581-4d62d2263ef1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..261a644e0688b16a5330e10a93c653ad25c52972
--- /dev/null
+++ b/graph/incidents_graphml/4/4984fa40-2824-11ef-b581-4d62d2263ef1.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.246.203
+ 172.27.246.203
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.117
+ 100.64.97.117
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.33
+ 100.64.89.33
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.118
+ 100.64.97.118
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718132178
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4984fa40-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132178
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4984fa40-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132178
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4984fa40-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132178
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4984fa40-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132178
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4984fa40-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132178
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4984fa40-2824-11ef-b581-4d62d2263ef1
+
+
+
diff --git a/graph/incidents_graphml/4/4989f480-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/4989f480-40ff-11ee-b8c2-77c1ecbb2825.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc507f0681b92d4c921af6a56ccca872204f6bfb
--- /dev/null
+++ b/graph/incidents_graphml/4/4989f480-40ff-11ee-b8c2-77c1ecbb2825.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.18.117
+ 100.64.18.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692717568
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4989f480-40ff-11ee-b8c2-77c1ecbb2825
+
+
+
diff --git a/graph/incidents_graphml/4/4989f4b0-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4989f4b0-f83f-11ee-a565-4974183b9eb9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..970970ca115e2f8bfba1d0b3a22f6c0293853e7f
--- /dev/null
+++ b/graph/incidents_graphml/4/4989f4b0-f83f-11ee-a565-4974183b9eb9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.203
+ 100.64.22.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712866119
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4989f4b0-f83f-11ee-a565-4974183b9eb9
+
+
+
diff --git a/graph/incidents_graphml/4/498fec10-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/4/498fec10-30fe-11ef-82e2-b166e7a5de57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bfde9c8facb61b618dfd831fe674ed4d3e8acdb2
--- /dev/null
+++ b/graph/incidents_graphml/4/498fec10-30fe-11ef-82e2-b166e7a5de57.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.156
+ 100.64.46.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.157
+ 100.64.46.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.158
+ 100.64.46.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.210
+ 100.64.44.210
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719105418
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 498fec10-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105418
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 498fec10-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105418
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 498fec10-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105418
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 498fec10-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105418
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 498fec10-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105418
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 498fec10-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105418
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 498fec10-30fe-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719105418
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 498fec10-30fe-11ef-82e2-b166e7a5de57
+
+
+
diff --git a/graph/incidents_graphml/4/4990ea40-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4990ea40-9ff2-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a9f6681694b59bc4932da6b2d476675a2cb5bb9
--- /dev/null
+++ b/graph/incidents_graphml/4/4990ea40-9ff2-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.150
+ 100.64.48.150
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703157346
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4990ea40-9ff2-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/4999f4b0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/4999f4b0-2611-11ee-a11d-5dcee9a57544.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc4c7f349d4342b5965b1ee62db7862945d659a5
--- /dev/null
+++ b/graph/incidents_graphml/4/4999f4b0-2611-11ee-a11d-5dcee9a57544.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.54
+ 100.64.39.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689756618
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4999f4b0-2611-11ee-a11d-5dcee9a57544
+
+
+
diff --git a/graph/incidents_graphml/4/49a0f1b0-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/49a0f1b0-2270-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08975494836a08a95acf6517031f3393431a5ae4
--- /dev/null
+++ b/graph/incidents_graphml/4/49a0f1b0-2270-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1689357616
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49a0f1b0-2270-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/4/49aa26b0-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/49aa26b0-40ff-11ee-b8c2-77c1ecbb2825.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3300ef80dcce67746fe0a0cb339b8ae375fb72a
--- /dev/null
+++ b/graph/incidents_graphml/4/49aa26b0-40ff-11ee-b8c2-77c1ecbb2825.graphml
@@ -0,0 +1,251 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.21
+ 100.64.39.21
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.70.208
+ 100.64.70.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.4.233
+ 100.64.4.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.32.174
+ 100.64.32.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692717569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717569
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+
diff --git a/graph/incidents_graphml/4/49ae0c60-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/49ae0c60-5489-11ee-aade-a558f2065e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b0a1f0d4f1ba88774d0c613dd66cc3998b6a5a4
--- /dev/null
+++ b/graph/incidents_graphml/4/49ae0c60-5489-11ee-aade-a558f2065e36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.91
+ 100.64.47.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694865911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49ae0c60-5489-11ee-aade-a558f2065e36
+
+
+
diff --git a/graph/incidents_graphml/4/49ae3640-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/49ae3640-9ff2-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..804d6d56d0692d511b907801956212737bc74139
--- /dev/null
+++ b/graph/incidents_graphml/4/49ae3640-9ff2-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.250
+ 100.64.26.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703157346
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49ae3640-9ff2-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/49af1c40-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/49af1c40-08cf-11ef-81ac-a7f609e446b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19ad4abfc122a6b70bfc509845195ea919f3caf2
--- /dev/null
+++ b/graph/incidents_graphml/4/49af1c40-08cf-11ef-81ac-a7f609e446b5.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.25.138
+ 172.22.25.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.91.85
+ 100.64.91.85
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714687186
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49af1c40-08cf-11ef-81ac-a7f609e446b5
+
+
+ INCIDENT_LINK
+ 1714687186
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49af1c40-08cf-11ef-81ac-a7f609e446b5
+
+
+
diff --git a/graph/incidents_graphml/4/49bf2360-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/49bf2360-5489-11ee-aade-a558f2065e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44926b539e8d865788f95ed5c6e5c4da46099f3a
--- /dev/null
+++ b/graph/incidents_graphml/4/49bf2360-5489-11ee-aade-a558f2065e36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.91
+ 100.64.47.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694865912
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 49bf2360-5489-11ee-aade-a558f2065e36
+
+
+
diff --git a/graph/incidents_graphml/4/49c17200-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/49c17200-2270-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1fb2d44c131b4ac4451d83fb8da5047503d5faa
--- /dev/null
+++ b/graph/incidents_graphml/4/49c17200-2270-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689357616
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 49c17200-2270-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/4/49c9d620-6d11-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/4/49c9d620-6d11-11ee-9911-f50eb88c1287.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..490df734d5cfe00f0484fbf238c0de1d017dd995
--- /dev/null
+++ b/graph/incidents_graphml/4/49c9d620-6d11-11ee-9911-f50eb88c1287.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.2
+ 100.64.16.2
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697563151
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49c9d620-6d11-11ee-9911-f50eb88c1287
+
+
+
diff --git a/graph/incidents_graphml/4/49cbf770-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/49cbf770-9ff2-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e494cedd4fa409842e8ad098d15853ccddc6198c
--- /dev/null
+++ b/graph/incidents_graphml/4/49cbf770-9ff2-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.152
+ 100.64.48.152
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703157346
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49cbf770-9ff2-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/49d5b710-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/49d5b710-08cf-11ef-81ac-a7f609e446b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24a90466dce3726990e0d70ee1001603cf8e8f63
--- /dev/null
+++ b/graph/incidents_graphml/4/49d5b710-08cf-11ef-81ac-a7f609e446b5.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.19.54.137
+ 172.19.54.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Stealthwatch","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.87
+ 100.64.91.87
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.88
+ 100.64.91.88
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714687186
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49d5b710-08cf-11ef-81ac-a7f609e446b5
+
+
+ INCIDENT_LINK
+ 1714687186
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49d5b710-08cf-11ef-81ac-a7f609e446b5
+
+
+ INCIDENT_LINK
+ 1714687186
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49d5b710-08cf-11ef-81ac-a7f609e446b5
+
+
+ INCIDENT_LINK
+ 1714687186
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 49d5b710-08cf-11ef-81ac-a7f609e446b5
+
+
+
diff --git a/graph/incidents_graphml/4/49db39b0-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/49db39b0-9ff2-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa54e794699594dac5886fef199445407137f844
--- /dev/null
+++ b/graph/incidents_graphml/4/49db39b0-9ff2-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.152
+ 100.64.48.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703157346
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 49db39b0-9ff2-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/49e83620-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/49e83620-32d2-11ee-a4d6-4bc10938c808.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f421b09f5143be8bb8f0dbd0a9dd292d8f72c87
--- /dev/null
+++ b/graph/incidents_graphml/4/49e83620-32d2-11ee-a4d6-4bc10938c808.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.22
+ 100.64.65.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691158926
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 49e83620-32d2-11ee-a4d6-4bc10938c808
+
+
+
diff --git a/graph/incidents_graphml/4/49fcda20-e50c-11ee-9817-3f0d09cf653c.graphml b/graph/incidents_graphml/4/49fcda20-e50c-11ee-9817-3f0d09cf653c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff62764155fd8bf4d46e719f1c3c601abede0e76
--- /dev/null
+++ b/graph/incidents_graphml/4/49fcda20-e50c-11ee-9817-3f0d09cf653c.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.17
+ 100.64.69.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.69.18
+ 100.64.69.18
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.19
+ 100.64.69.19
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710755143
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49fcda20-e50c-11ee-9817-3f0d09cf653c
+
+
+ INCIDENT_LINK
+ 1710755143
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49fcda20-e50c-11ee-9817-3f0d09cf653c
+
+
+ INCIDENT_LINK
+ 1710755143
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49fcda20-e50c-11ee-9817-3f0d09cf653c
+
+
+ INCIDENT_LINK
+ 1710755143
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49fcda20-e50c-11ee-9817-3f0d09cf653c
+
+
+ INCIDENT_LINK
+ 1710755143
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49fcda20-e50c-11ee-9817-3f0d09cf653c
+
+
+ INCIDENT_LINK
+ 1710755143
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 49fcda20-e50c-11ee-9817-3f0d09cf653c
+
+
+
diff --git a/graph/incidents_graphml/4/49ff8630-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/49ff8630-08cf-11ef-81ac-a7f609e446b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0bdc81f0b2b40a2e0cbe1ff13fd2ee80a45b50e5
--- /dev/null
+++ b/graph/incidents_graphml/4/49ff8630-08cf-11ef-81ac-a7f609e446b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.61.193
+ 100.64.61.193
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714687186
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 49ff8630-08cf-11ef-81ac-a7f609e446b5
+
+
+
diff --git a/graph/incidents_graphml/4/4a016370-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4a016370-32d2-11ee-a4d6-4bc10938c808.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c0c10a2667e0a5e2d218619ef920440eecb762c
--- /dev/null
+++ b/graph/incidents_graphml/4/4a016370-32d2-11ee-a4d6-4bc10938c808.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.24
+ 100.64.65.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691158926
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4a016370-32d2-11ee-a4d6-4bc10938c808
+
+
+
diff --git a/graph/incidents_graphml/4/4a0b57a0-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4a0b57a0-b6d5-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4702824bfdf9fd9b09fb19d5d9dd7cb8bad37d09
--- /dev/null
+++ b/graph/incidents_graphml/4/4a0b57a0-b6d5-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.237
+ 100.64.83.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1677526270
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a0b57a0-b6d5-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/4/4a1060b0-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4a1060b0-b6d5-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e4fee80d63f5aea109e76967d446fe4a9a44380
--- /dev/null
+++ b/graph/incidents_graphml/4/4a1060b0-b6d5-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.83.237
+ 100.64.83.237
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677526270
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a1060b0-b6d5-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/4/4a1db0a0-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/4a1db0a0-0836-11ee-b8d0-013dce35746a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..695aa3dc5156ac7d038a5b7d7f0f06f0f747f5f4
--- /dev/null
+++ b/graph/incidents_graphml/4/4a1db0a0-0836-11ee-b8d0-013dce35746a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.165
+ 100.64.65.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473976
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a1db0a0-0836-11ee-b8d0-013dce35746a
+
+
+
diff --git a/graph/incidents_graphml/4/4a247e90-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/4a247e90-f5ee-11ec-ae2b-8fa08eaee108.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abc07a5b7693f245028261bf73f40557fa080c59
--- /dev/null
+++ b/graph/incidents_graphml/4/4a247e90-f5ee-11ec-ae2b-8fa08eaee108.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.43
+ USER-0015-1914.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.232
+ USER-0015-1915.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656316433
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a247e90-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316433
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a247e90-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316433
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a247e90-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316433
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a247e90-f5ee-11ec-ae2b-8fa08eaee108
+
+
+
diff --git a/graph/incidents_graphml/4/4a2d0110-05a9-11ef-8a49-f14dcee941df.graphml b/graph/incidents_graphml/4/4a2d0110-05a9-11ef-8a49-f14dcee941df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a05622204da0d63a4dec842026f6594967f06696
--- /dev/null
+++ b/graph/incidents_graphml/4/4a2d0110-05a9-11ef-8a49-f14dcee941df.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.183.105
+ 172.24.183.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.31
+ 100.64.89.31
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.102
+ 100.64.92.102
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714341012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a2d0110-05a9-11ef-8a49-f14dcee941df
+
+
+ INCIDENT_LINK
+ 1714341012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a2d0110-05a9-11ef-8a49-f14dcee941df
+
+
+ INCIDENT_LINK
+ 1714341012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a2d0110-05a9-11ef-8a49-f14dcee941df
+
+
+ INCIDENT_LINK
+ 1714341012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a2d0110-05a9-11ef-8a49-f14dcee941df
+
+
+
diff --git a/graph/incidents_graphml/4/4a2dda40-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4a2dda40-9fb5-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b73157121109acd153dad805b6ca963fa9a5c754
--- /dev/null
+++ b/graph/incidents_graphml/4/4a2dda40-9fb5-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.124
+ 100.64.24.124
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703131147
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4a2dda40-9fb5-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/4a357300-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/4a357300-2f75-11ee-b11e-87149c94e410.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65a1ce7ac79fc5dd86269a4f6cfb50e21f9d32d3
--- /dev/null
+++ b/graph/incidents_graphml/4/4a357300-2f75-11ee-b11e-87149c94e410.graphml
@@ -0,0 +1,617 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.42
+ 100.64.42.42
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.43
+ 100.64.42.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.190
+ 100.64.27.190
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.44
+ 100.64.42.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.45
+ 100.64.42.45
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.46
+ 100.64.42.46
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.47
+ 100.64.42.47
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.48
+ 100.64.42.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.49
+ 100.64.42.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.50
+ 100.64.42.50
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.51
+ 100.64.42.51
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.52
+ 100.64.42.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.53
+ 100.64.42.53
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.54
+ 100.64.42.54
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789129
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a357300-2f75-11ee-b11e-87149c94e410
+
+
+
diff --git a/graph/incidents_graphml/4/4a409ef0-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4a409ef0-9fb5-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4e4c05b7bece70c5d85691f7b72fe9fec2aab42
--- /dev/null
+++ b/graph/incidents_graphml/4/4a409ef0-9fb5-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.124
+ 100.64.24.124
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703131147
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a409ef0-9fb5-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/4a412820-866f-11ee-8f03-878f88d78f03.graphml b/graph/incidents_graphml/4/4a412820-866f-11ee-8f03-878f88d78f03.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..afe798f088794754fb96c090e847d36dcd7430ae
--- /dev/null
+++ b/graph/incidents_graphml/4/4a412820-866f-11ee-8f03-878f88d78f03.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.152
+ 100.64.10.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.33.70
+ 100.64.33.70
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1700352304
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a412820-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352304
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a412820-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352304
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a412820-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352304
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a412820-866f-11ee-8f03-878f88d78f03
+
+
+
diff --git a/graph/incidents_graphml/4/4a4dcf30-7437-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/4/4a4dcf30-7437-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6dcb56429643349cf3e6041b5cfe764af846a6fc
--- /dev/null
+++ b/graph/incidents_graphml/4/4a4dcf30-7437-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,429 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.146
+ 100.64.71.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.147
+ 100.64.71.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.148
+ 100.64.71.148
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.87
+ 100.64.71.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.149
+ 100.64.71.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.245
+ 100.64.70.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.150
+ 100.64.71.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.151
+ 100.64.71.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.152
+ 100.64.71.152
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.153
+ 100.64.71.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.154
+ 100.64.71.154
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201633
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a4dcf30-7437-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/4/4a5ebd70-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/4a5ebd70-e873-11ee-9a77-df185ba75d8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..693a5ae1b0dd8f9f1e6de16c67f0d5d52a69976c
--- /dev/null
+++ b/graph/incidents_graphml/4/4a5ebd70-e873-11ee-9a77-df185ba75d8e.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.169.88.157
+ 10.169.88.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","PAN NGFW","Windows Active Directory"]
+
+
+ HOST
+ 100.64.70.203
+ 100.64.70.203
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.124
+ 100.64.70.124
+ ["Exploiting Target"]
+ 0.68359375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.204
+ USER-0015-1605.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 10.88.97.186
+ 10.88.97.186
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","Windows Active Directory","Vulnerability Management"]
+
+
+ HOST
+ 10.114.42.3
+ 10.114.42.3
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","PAN NGFW","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1711129236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a5ebd70-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a5ebd70-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a5ebd70-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a5ebd70-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a5ebd70-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a5ebd70-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a5ebd70-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a5ebd70-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a5ebd70-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a5ebd70-e873-11ee-9a77-df185ba75d8e
+
+
+
diff --git a/graph/incidents_graphml/4/4a6c0530-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4a6c0530-5489-11ee-aade-a558f2065e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30fd2f260661b3193706c9e77db16c3e37bb6797
--- /dev/null
+++ b/graph/incidents_graphml/4/4a6c0530-5489-11ee-aade-a558f2065e36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.221
+ 100.64.30.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694865913
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a6c0530-5489-11ee-aade-a558f2065e36
+
+
+
diff --git a/graph/incidents_graphml/4/4a6e9580-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4a6e9580-5442-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..119726b51d063ef35434e182c2d4e282bbce56ab
--- /dev/null
+++ b/graph/incidents_graphml/4/4a6e9580-5442-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.165
+ 100.64.23.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694835418
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a6e9580-5442-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/4/4a70a5f0-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4a70a5f0-0068-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3d1e59ce14ad34ad2d4538ad241e26674ea4ed2
--- /dev/null
+++ b/graph/incidents_graphml/4/4a70a5f0-0068-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.122
+ 100.64.64.122
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713763339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a70a5f0-0068-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713763339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a70a5f0-0068-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/4/4a7ec220-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4a7ec220-5442-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d825fa4c272826808359c38f76691eef5b0aa83d
--- /dev/null
+++ b/graph/incidents_graphml/4/4a7ec220-5442-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.64
+ 100.64.15.64
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694835419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4a7ec220-5442-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/4/4a7f8d30-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4a7f8d30-5489-11ee-aade-a558f2065e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69d939acd2502a51bb2831741f75c54af27ad9e2
--- /dev/null
+++ b/graph/incidents_graphml/4/4a7f8d30-5489-11ee-aade-a558f2065e36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.221
+ 100.64.30.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694865913
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a7f8d30-5489-11ee-aade-a558f2065e36
+
+
+
diff --git a/graph/incidents_graphml/4/4a87b060-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4a87b060-0068-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ffc2d9540946c1bae5ef58a1e054fe42cc069910
--- /dev/null
+++ b/graph/incidents_graphml/4/4a87b060-0068-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.122
+ 100.64.64.122
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713763339
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a87b060-0068-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/4/4a8d6820-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4a8d6820-5442-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1db14dd61502a93d23e41091b0126a93ca3e2840
--- /dev/null
+++ b/graph/incidents_graphml/4/4a8d6820-5442-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.64
+ 100.64.15.64
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694835419
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4a8d6820-5442-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/4/4a8f44a0-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4a8f44a0-5489-11ee-aade-a558f2065e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ffa90cd207f6f7cc70fb7952cbdb592613fe06ab
--- /dev/null
+++ b/graph/incidents_graphml/4/4a8f44a0-5489-11ee-aade-a558f2065e36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.93
+ 100.64.47.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694865913
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a8f44a0-5489-11ee-aade-a558f2065e36
+
+
+
diff --git a/graph/incidents_graphml/4/4a9d94d0-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/4a9d94d0-6e59-11ee-bd33-e97c9a557859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9437055df481fb9dda99107673565ac606efe8a1
--- /dev/null
+++ b/graph/incidents_graphml/4/4a9d94d0-6e59-11ee-bd33-e97c9a557859.graphml
@@ -0,0 +1,653 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.81
+ 100.64.40.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.65
+ 100.64.15.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.82
+ 100.64.40.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.83
+ 100.64.40.83
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.84
+ 100.64.40.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.85
+ 100.64.40.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.86
+ 100.64.40.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.87
+ 100.64.40.87
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.122
+ 100.64.36.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.88
+ USER-0015-1327.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.89
+ 100.64.40.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.90
+ 100.64.40.90
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.151
+ 100.64.39.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.91
+ 100.64.40.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704027
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4a9d94d0-6e59-11ee-bd33-e97c9a557859
+
+
+
diff --git a/graph/incidents_graphml/4/4a9dd150-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4a9dd150-7e0f-11ee-8917-8796f098c594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d16f497290ca06ff4a2e2709a246f7c260a9ae1b
--- /dev/null
+++ b/graph/incidents_graphml/4/4a9dd150-7e0f-11ee-8917-8796f098c594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.137
+ 100.64.58.137
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699431463
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4a9dd150-7e0f-11ee-8917-8796f098c594
+
+
+
diff --git a/graph/incidents_graphml/4/4aa005c0-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4aa005c0-5442-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d3b064cb9b6298242568da1b87cc8c45e7eaa648
--- /dev/null
+++ b/graph/incidents_graphml/4/4aa005c0-5442-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.167
+ 100.64.23.167
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694835419
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4aa005c0-5442-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/4/4aa11ef0-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4aa11ef0-5489-11ee-aade-a558f2065e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe7b9a60c87144beca607c75b22c817fe4b38c3c
--- /dev/null
+++ b/graph/incidents_graphml/4/4aa11ef0-5489-11ee-aade-a558f2065e36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.93
+ 100.64.47.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694865913
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4aa11ef0-5489-11ee-aade-a558f2065e36
+
+
+
diff --git a/graph/incidents_graphml/4/4aa22ed0-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/4aa22ed0-08cf-11ef-81ac-a7f609e446b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09cf7075c39cdc6efb12c5456cce035b7db80132
--- /dev/null
+++ b/graph/incidents_graphml/4/4aa22ed0-08cf-11ef-81ac-a7f609e446b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.217
+ 100.64.12.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1714687187
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4aa22ed0-08cf-11ef-81ac-a7f609e446b5
+
+
+
diff --git a/graph/incidents_graphml/4/4aa298d0-3c0f-11ee-96ec-5323ee82cf36.graphml b/graph/incidents_graphml/4/4aa298d0-3c0f-11ee-96ec-5323ee82cf36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..387af0d4eb850eda854124ea85e20b749a528a9c
--- /dev/null
+++ b/graph/incidents_graphml/4/4aa298d0-3c0f-11ee-96ec-5323ee82cf36.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.198
+ 100.64.68.198
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.29.73
+ 100.64.29.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692174686
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4aa298d0-3c0f-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692174686
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4aa298d0-3c0f-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692174686
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4aa298d0-3c0f-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692174686
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4aa298d0-3c0f-11ee-96ec-5323ee82cf36
+
+
+
diff --git a/graph/incidents_graphml/4/4aa83eb0-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4aa83eb0-e011-11ee-b0f4-11c43f83f21a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09c4cbae9675ccce1bb75b86936d3644a2e851bb
--- /dev/null
+++ b/graph/incidents_graphml/4/4aa83eb0-e011-11ee-b0f4-11c43f83f21a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.15.210.169
+ 10.15.210.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.5.140
+ USER-0015-1952.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1710207536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4aa83eb0-e011-11ee-b0f4-11c43f83f21a
+
+
+
diff --git a/graph/incidents_graphml/4/4aab8cf0-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4aab8cf0-7e0f-11ee-8917-8796f098c594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..07e2d022ee3ae634b71aefa8b63ab914fa9ca7b0
--- /dev/null
+++ b/graph/incidents_graphml/4/4aab8cf0-7e0f-11ee-8917-8796f098c594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.137
+ 100.64.58.137
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699431463
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4aab8cf0-7e0f-11ee-8917-8796f098c594
+
+
+
diff --git a/graph/incidents_graphml/4/4aaeabc0-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4aaeabc0-5442-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93188a8fd018a29be2f60c61efc282e35ce1fd6a
--- /dev/null
+++ b/graph/incidents_graphml/4/4aaeabc0-5442-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.169
+ 100.64.23.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694835419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4aaeabc0-5442-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/4/4ab172a0-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4ab172a0-5489-11ee-aade-a558f2065e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9edc6e09dd6d5411393548719ab42c7795acf2ce
--- /dev/null
+++ b/graph/incidents_graphml/4/4ab172a0-5489-11ee-aade-a558f2065e36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.112
+ 100.64.31.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694865913
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ab172a0-5489-11ee-aade-a558f2065e36
+
+
+
diff --git a/graph/incidents_graphml/4/4ab47e50-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/4ab47e50-08cf-11ef-81ac-a7f609e446b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..541a69365daeb838d13af89c5c88cb0ef3172e60
--- /dev/null
+++ b/graph/incidents_graphml/4/4ab47e50-08cf-11ef-81ac-a7f609e446b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.12.217
+ 100.64.12.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1714687187
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ab47e50-08cf-11ef-81ac-a7f609e446b5
+
+
+
diff --git a/graph/incidents_graphml/4/4ab4e8e0-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4ab4e8e0-e011-11ee-b0f4-11c43f83f21a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51742f92fabc19780305594b594b821b5822c2be
--- /dev/null
+++ b/graph/incidents_graphml/4/4ab4e8e0-e011-11ee-b0f4-11c43f83f21a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.203
+ 100.64.83.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.15.210.169
+ 10.15.210.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1710207536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ab4e8e0-e011-11ee-b0f4-11c43f83f21a
+
+
+
diff --git a/graph/incidents_graphml/4/4ab5d8c0-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/4/4ab5d8c0-033b-11ef-835b-a3623a295d8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38f7ae172260967fb3203cb19059323ea0b91ebd
--- /dev/null
+++ b/graph/incidents_graphml/4/4ab5d8c0-033b-11ef-835b-a3623a295d8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.57
+ 100.64.13.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1714073866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ab5d8c0-033b-11ef-835b-a3623a295d8b
+
+
+
diff --git a/graph/incidents_graphml/4/4ab63a70-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4ab63a70-0068-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ff4fbb856f18ebdc021621bab34958ca92263ab
--- /dev/null
+++ b/graph/incidents_graphml/4/4ab63a70-0068-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.124
+ 100.64.64.124
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713763340
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ab63a70-0068-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/4/4ab73fb0-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4ab73fb0-5fa5-11ee-8f29-f592a54d646c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ebcca6be2cb37296df384eadf4e2f04b289d401a
--- /dev/null
+++ b/graph/incidents_graphml/4/4ab73fb0-5fa5-11ee-8f29-f592a54d646c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.255
+ 100.64.32.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696087402
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ab73fb0-5fa5-11ee-8f29-f592a54d646c
+
+
+
diff --git a/graph/incidents_graphml/4/4ab81010-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4ab81010-7e0f-11ee-8917-8796f098c594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1eb42ccc30183b4a2af46a455576b3edf2588db2
--- /dev/null
+++ b/graph/incidents_graphml/4/4ab81010-7e0f-11ee-8917-8796f098c594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.171
+ 100.64.19.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699431463
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ab81010-7e0f-11ee-8917-8796f098c594
+
+
+
diff --git a/graph/incidents_graphml/4/4abb9ff0-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4abb9ff0-034d-11ef-8489-99c106ef6fee.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8231f29387cb121b0c1928ba8051a0ee107e18c
--- /dev/null
+++ b/graph/incidents_graphml/4/4abb9ff0-034d-11ef-8489-99c106ef6fee.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.39
+ 100.64.11.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714081597
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4abb9ff0-034d-11ef-8489-99c106ef6fee
+
+
+
diff --git a/graph/incidents_graphml/4/4abd1250-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4abd1250-32d2-11ee-a4d6-4bc10938c808.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4b73bace15fa46d9b52f1e1cd6ab3c3a4208254
--- /dev/null
+++ b/graph/incidents_graphml/4/4abd1250-32d2-11ee-a4d6-4bc10938c808.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.152
+ 100.64.22.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691158927
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4abd1250-32d2-11ee-a4d6-4bc10938c808
+
+
+
diff --git a/graph/incidents_graphml/4/4abdee00-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4abdee00-5442-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ecfc2791a21e5b97d8a0867648055e55c8642ac5
--- /dev/null
+++ b/graph/incidents_graphml/4/4abdee00-5442-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.169
+ 100.64.23.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694835419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4abdee00-5442-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/4/4ac319b0-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4ac319b0-e011-11ee-b0f4-11c43f83f21a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c00d6a6fc7a8bbd6a6db0b0477c7b9442b7b8adb
--- /dev/null
+++ b/graph/incidents_graphml/4/4ac319b0-e011-11ee-b0f4-11c43f83f21a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.15.210.169
+ 10.15.210.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.203
+ 100.64.83.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1710207536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ac319b0-e011-11ee-b0f4-11c43f83f21a
+
+
+
diff --git a/graph/incidents_graphml/4/4ac640e0-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4ac640e0-7e0f-11ee-8917-8796f098c594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d1728ceaec99eef76a4f6be0bd188b4c6c3740e
--- /dev/null
+++ b/graph/incidents_graphml/4/4ac640e0-7e0f-11ee-8917-8796f098c594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.171
+ 100.64.19.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699431463
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ac640e0-7e0f-11ee-8917-8796f098c594
+
+
+
diff --git a/graph/incidents_graphml/4/4ac74490-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4ac74490-5489-11ee-aade-a558f2065e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7e223aea8b0b69c65abe8a1206d87ee744aaef5
--- /dev/null
+++ b/graph/incidents_graphml/4/4ac74490-5489-11ee-aade-a558f2065e36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.112
+ 100.64.31.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694865913
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ac74490-5489-11ee-aade-a558f2065e36
+
+
+
diff --git a/graph/incidents_graphml/4/4ac83c50-56b5-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/4/4ac83c50-56b5-11ee-be44-f1fe26834d88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fe2e1d8d9d1ca3b98d2cf3791ee4f817a9d53df
--- /dev/null
+++ b/graph/incidents_graphml/4/4ac83c50-56b5-11ee-be44-f1fe26834d88.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1695104713
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ac83c50-56b5-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695104713
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ac83c50-56b5-11ee-be44-f1fe26834d88
+
+
+
diff --git a/graph/incidents_graphml/4/4ac8d810-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4ac8d810-0068-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8dd81d7d0ac6d41f5b3997feb972382d1bbd6e81
--- /dev/null
+++ b/graph/incidents_graphml/4/4ac8d810-0068-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.124
+ 100.64.64.124
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713763340
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ac8d810-0068-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/4/4aca7120-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4aca7120-5442-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33a9f87ae5f273a8cba3cac9364b2250501ab2e6
--- /dev/null
+++ b/graph/incidents_graphml/4/4aca7120-5442-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.171
+ 100.64.23.171
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694835419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4aca7120-5442-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/4/4acf27a0-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4acf27a0-e011-11ee-b0f4-11c43f83f21a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb84eb514f806a4c4b5e6987ee671b93c3986ac3
--- /dev/null
+++ b/graph/incidents_graphml/4/4acf27a0-e011-11ee-b0f4-11c43f83f21a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.15.210.169
+ 10.15.210.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.62.72
+ USER-0015-1953.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1710207536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4acf27a0-e011-11ee-b0f4-11c43f83f21a
+
+
+
diff --git a/graph/incidents_graphml/4/4ad464a0-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4ad464a0-5fa5-11ee-8f29-f592a54d646c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0699d21e48b69eaded93be341ccd5b328ea2e06b
--- /dev/null
+++ b/graph/incidents_graphml/4/4ad464a0-5fa5-11ee-8f29-f592a54d646c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.1
+ 100.64.33.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696087402
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ad464a0-5fa5-11ee-8f29-f592a54d646c
+
+
+
diff --git a/graph/incidents_graphml/4/4ad4f450-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4ad4f450-034d-11ef-8489-99c106ef6fee.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1d7060f84adb11f06f59646a2d8633d13b8aa61
--- /dev/null
+++ b/graph/incidents_graphml/4/4ad4f450-034d-11ef-8489-99c106ef6fee.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.39
+ 100.64.11.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714081597
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ad4f450-034d-11ef-8489-99c106ef6fee
+
+
+
diff --git a/graph/incidents_graphml/4/4ad4fea0-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/4ad4fea0-08cf-11ef-81ac-a7f609e446b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e535036aa51987dc0467593910209300ef2e2e7b
--- /dev/null
+++ b/graph/incidents_graphml/4/4ad4fea0-08cf-11ef-81ac-a7f609e446b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.163
+ 100.64.88.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1714687187
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ad4fea0-08cf-11ef-81ac-a7f609e446b5
+
+
+
diff --git a/graph/incidents_graphml/4/4ad75200-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/4/4ad75200-3655-11ef-872b-bfba974a2ef0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d5254f8d2da28e4b11ccedaa7895377bc041aec
--- /dev/null
+++ b/graph/incidents_graphml/4/4ad75200-3655-11ef-872b-bfba974a2ef0.graphml
@@ -0,0 +1,135 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.20
+ 100.64.2.20
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.92
+ 100.64.49.92
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719692542
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ad75200-3655-11ef-872b-bfba974a2ef0
+
+
+ INCIDENT_LINK
+ 1719692542
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ad75200-3655-11ef-872b-bfba974a2ef0
+
+
+ INCIDENT_LINK
+ 1719692542
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ad75200-3655-11ef-872b-bfba974a2ef0
+
+
+ INCIDENT_LINK
+ 1719692542
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ad75200-3655-11ef-872b-bfba974a2ef0
+
+
+ INCIDENT_LINK
+ 1719692542
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ad75200-3655-11ef-872b-bfba974a2ef0
+
+
+
diff --git a/graph/incidents_graphml/4/4ada9dc0-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4ada9dc0-5442-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c34b57684d3c75e30c30193d77b84496c69362aa
--- /dev/null
+++ b/graph/incidents_graphml/4/4ada9dc0-5442-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.171
+ 100.64.23.171
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694835419
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ada9dc0-5442-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/4/4add2360-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4add2360-0068-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e533cfe8d548140cd6609abd6277fce6c2a0f7c
--- /dev/null
+++ b/graph/incidents_graphml/4/4add2360-0068-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.170
+ 100.64.43.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713763340
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4add2360-0068-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/4/4ae73900-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4ae73900-62c9-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..02cc650ef9b8d32608d1be74f61a627c39380870
--- /dev/null
+++ b/graph/incidents_graphml/4/4ae73900-62c9-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.167
+ 100.64.57.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696432718
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ae73900-62c9-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/4/4aeaf840-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4aeaf840-2cc0-11ee-9ea2-17c9a8b72baa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e28d8dc1cbdcc22124cfebba9dae38ba8c45cb33
--- /dev/null
+++ b/graph/incidents_graphml/4/4aeaf840-2cc0-11ee-9ea2-17c9a8b72baa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.229
+ 100.64.42.229
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690491489
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4aeaf840-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+
diff --git a/graph/incidents_graphml/4/4aeebb20-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4aeebb20-f859-11ec-94e5-2949377000d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8bd7b571ad7e71d941f3d73f5c7bafadd24a992f
--- /dev/null
+++ b/graph/incidents_graphml/4/4aeebb20-f859-11ec-94e5-2949377000d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.237
+ 100.64.72.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656582293
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4aeebb20-f859-11ec-94e5-2949377000d8
+
+
+
diff --git a/graph/incidents_graphml/4/4aef0bb0-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4aef0bb0-e011-11ee-b0f4-11c43f83f21a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..133836659a69f338f6943a04123448efc795c59a
--- /dev/null
+++ b/graph/incidents_graphml/4/4aef0bb0-e011-11ee-b0f4-11c43f83f21a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.116
+ 100.64.51.116
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.15.210.169
+ 10.15.210.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1710207537
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4aef0bb0-e011-11ee-b0f4-11c43f83f21a
+
+
+
diff --git a/graph/incidents_graphml/4/4af06a90-ad8c-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/4/4af06a90-ad8c-11ed-a9cd-bdbbd3b810c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbcf3740ef2eb72d001e1360551586f3e6b9df56
--- /dev/null
+++ b/graph/incidents_graphml/4/4af06a90-ad8c-11ed-a9cd-bdbbd3b810c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.46.208.212
+ 10.46.208.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.121
+ 100.64.83.121
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1676505358
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4af06a90-ad8c-11ed-a9cd-bdbbd3b810c7
+
+
+
diff --git a/graph/incidents_graphml/4/4af25e70-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/4/4af25e70-0c57-11ee-a19d-25527a25a69c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5e8abe4f9d55d1fe7acd0143a749ee0e5f73dd1
--- /dev/null
+++ b/graph/incidents_graphml/4/4af25e70-0c57-11ee-a19d-25527a25a69c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.116
+ 100.64.5.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686927955
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4af25e70-0c57-11ee-a19d-25527a25a69c
+
+
+ INCIDENT_LINK
+ 1686927955
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4af25e70-0c57-11ee-a19d-25527a25a69c
+
+
+
diff --git a/graph/incidents_graphml/4/4af403e0-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/4af403e0-62c1-11ee-b24d-ffed8a6ae3b7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e74bce58729ede41fce113da395ae79dbd1fb2a3
--- /dev/null
+++ b/graph/incidents_graphml/4/4af403e0-62c1-11ee-b24d-ffed8a6ae3b7.graphml
@@ -0,0 +1,287 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.215
+ 100.64.23.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.216
+ 100.64.23.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.217
+ 100.64.23.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.218
+ 100.64.23.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.219
+ 100.64.23.219
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.220
+ 100.64.23.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+
diff --git a/graph/incidents_graphml/4/4af406c0-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4af406c0-0068-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbf7901122efb91add7ad714959e8e1346e439bc
--- /dev/null
+++ b/graph/incidents_graphml/4/4af406c0-0068-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.170
+ 100.64.43.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713763340
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4af406c0-0068-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/4/4af85810-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4af85810-f859-11ec-94e5-2949377000d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38302d2f1257cc505e2eb2a29cdd805b6d94b3af
--- /dev/null
+++ b/graph/incidents_graphml/4/4af85810-f859-11ec-94e5-2949377000d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.237
+ 100.64.72.237
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656582293
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4af85810-f859-11ec-94e5-2949377000d8
+
+
+
diff --git a/graph/incidents_graphml/4/4afcc750-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4afcc750-e011-11ee-b0f4-11c43f83f21a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..214fd02ee34ff4200f4c53532383558fa47e4999
--- /dev/null
+++ b/graph/incidents_graphml/4/4afcc750-e011-11ee-b0f4-11c43f83f21a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.15.210.169
+ 10.15.210.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.51.116
+ 100.64.51.116
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1710207537
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4afcc750-e011-11ee-b0f4-11c43f83f21a
+
+
+
diff --git a/graph/incidents_graphml/4/4b037010-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4b037010-0068-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..beb64c6d0d852137f09695fba690ff1ef5033fc4
--- /dev/null
+++ b/graph/incidents_graphml/4/4b037010-0068-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.152
+ 100.64.22.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713763340
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4b037010-0068-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/4/4b043080-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/4b043080-62c1-11ee-b24d-ffed8a6ae3b7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71f4b3885da97b2cb1416f6627de61b2efa03702
--- /dev/null
+++ b/graph/incidents_graphml/4/4b043080-62c1-11ee-b24d-ffed8a6ae3b7.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.215
+ 100.64.23.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4b043080-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+ INCIDENT_LINK
+ 1696429282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4b043080-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+
diff --git a/graph/incidents_graphml/4/4b06e4b0-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4b06e4b0-2cc0-11ee-9ea2-17c9a8b72baa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6da72a165e13ee397ae1e452eb05863efac6bab
--- /dev/null
+++ b/graph/incidents_graphml/4/4b06e4b0-2cc0-11ee-9ea2-17c9a8b72baa.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.235
+ 100.64.10.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690491490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4b06e4b0-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+ INCIDENT_LINK
+ 1690491490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4b06e4b0-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+
diff --git a/graph/incidents_graphml/4/4b092360-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4b092360-e011-11ee-b0f4-11c43f83f21a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8feec4f3a79f3475f228059802840c07b56cba4
--- /dev/null
+++ b/graph/incidents_graphml/4/4b092360-e011-11ee-b0f4-11c43f83f21a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.113
+ USER-0015-1954.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.15.210.169
+ 10.15.210.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1710207537
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4b092360-e011-11ee-b0f4-11c43f83f21a
+
+
+
diff --git a/graph/incidents_graphml/4/4b16fbb0-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4b16fbb0-6fe7-11ee-bec7-efacac475e54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ac88cd0fbe934f1d7a018085a0b637c72fded49
--- /dev/null
+++ b/graph/incidents_graphml/4/4b16fbb0-6fe7-11ee-bec7-efacac475e54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.213
+ 100.64.20.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697874968
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4b16fbb0-6fe7-11ee-bec7-efacac475e54
+
+
+
diff --git a/graph/incidents_graphml/4/4b174160-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4b174160-4c1a-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f671940f3e3215df51c7573209a7d12943600cab
--- /dev/null
+++ b/graph/incidents_graphml/4/4b174160-4c1a-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.161
+ 100.64.14.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693938630
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4b174160-4c1a-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/4/4b17c960-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4b17c960-e011-11ee-b0f4-11c43f83f21a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12740ba0076abfb05063d6c3f14ad63ccbb371a5
--- /dev/null
+++ b/graph/incidents_graphml/4/4b17c960-e011-11ee-b0f4-11c43f83f21a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.15.210.169
+ 10.15.210.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.63.113
+ USER-0015-1954.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1710207537
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4b17c960-e011-11ee-b0f4-11c43f83f21a
+
+
+
diff --git a/graph/incidents_graphml/4/4b1d6060-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/4b1d6060-2611-11ee-a11d-5dcee9a57544.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca302988745508793bf072f2f12f431a70a7b4ac
--- /dev/null
+++ b/graph/incidents_graphml/4/4b1d6060-2611-11ee-a11d-5dcee9a57544.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.117
+ 100.64.57.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689756621
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4b1d6060-2611-11ee-a11d-5dcee9a57544
+
+
+
diff --git a/graph/incidents_graphml/4/4b217190-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4b217190-2cc0-11ee-9ea2-17c9a8b72baa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e0b9abdbfd602991b0e3ce7e6d0e59ff21806e8
--- /dev/null
+++ b/graph/incidents_graphml/4/4b217190-2cc0-11ee-9ea2-17c9a8b72baa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.229
+ 100.64.42.229
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690491490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4b217190-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+
diff --git a/graph/incidents_graphml/4/4b244c80-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4b244c80-e011-11ee-b0f4-11c43f83f21a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c152e9af93e0c606516f790340a322015f9eef21
--- /dev/null
+++ b/graph/incidents_graphml/4/4b244c80-e011-11ee-b0f4-11c43f83f21a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.3
+ USER-0015-1955.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.15.210.169
+ 10.15.210.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1710207537
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4b244c80-e011-11ee-b0f4-11c43f83f21a
+
+
+
diff --git a/graph/incidents_graphml/4/4b28d600-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4b28d600-6fe7-11ee-bec7-efacac475e54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7492fe31584bfc377d8a22a28dde7a496d2861a
--- /dev/null
+++ b/graph/incidents_graphml/4/4b28d600-6fe7-11ee-bec7-efacac475e54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.213
+ 100.64.20.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697874968
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4b28d600-6fe7-11ee-bec7-efacac475e54
+
+
+
diff --git a/graph/incidents_graphml/4/4b4297c0-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4b4297c0-2244-11ee-a208-019103756a24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..294b83f154ae2247d15fad4934130fe96fd03d09
--- /dev/null
+++ b/graph/incidents_graphml/4/4b4297c0-2244-11ee-a208-019103756a24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.14
+ 100.64.6.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689338721
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4b4297c0-2244-11ee-a208-019103756a24
+
+
+
diff --git a/graph/incidents_graphml/4/4b435170-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4b435170-2cc0-11ee-9ea2-17c9a8b72baa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..631efe3854e8ae7455d58fe74d834381bf42989c
--- /dev/null
+++ b/graph/incidents_graphml/4/4b435170-2cc0-11ee-9ea2-17c9a8b72baa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.231
+ 100.64.42.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690491490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4b435170-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+
diff --git a/graph/incidents_graphml/4/4b4581d0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/4b4581d0-2611-11ee-a11d-5dcee9a57544.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..75b418f2821d14c36968af5a35aeced9057fd65f
--- /dev/null
+++ b/graph/incidents_graphml/4/4b4581d0-2611-11ee-a11d-5dcee9a57544.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.119
+ 100.64.57.119
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689756621
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4b4581d0-2611-11ee-a11d-5dcee9a57544
+
+
+
diff --git a/graph/incidents_graphml/4/4b53cec0-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4b53cec0-394e-11ee-a463-c9469bb75709.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e6b04757e1c25f813a29a7f22954411fc9957f5
--- /dev/null
+++ b/graph/incidents_graphml/4/4b53cec0-394e-11ee-a463-c9469bb75709.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.129
+ 100.64.11.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691871893
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4b53cec0-394e-11ee-a463-c9469bb75709
+
+
+
diff --git a/graph/incidents_graphml/4/4b5b0450-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4b5b0450-f91c-11ed-8f07-3d261ba980ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93d4c591ceb1c22e7403211cf1f66046dcb248d3
--- /dev/null
+++ b/graph/incidents_graphml/4/4b5b0450-f91c-11ed-8f07-3d261ba980ce.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.249
+ 100.64.10.249
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.114
+ 100.64.71.114
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684813543
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4b5b0450-f91c-11ed-8f07-3d261ba980ce
+
+
+ INCIDENT_LINK
+ 1684813543
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4b5b0450-f91c-11ed-8f07-3d261ba980ce
+
+
+
diff --git a/graph/incidents_graphml/4/4b5cf3f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4b5cf3f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e3484e9eb6b1c5805ea191a71b51276ab426dac
--- /dev/null
+++ b/graph/incidents_graphml/4/4b5cf3f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.231
+ 100.64.42.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690491490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4b5cf3f0-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+
diff --git a/graph/incidents_graphml/4/4b648a20-002a-11ed-bb11-93744d705888.graphml b/graph/incidents_graphml/4/4b648a20-002a-11ed-bb11-93744d705888.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6dbbf055aa17ad84eff2de4b9adf570fb3652236
--- /dev/null
+++ b/graph/incidents_graphml/4/4b648a20-002a-11ed-bb11-93744d705888.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.197
+ USER-0015-1848.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657441717
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4b648a20-002a-11ed-bb11-93744d705888
+
+
+
diff --git a/graph/incidents_graphml/4/4b649ac0-17e8-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/4/4b649ac0-17e8-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..720763dff567f6da8eef753b0b0e8efe50fa15b4
--- /dev/null
+++ b/graph/incidents_graphml/4/4b649ac0-17e8-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.161
+ 100.64.88.161
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1688199696
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4b649ac0-17e8-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/4/4b658910-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4b658910-2244-11ee-a208-019103756a24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdf755b1df8949ce7277f52316963d3c92f87b61
--- /dev/null
+++ b/graph/incidents_graphml/4/4b658910-2244-11ee-a208-019103756a24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.14
+ 100.64.6.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689338721
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4b658910-2244-11ee-a208-019103756a24
+
+
+
diff --git a/graph/incidents_graphml/4/4b6756c0-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4b6756c0-394e-11ee-a463-c9469bb75709.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5fda43808e0bf0c9734a2ee3424129305843db5
--- /dev/null
+++ b/graph/incidents_graphml/4/4b6756c0-394e-11ee-a463-c9469bb75709.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.129
+ 100.64.11.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691871893
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4b6756c0-394e-11ee-a463-c9469bb75709
+
+
+
diff --git a/graph/incidents_graphml/4/4b6d8ad0-002a-11ed-bb11-93744d705888.graphml b/graph/incidents_graphml/4/4b6d8ad0-002a-11ed-bb11-93744d705888.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e88b7d4e0b251832229d9a27c01081bb110b842
--- /dev/null
+++ b/graph/incidents_graphml/4/4b6d8ad0-002a-11ed-bb11-93744d705888.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.197
+ USER-0015-1848.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657441717
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4b6d8ad0-002a-11ed-bb11-93744d705888
+
+
+
diff --git a/graph/incidents_graphml/4/4b74a050-17e8-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/4/4b74a050-17e8-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..07228f71407ef68f03cdc64f64b45d4c73e9aba5
--- /dev/null
+++ b/graph/incidents_graphml/4/4b74a050-17e8-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.161
+ 100.64.88.161
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688199696
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4b74a050-17e8-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/4/4b75ac70-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4b75ac70-efa8-11ec-88e9-cd157aceabd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7085e0974ee8db4e135f2ab71cac435982d84f92
--- /dev/null
+++ b/graph/incidents_graphml/4/4b75ac70-efa8-11ec-88e9-cd157aceabd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.1
+ USER-0015-1905.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655626664
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4b75ac70-efa8-11ec-88e9-cd157aceabd3
+
+
+
diff --git a/graph/incidents_graphml/4/4b7bd870-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4b7bd870-8084-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a17e71739c22f3f9fb292bda69d9cec7df6cda8d
--- /dev/null
+++ b/graph/incidents_graphml/4/4b7bd870-8084-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.213
+ 100.64.37.213
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699701618
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4b7bd870-8084-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/4/4b7c15a0-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4b7c15a0-5489-11ee-aade-a558f2065e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..968e6795aed2240f00dc36cda3e303ed3a169b24
--- /dev/null
+++ b/graph/incidents_graphml/4/4b7c15a0-5489-11ee-aade-a558f2065e36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.162
+ 100.64.7.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694865914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4b7c15a0-5489-11ee-aade-a558f2065e36
+
+
+
diff --git a/graph/incidents_graphml/4/4b827260-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4b827260-034d-11ef-8489-99c106ef6fee.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a4bc373fd7ea5db6d37fbac433010e102756ce9
--- /dev/null
+++ b/graph/incidents_graphml/4/4b827260-034d-11ef-8489-99c106ef6fee.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.226
+ USER-0015-1196.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714081598
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4b827260-034d-11ef-8489-99c106ef6fee
+
+
+
diff --git a/graph/incidents_graphml/4/4b8a5760-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4b8a5760-8084-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..019e558d5dc36d35c09558f50cfcb62a65160b3a
--- /dev/null
+++ b/graph/incidents_graphml/4/4b8a5760-8084-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699701618
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4b8a5760-8084-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/4/4b939e30-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4b939e30-dda2-11ee-8562-1ffce003597e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e91fef24dce49461754d08abd44d1c644c918bf5
--- /dev/null
+++ b/graph/incidents_graphml/4/4b939e30-dda2-11ee-8562-1ffce003597e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 100.64.46.178
+ 100.64.46.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709939961
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4b939e30-dda2-11ee-8562-1ffce003597e
+
+
+
diff --git a/graph/incidents_graphml/4/4b94eb50-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4b94eb50-becc-11ed-93f3-fff421178c5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a4e0af94b1c9ed548afc5e074440d11b5b8aace
--- /dev/null
+++ b/graph/incidents_graphml/4/4b94eb50-becc-11ed-93f3-fff421178c5e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.11
+ 100.64.2.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678402016
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4b94eb50-becc-11ed-93f3-fff421178c5e
+
+
+
diff --git a/graph/incidents_graphml/4/4b97f890-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4b97f890-becc-11ed-93f3-fff421178c5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e8c11d36cfcc4fa3c38b8f75f630ef90b16f4d7
--- /dev/null
+++ b/graph/incidents_graphml/4/4b97f890-becc-11ed-93f3-fff421178c5e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.11
+ 100.64.2.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678402016
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4b97f890-becc-11ed-93f3-fff421178c5e
+
+
+
diff --git a/graph/incidents_graphml/4/4b9da6d0-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4b9da6d0-efa8-11ec-88e9-cd157aceabd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3fc0ce21ba217025b6afae4ba7eba7120ce63e34
--- /dev/null
+++ b/graph/incidents_graphml/4/4b9da6d0-efa8-11ec-88e9-cd157aceabd3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.224
+ 100.64.81.224
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.59
+ 100.64.73.59
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655626664
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4b9da6d0-efa8-11ec-88e9-cd157aceabd3
+
+
+ INCIDENT_LINK
+ 1655626664
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4b9da6d0-efa8-11ec-88e9-cd157aceabd3
+
+
+
diff --git a/graph/incidents_graphml/4/4b9e2540-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4b9e2540-2244-11ee-a208-019103756a24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..782c25d24643278c139d3bd3e4fe1e1b2140f455
--- /dev/null
+++ b/graph/incidents_graphml/4/4b9e2540-2244-11ee-a208-019103756a24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689338721
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4b9e2540-2244-11ee-a208-019103756a24
+
+
+
diff --git a/graph/incidents_graphml/4/4ba13ac0-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4ba13ac0-8084-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..676935fba715027065dff3a55303776eb9259f41
--- /dev/null
+++ b/graph/incidents_graphml/4/4ba13ac0-8084-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699701618
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ba13ac0-8084-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/4/4ba1a7f0-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4ba1a7f0-dda2-11ee-8562-1ffce003597e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7b6172ee5956ac1a0105dd4f5ac0bd771ac1ed7
--- /dev/null
+++ b/graph/incidents_graphml/4/4ba1a7f0-dda2-11ee-8562-1ffce003597e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.47
+ 100.64.87.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1709939961
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ba1a7f0-dda2-11ee-8562-1ffce003597e
+
+
+
diff --git a/graph/incidents_graphml/4/4bae9ae0-9e15-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/4/4bae9ae0-9e15-11ee-a5ab-8550688be6fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c07b757fb2bafb438db677d3523f5d45b37dc378
--- /dev/null
+++ b/graph/incidents_graphml/4/4bae9ae0-9e15-11ee-a5ab-8550688be6fd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.155
+ 100.64.70.155
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1702952479
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bae9ae0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952479
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bae9ae0-9e15-11ee-a5ab-8550688be6fd
+
+
+
diff --git a/graph/incidents_graphml/4/4baf6390-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4baf6390-dda2-11ee-8562-1ffce003597e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c5f67d618a7193ca86f6e886dc978194659b7b3
--- /dev/null
+++ b/graph/incidents_graphml/4/4baf6390-dda2-11ee-8562-1ffce003597e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.87.47
+ 100.64.87.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709939962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4baf6390-dda2-11ee-8562-1ffce003597e
+
+
+
diff --git a/graph/incidents_graphml/4/4bb16760-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4bb16760-8084-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdd86f1856c613eeefd83a0f67519c765f12f0da
--- /dev/null
+++ b/graph/incidents_graphml/4/4bb16760-8084-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.215
+ 100.64.37.215
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699701618
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4bb16760-8084-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/4/4bbf4a10-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4bbf4a10-8084-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b619a8301850d04f94b6a2ea6c7cadd9f00d408
--- /dev/null
+++ b/graph/incidents_graphml/4/4bbf4a10-8084-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.215
+ 100.64.37.215
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699701619
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4bbf4a10-8084-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/4/4bc56ed0-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4bc56ed0-034d-11ef-8489-99c106ef6fee.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..917c6ccec24e25ec9839af29d1e4646616c1698b
--- /dev/null
+++ b/graph/incidents_graphml/4/4bc56ed0-034d-11ef-8489-99c106ef6fee.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.228
+ 100.64.11.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714081599
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4bc56ed0-034d-11ef-8489-99c106ef6fee
+
+
+
diff --git a/graph/incidents_graphml/4/4bcac770-3825-11ee-b5a7-eb9164a8ca63.graphml b/graph/incidents_graphml/4/4bcac770-3825-11ee-b5a7-eb9164a8ca63.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c11e635463cabbfc0e7dda5c57d465c5e744147c
--- /dev/null
+++ b/graph/incidents_graphml/4/4bcac770-3825-11ee-b5a7-eb9164a8ca63.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.130
+ 100.64.70.130
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.18.167
+ 100.64.18.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1691744333
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bcac770-3825-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744333
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bcac770-3825-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744333
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bcac770-3825-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744333
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bcac770-3825-11ee-b5a7-eb9164a8ca63
+
+
+
diff --git a/graph/incidents_graphml/4/4bd1af20-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4bd1af20-efa8-11ec-88e9-cd157aceabd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2f09767c2c0af03926578678d2b2f2012bcb50d
--- /dev/null
+++ b/graph/incidents_graphml/4/4bd1af20-efa8-11ec-88e9-cd157aceabd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.244
+ USER-0015-1906.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655626664
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4bd1af20-efa8-11ec-88e9-cd157aceabd3
+
+
+
diff --git a/graph/incidents_graphml/4/4bd784c0-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4bd784c0-2244-11ee-a208-019103756a24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..272c4900a6aa4c2ffe99de36db2ee9875dde35eb
--- /dev/null
+++ b/graph/incidents_graphml/4/4bd784c0-2244-11ee-a208-019103756a24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689338722
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4bd784c0-2244-11ee-a208-019103756a24
+
+
+
diff --git a/graph/incidents_graphml/4/4bd910e0-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/4bd910e0-2f75-11ee-b11e-87149c94e410.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce4f92f47bec34ce5cdc2d683e83d3b756201331
--- /dev/null
+++ b/graph/incidents_graphml/4/4bd910e0-2f75-11ee-b11e-87149c94e410.graphml
@@ -0,0 +1,531 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.66
+ 100.64.42.66
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.67
+ 100.64.42.67
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.68
+ 100.64.42.68
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.69
+ 100.64.42.69
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.70
+ 100.64.42.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.71
+ 100.64.42.71
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.72
+ 100.64.42.72
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.73
+ 100.64.42.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.74
+ 100.64.42.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.75
+ 100.64.42.75
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.217
+ 100.64.12.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.76
+ 100.64.42.76
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789132
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bd910e0-2f75-11ee-b11e-87149c94e410
+
+
+
diff --git a/graph/incidents_graphml/4/4bdc6e20-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4bdc6e20-b6d5-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8cf6fa4f2ccfafa8fb4ba77adb313176c8156b63
--- /dev/null
+++ b/graph/incidents_graphml/4/4bdc6e20-b6d5-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.183
+ 100.64.94.183
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677526273
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4bdc6e20-b6d5-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/4/4be12910-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4be12910-b6d5-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..761f269e37137f94985d1d48088b433e397e5594
--- /dev/null
+++ b/graph/incidents_graphml/4/4be12910-b6d5-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.183
+ 100.64.94.183
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677526273
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4be12910-b6d5-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/4/4be40f40-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4be40f40-b6d5-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..421726ad3f6f05596ed69142013c4ef29eaf1ea5
--- /dev/null
+++ b/graph/incidents_graphml/4/4be40f40-b6d5-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.187
+ USER-0015-2124.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677526273
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4be40f40-b6d5-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/4/4be6e4d0-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4be6e4d0-efa8-11ec-88e9-cd157aceabd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85cc1e75e52cd07c721899e87f14d42ceb5ea71a
--- /dev/null
+++ b/graph/incidents_graphml/4/4be6e4d0-efa8-11ec-88e9-cd157aceabd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.182
+ 100.64.80.182
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655626664
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4be6e4d0-efa8-11ec-88e9-cd157aceabd3
+
+
+
diff --git a/graph/incidents_graphml/4/4be87c10-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4be87c10-b6d5-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b1e9437c6aca03063f28d840ed7c096e18e31cf
--- /dev/null
+++ b/graph/incidents_graphml/4/4be87c10-b6d5-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.187
+ USER-0015-2124.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677526273
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4be87c10-b6d5-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/4/4bece9c0-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4bece9c0-8084-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4528a0d2a0ac4f79a55bbfeaad15b68bc0e4a357
--- /dev/null
+++ b/graph/incidents_graphml/4/4bece9c0-8084-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.1
+ 100.64.34.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699701619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4bece9c0-8084-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/4/4bef0bc0-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4bef0bc0-b6d5-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f05cd7d12b3eb1aad44130c84cd6990f1cfb923
--- /dev/null
+++ b/graph/incidents_graphml/4/4bef0bc0-b6d5-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.188
+ 100.64.94.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677526273
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4bef0bc0-b6d5-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/4/4bf01610-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4bf01610-dda2-11ee-8562-1ffce003597e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3847d6f0df6e9fedcb02c2f412e3863fcae3f1fb
--- /dev/null
+++ b/graph/incidents_graphml/4/4bf01610-dda2-11ee-8562-1ffce003597e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.224
+ 100.64.41.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1709939962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4bf01610-dda2-11ee-8562-1ffce003597e
+
+
+
diff --git a/graph/incidents_graphml/4/4bfec410-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4bfec410-8084-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35399ce7c4dc3d3273747b4c65773d6073701953
--- /dev/null
+++ b/graph/incidents_graphml/4/4bfec410-8084-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.217
+ 100.64.37.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699701619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4bfec410-8084-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/4/4bfff490-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4bfff490-dda2-11ee-8562-1ffce003597e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68f062c3502ccdcd8e124adcf0c2bb0e534545f0
--- /dev/null
+++ b/graph/incidents_graphml/4/4bfff490-dda2-11ee-8562-1ffce003597e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.41.224
+ 100.64.41.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1709939962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4bfff490-dda2-11ee-8562-1ffce003597e
+
+
+
diff --git a/graph/incidents_graphml/4/4c0db830-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4c0db830-8084-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..200ba31c4080780f2f1d7a23168fc5b2a84ebcd7
--- /dev/null
+++ b/graph/incidents_graphml/4/4c0db830-8084-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.217
+ 100.64.37.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699701619
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c0db830-8084-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/4/4c0e9a90-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4c0e9a90-dda2-11ee-8562-1ffce003597e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..285ff908fc3672a380c540019f4599d00dfd38d3
--- /dev/null
+++ b/graph/incidents_graphml/4/4c0e9a90-dda2-11ee-8562-1ffce003597e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.27
+ 100.64.51.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709939962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c0e9a90-dda2-11ee-8562-1ffce003597e
+
+
+
diff --git a/graph/incidents_graphml/4/4c1a6260-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4c1a6260-8084-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..104a5e38e0dd3be80f5501d9312d58396496b77d
--- /dev/null
+++ b/graph/incidents_graphml/4/4c1a6260-8084-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.251
+ 100.64.13.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699701619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c1a6260-8084-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/4/4c1e03e0-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4c1e03e0-dda2-11ee-8562-1ffce003597e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b39f04b0a7d05ee36395c25f5cbf249cddf7e31c
--- /dev/null
+++ b/graph/incidents_graphml/4/4c1e03e0-dda2-11ee-8562-1ffce003597e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.27
+ 100.64.51.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709939962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4c1e03e0-dda2-11ee-8562-1ffce003597e
+
+
+
diff --git a/graph/incidents_graphml/4/4c1e84e0-7b51-11ee-a1fb-a12255f73d88.graphml b/graph/incidents_graphml/4/4c1e84e0-7b51-11ee-a1fb-a12255f73d88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7b3f7f86e79218a36aceb30ccc15aef543bc3dc
--- /dev/null
+++ b/graph/incidents_graphml/4/4c1e84e0-7b51-11ee-a1fb-a12255f73d88.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.224
+ 100.64.17.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699129959
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4c1e84e0-7b51-11ee-a1fb-a12255f73d88
+
+
+
diff --git a/graph/incidents_graphml/4/4c275ab0-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4c275ab0-8084-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3df7eda5987fa7960a29e6d3bd2aa790c35eb2b3
--- /dev/null
+++ b/graph/incidents_graphml/4/4c275ab0-8084-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.251
+ 100.64.13.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699701619
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c275ab0-8084-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/4/4c2e5270-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/4/4c2e5270-08e2-11ef-ae93-51753793321f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96f481a5638617249b014d5f4fe301032073f549
--- /dev/null
+++ b/graph/incidents_graphml/4/4c2e5270-08e2-11ef-ae93-51753793321f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1999.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.58.162
+ USER-0015-2036.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1714695350
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c2e5270-08e2-11ef-ae93-51753793321f
+
+
+
diff --git a/graph/incidents_graphml/4/4c3f8070-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/4c3f8070-6ba5-11ee-adf9-937001d43276.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d2e40cc7377179cdec1e2421cfcd280894825c0c
--- /dev/null
+++ b/graph/incidents_graphml/4/4c3f8070-6ba5-11ee-adf9-937001d43276.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.160
+ 100.64.38.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697406818
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c3f8070-6ba5-11ee-adf9-937001d43276
+
+
+
diff --git a/graph/incidents_graphml/4/4c4b1db0-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4c4b1db0-5442-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10289885276f57ccb548a1c225c70d70e37a404f
--- /dev/null
+++ b/graph/incidents_graphml/4/4c4b1db0-5442-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.173
+ 100.64.23.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694835422
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c4b1db0-5442-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/4/4c524910-0342-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/4/4c524910-0342-11ee-8785-53111c12ea35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..161bda072288a39136dc9dd337330de4ba502ad6
--- /dev/null
+++ b/graph/incidents_graphml/4/4c524910-0342-11ee-8785-53111c12ea35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.117
+ 100.64.80.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.252
+ 100.64.71.252
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685929377
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c524910-0342-11ee-8785-53111c12ea35
+
+
+
diff --git a/graph/incidents_graphml/4/4c589130-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4c589130-47cb-11ee-be8c-ef3f416b8a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e53a0f9698887907b3d7d1d6ad2faaa959fe8ee
--- /dev/null
+++ b/graph/incidents_graphml/4/4c589130-47cb-11ee-be8c-ef3f416b8a04.graphml
@@ -0,0 +1,381 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.9
+ 100.64.3.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.170
+ 100.64.40.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.171
+ 100.64.40.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.83
+ 100.64.33.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.81
+ 100.64.33.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.178
+ 100.64.11.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.172
+ 100.64.40.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.10
+ 100.64.37.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c589130-47cb-11ee-be8c-ef3f416b8a04
+
+
+
diff --git a/graph/incidents_graphml/4/4c60eb20-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/4c60eb20-6ba5-11ee-adf9-937001d43276.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03150cb06bfcb15a67325879ad63ef775f6bc8b2
--- /dev/null
+++ b/graph/incidents_graphml/4/4c60eb20-6ba5-11ee-adf9-937001d43276.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.162
+ 100.64.38.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697406819
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c60eb20-6ba5-11ee-adf9-937001d43276
+
+
+
diff --git a/graph/incidents_graphml/4/4c698120-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4c698120-47cb-11ee-be8c-ef3f416b8a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..623fb305635390ec10107c73c46b92f0eeab7055
--- /dev/null
+++ b/graph/incidents_graphml/4/4c698120-47cb-11ee-be8c-ef3f416b8a04.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.9
+ 100.64.3.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693464898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4c698120-47cb-11ee-be8c-ef3f416b8a04
+
+
+
diff --git a/graph/incidents_graphml/4/4c6b4f50-0342-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/4/4c6b4f50-0342-11ee-8785-53111c12ea35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..789e783083eca709e030adcadbef96f2b7c821e7
--- /dev/null
+++ b/graph/incidents_graphml/4/4c6b4f50-0342-11ee-8785-53111c12ea35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.252
+ 100.64.71.252
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.80.117
+ 100.64.80.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1685929378
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c6b4f50-0342-11ee-8785-53111c12ea35
+
+
+
diff --git a/graph/incidents_graphml/4/4c705470-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/4c705470-6ba5-11ee-adf9-937001d43276.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e3f4c2a4a3f7c0d3e40510f61002a140b1ea79e
--- /dev/null
+++ b/graph/incidents_graphml/4/4c705470-6ba5-11ee-adf9-937001d43276.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.162
+ 100.64.38.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697406819
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c705470-6ba5-11ee-adf9-937001d43276
+
+
+
diff --git a/graph/incidents_graphml/4/4c76bab0-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4c76bab0-f859-11ec-94e5-2949377000d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e08c8ce360d5d08a702443d71701a262f2d3a07b
--- /dev/null
+++ b/graph/incidents_graphml/4/4c76bab0-f859-11ec-94e5-2949377000d8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.247
+ 100.64.72.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.245
+ 100.64.70.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656582296
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c76bab0-f859-11ec-94e5-2949377000d8
+
+
+ INCIDENT_LINK
+ 1656582296
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c76bab0-f859-11ec-94e5-2949377000d8
+
+
+
diff --git a/graph/incidents_graphml/4/4c7ba300-0342-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/4/4c7ba300-0342-11ee-8785-53111c12ea35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4ccef725eb85baf9d7a9340dcbab9d20fb04fef
--- /dev/null
+++ b/graph/incidents_graphml/4/4c7ba300-0342-11ee-8785-53111c12ea35.graphml
@@ -0,0 +1,135 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.118
+ 100.64.80.118
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.224
+ 100.64.71.224
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.29.4
+ 100.64.29.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.68.143
+ 100.64.68.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685929378
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4c7ba300-0342-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685929378
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4c7ba300-0342-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685929378
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4c7ba300-0342-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685929378
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4c7ba300-0342-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685929378
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4c7ba300-0342-11ee-8785-53111c12ea35
+
+
+
diff --git a/graph/incidents_graphml/4/4c870a20-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/4/4c870a20-2f33-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e090ae003cbe3f844a2200a3195c186b288d715
--- /dev/null
+++ b/graph/incidents_graphml/4/4c870a20-2f33-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.51
+ 100.64.82.51
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.37.239
+ 100.64.37.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690760787
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4c870a20-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760787
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4c870a20-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760787
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4c870a20-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760787
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4c870a20-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760787
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4c870a20-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760787
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4c870a20-2f33-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/4/4c8975a0-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4c8975a0-0727-11ee-9050-71ab19a2f61d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..490f35c8cd288e654e34fb7a944e08fabd80bee9
--- /dev/null
+++ b/graph/incidents_graphml/4/4c8975a0-0727-11ee-9050-71ab19a2f61d.graphml
@@ -0,0 +1,481 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.180
+ 100.64.71.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.238
+ 100.64.73.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.14.48
+ 100.64.14.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.239
+ 100.64.73.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.240
+ 100.64.73.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.241
+ 100.64.73.241
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.242
+ 100.64.73.242
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.53
+ 100.64.73.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.243
+ 100.64.73.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.244
+ 100.64.73.244
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.245
+ 100.64.73.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.18.40
+ 100.64.18.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.246
+ 100.64.73.246
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357586
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4c8975a0-0727-11ee-9050-71ab19a2f61d
+
+
+
diff --git a/graph/incidents_graphml/4/4c926940-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4c926940-394e-11ee-a463-c9469bb75709.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..925e91073d809166801c9cd1f20a216c5c0987f2
--- /dev/null
+++ b/graph/incidents_graphml/4/4c926940-394e-11ee-a463-c9469bb75709.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.243
+ 100.64.20.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691871895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4c926940-394e-11ee-a463-c9469bb75709
+
+
+
diff --git a/graph/incidents_graphml/4/4ca0e540-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/4ca0e540-e873-11ee-9a77-df185ba75d8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bfaf954601f5daca1bcdd85601dce0c09bdbd86
--- /dev/null
+++ b/graph/incidents_graphml/4/4ca0e540-e873-11ee-9a77-df185ba75d8e.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.23
+ 100.64.25.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.70.205
+ 100.64.70.205
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.206
+ 100.64.70.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711129239
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ca0e540-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129239
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ca0e540-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129239
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ca0e540-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129239
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ca0e540-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129239
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ca0e540-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129239
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ca0e540-e873-11ee-9a77-df185ba75d8e
+
+
+
diff --git a/graph/incidents_graphml/4/4ca16520-d09a-11ed-8538-d1df98b5b935.graphml b/graph/incidents_graphml/4/4ca16520-d09a-11ed-8538-d1df98b5b935.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4f10be4f80cb552253a964a69ba8303f8adb08b
--- /dev/null
+++ b/graph/incidents_graphml/4/4ca16520-d09a-11ed-8538-d1df98b5b935.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.11
+ 100.64.68.11
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ INCIDENT_LINK
+ 1680359664
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ 4ca16520-d09a-11ed-8538-d1df98b5b935
+
+
+
diff --git a/graph/incidents_graphml/4/4ca99b30-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/4/4ca99b30-f9b3-11ee-9419-336c262dcd55.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08a28dc8dc04831c25a1b65125bb6917be67a3ba
--- /dev/null
+++ b/graph/incidents_graphml/4/4ca99b30-f9b3-11ee-9419-336c262dcd55.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.190
+ 100.64.41.190
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713025897
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ca99b30-f9b3-11ee-9419-336c262dcd55
+
+
+
diff --git a/graph/incidents_graphml/4/4cae8090-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/4/4cae8090-fe0c-11ec-809b-91d71d0233d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b7bce29dc1f4d95ef6db29b25676cad25679009
--- /dev/null
+++ b/graph/incidents_graphml/4/4cae8090-fe0c-11ec-809b-91d71d0233d6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.13
+ 100.64.79.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.72
+ 100.64.73.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657208932
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4cae8090-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208932
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4cae8090-fe0c-11ec-809b-91d71d0233d6
+
+
+
diff --git a/graph/incidents_graphml/4/4cb6c2b0-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/4/4cb6c2b0-20a2-11ed-ab44-599bbcff3eda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a269dc085656dab2849d066959f72ba6bd11636
--- /dev/null
+++ b/graph/incidents_graphml/4/4cb6c2b0-20a2-11ed-ab44-599bbcff3eda.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.196
+ 100.64.72.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.76
+ 100.64.79.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.77
+ 100.64.79.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4cb6c2b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4cb6c2b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4cb6c2b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4cb6c2b0-20a2-11ed-ab44-599bbcff3eda
+
+
+
diff --git a/graph/incidents_graphml/4/4cb7e290-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/4cb7e290-33c8-11ef-bc42-75e180de3d4b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0ddd14a9de144bd2b9fc943c31a7cf20b2880a7
--- /dev/null
+++ b/graph/incidents_graphml/4/4cb7e290-33c8-11ef-bc42-75e180de3d4b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.212
+ 100.64.66.212
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719412084
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cb7e290-33c8-11ef-bc42-75e180de3d4b
+
+
+
diff --git a/graph/incidents_graphml/4/4cb87060-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/4/4cb87060-20a2-11ed-ab44-599bbcff3eda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d3df9dd85ac8b9d15ca1e792e42bc7248f234ba
--- /dev/null
+++ b/graph/incidents_graphml/4/4cb87060-20a2-11ed-ab44-599bbcff3eda.graphml
@@ -0,0 +1,193 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.53
+ 100.64.1.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.33
+ 100.64.11.33
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.78
+ 100.64.79.78
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.39
+ 100.64.1.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.73
+ 100.64.72.73
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.44.87
+ 100.64.44.87
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cb87060-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cb87060-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cb87060-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cb87060-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cb87060-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cb87060-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cb87060-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011696
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cb87060-20a2-11ed-ab44-599bbcff3eda
+
+
+
diff --git a/graph/incidents_graphml/4/4cbc8dd0-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4cbc8dd0-dda2-11ee-8562-1ffce003597e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00d6ca5bc9730bc5095ba99cd90530a5aff3863c
--- /dev/null
+++ b/graph/incidents_graphml/4/4cbc8dd0-dda2-11ee-8562-1ffce003597e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.9.150
+ 100.64.9.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1709939963
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4cbc8dd0-dda2-11ee-8562-1ffce003597e
+
+
+
diff --git a/graph/incidents_graphml/4/4cc41110-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4cc41110-f83f-11ee-a565-4974183b9eb9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b09d071e81dca2079592e04da9155feb7aba96b
--- /dev/null
+++ b/graph/incidents_graphml/4/4cc41110-f83f-11ee-a565-4974183b9eb9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.84
+ 100.64.22.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712866125
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4cc41110-f83f-11ee-a565-4974183b9eb9
+
+
+
diff --git a/graph/incidents_graphml/4/4cc434e0-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/4/4cc434e0-2227-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4c16ef69dfa4e750000414551ae74b4ecf8b54b
--- /dev/null
+++ b/graph/incidents_graphml/4/4cc434e0-2227-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.96.216.116
+ 10.96.216.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689326268
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4cc434e0-2227-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/4/4ccc2d10-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/4/4ccc2d10-81bf-11ee-967b-47c68907a0bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e56abdb4504b2e8eb8b41ec2ac09c4ba7f8199dd
--- /dev/null
+++ b/graph/incidents_graphml/4/4ccc2d10-81bf-11ee-967b-47c68907a0bd.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.73
+ 100.64.68.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.159
+ 100.64.68.159
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1699836912
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ccc2d10-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836912
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ccc2d10-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836912
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ccc2d10-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836912
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ccc2d10-81bf-11ee-967b-47c68907a0bd
+
+
+
diff --git a/graph/incidents_graphml/4/4cd2bcc0-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/4/4cd2bcc0-535c-11ee-aeed-cffe9ef9c7cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..732ad286920ca3db0b999e614a15cac9e737c3ac
--- /dev/null
+++ b/graph/incidents_graphml/4/4cd2bcc0-535c-11ee-aeed-cffe9ef9c7cb.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.12.134
+ 100.64.12.134
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1694736638
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4cd2bcc0-535c-11ee-aeed-cffe9ef9c7cb
+
+
+ INCIDENT_LINK
+ 1694736638
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4cd2bcc0-535c-11ee-aeed-cffe9ef9c7cb
+
+
+
diff --git a/graph/incidents_graphml/4/4cd48bd0-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4cd48bd0-f83f-11ee-a565-4974183b9eb9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d79c9a898a7a3da3aeec088e97e173b1bc682e2
--- /dev/null
+++ b/graph/incidents_graphml/4/4cd48bd0-f83f-11ee-a565-4974183b9eb9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.84
+ 100.64.22.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712866125
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4cd48bd0-f83f-11ee-a565-4974183b9eb9
+
+
+
diff --git a/graph/incidents_graphml/4/4cdb6b50-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/4/4cdb6b50-140e-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24c8c01f4344aff7d2b413adbec973b9055a79b0
--- /dev/null
+++ b/graph/incidents_graphml/4/4cdb6b50-140e-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.86
+ 100.64.52.86
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687776214
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4cdb6b50-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776214
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4cdb6b50-140e-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/4/4cdb9300-331d-11ed-b7a7-43dc40721942.graphml b/graph/incidents_graphml/4/4cdb9300-331d-11ed-b7a7-43dc40721942.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4edc2512eacf179b32e64ec07909d8c3106ffc2e
--- /dev/null
+++ b/graph/incidents_graphml/4/4cdb9300-331d-11ed-b7a7-43dc40721942.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.45.70
+ 192.168.45.70
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Windows Active Directory"]
+
+
+ HOST
+ 100.64.1.171
+ USER-0015-1635.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663043645
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4cdb9300-331d-11ed-b7a7-43dc40721942
+
+
+
diff --git a/graph/incidents_graphml/4/4cdc98f0-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4cdc98f0-dda2-11ee-8562-1ffce003597e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..301b9b5822d10476713b4b975c81e8c9dcd03aaf
--- /dev/null
+++ b/graph/incidents_graphml/4/4cdc98f0-dda2-11ee-8562-1ffce003597e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.151
+ 100.64.8.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1709939963
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cdc98f0-dda2-11ee-8562-1ffce003597e
+
+
+
diff --git a/graph/incidents_graphml/4/4ce46a50-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4ce46a50-f83f-11ee-a565-4974183b9eb9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6e50ec27cd36678e1bfaea2343f67d7c142929f
--- /dev/null
+++ b/graph/incidents_graphml/4/4ce46a50-f83f-11ee-a565-4974183b9eb9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.205
+ 100.64.22.205
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712866125
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ce46a50-f83f-11ee-a565-4974183b9eb9
+
+
+
diff --git a/graph/incidents_graphml/4/4ceeade0-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4ceeade0-1ed2-11ee-b536-839ca7748106.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a67a9b915966a345aeb89af8c87c8bbf5e1452b
--- /dev/null
+++ b/graph/incidents_graphml/4/4ceeade0-1ed2-11ee-b536-839ca7748106.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.39
+ 100.64.44.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688959907
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ceeade0-1ed2-11ee-b536-839ca7748106
+
+
+
diff --git a/graph/incidents_graphml/4/4cf17cb0-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4cf17cb0-5c8e-11ee-b468-75a223656fa7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3880859b61edf556bff0719b6b0d243a19c25ef3
--- /dev/null
+++ b/graph/incidents_graphml/4/4cf17cb0-5c8e-11ee-b468-75a223656fa7.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.84
+ 100.64.19.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695747674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cf17cb0-5c8e-11ee-b468-75a223656fa7
+
+
+ INCIDENT_LINK
+ 1695747674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cf17cb0-5c8e-11ee-b468-75a223656fa7
+
+
+
diff --git a/graph/incidents_graphml/4/4cf4e510-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4cf4e510-f83f-11ee-a565-4974183b9eb9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..acf4144c8bf95eb528407f8e855b7c426957b6c3
--- /dev/null
+++ b/graph/incidents_graphml/4/4cf4e510-f83f-11ee-a565-4974183b9eb9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.205
+ 100.64.22.205
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712866125
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4cf4e510-f83f-11ee-a565-4974183b9eb9
+
+
+
diff --git a/graph/incidents_graphml/4/4cf980b0-91fc-11ee-8ab2-89488b5d7963.graphml b/graph/incidents_graphml/4/4cf980b0-91fc-11ee-8ab2-89488b5d7963.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eeb94d52f5526e5c7353821f59abb45841402742
--- /dev/null
+++ b/graph/incidents_graphml/4/4cf980b0-91fc-11ee-8ab2-89488b5d7963.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.192
+ 100.64.14.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701622330
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4cf980b0-91fc-11ee-8ab2-89488b5d7963
+
+
+
diff --git a/graph/incidents_graphml/4/4cf9bea0-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/4cf9bea0-f5ee-11ec-ae2b-8fa08eaee108.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99ec2ac01557b08e4394d6b2ba718577152fde35
--- /dev/null
+++ b/graph/incidents_graphml/4/4cf9bea0-f5ee-11ec-ae2b-8fa08eaee108.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.93
+ USER-0015-1916.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656316438
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4cf9bea0-f5ee-11ec-ae2b-8fa08eaee108
+
+
+
diff --git a/graph/incidents_graphml/4/4d0097e0-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4d0097e0-5c8e-11ee-b468-75a223656fa7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c018f28df8565caf79f3cc15c25ac20a7cad73cc
--- /dev/null
+++ b/graph/incidents_graphml/4/4d0097e0-5c8e-11ee-b468-75a223656fa7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.84
+ 100.64.19.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695747674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d0097e0-5c8e-11ee-b468-75a223656fa7
+
+
+
diff --git a/graph/incidents_graphml/4/4d021820-30ed-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/4/4d021820-30ed-11ef-bae8-75e6361c756f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bfc5f5beeae46585d00c941ea6a25d85a810864c
--- /dev/null
+++ b/graph/incidents_graphml/4/4d021820-30ed-11ef-bae8-75e6361c756f.graphml
@@ -0,0 +1,725 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.237
+ 100.64.38.237
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.131
+ 100.64.27.131
+ ["Exploiting Host"]
+ 0.8875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.224
+ 100.64.36.224
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.67
+ 100.64.53.67
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.51
+ 100.64.49.51
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.192
+ 100.64.21.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.2
+ 100.64.51.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.68
+ 100.64.53.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.24
+ 100.64.45.24
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.69
+ 100.64.53.69
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.111
+ 100.64.5.111
+ ["Exploiting Host"]
+ 0.8875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.66
+ 100.64.23.66
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.79
+ 100.64.5.79
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.66
+ 100.64.6.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.39
+ 100.64.17.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.70
+ 100.64.53.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098123
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d021820-30ed-11ef-bae8-75e6361c756f
+
+
+
diff --git a/graph/incidents_graphml/4/4d055370-9e24-11ee-9ce0-3dd61bd6a247.graphml b/graph/incidents_graphml/4/4d055370-9e24-11ee-9ce0-3dd61bd6a247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1769510fa44afd6a842cae5f1ad683c03af84c9f
--- /dev/null
+++ b/graph/incidents_graphml/4/4d055370-9e24-11ee-9ce0-3dd61bd6a247.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.84
+ 100.64.14.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702958924
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d055370-9e24-11ee-9ce0-3dd61bd6a247
+
+
+
diff --git a/graph/incidents_graphml/4/4d099580-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/4/4d099580-f9b3-11ee-9419-336c262dcd55.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d87f8d271aed61c7552d28a752a87f6a17004559
--- /dev/null
+++ b/graph/incidents_graphml/4/4d099580-f9b3-11ee-9419-336c262dcd55.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.192
+ 100.64.41.192
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713025898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d099580-f9b3-11ee-9419-336c262dcd55
+
+
+
diff --git a/graph/incidents_graphml/4/4d0a7450-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4d0a7450-becc-11ed-93f3-fff421178c5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20efbf76a5066c4ffe5b187a987af9c555f7a292
--- /dev/null
+++ b/graph/incidents_graphml/4/4d0a7450-becc-11ed-93f3-fff421178c5e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.250
+ 100.64.17.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678402019
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d0a7450-becc-11ed-93f3-fff421178c5e
+
+
+
diff --git a/graph/incidents_graphml/4/4d0ca960-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4d0ca960-2244-11ee-a208-019103756a24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..632d950d022879cea5f4084f0a1b1a102b3cfc64
--- /dev/null
+++ b/graph/incidents_graphml/4/4d0ca960-2244-11ee-a208-019103756a24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689338724
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d0ca960-2244-11ee-a208-019103756a24
+
+
+
diff --git a/graph/incidents_graphml/4/4d1399b0-002a-11ed-bb11-93744d705888.graphml b/graph/incidents_graphml/4/4d1399b0-002a-11ed-bb11-93744d705888.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c24ea595f4520eaf5c1c5dcdf58b725b43096d18
--- /dev/null
+++ b/graph/incidents_graphml/4/4d1399b0-002a-11ed-bb11-93744d705888.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.183
+ 100.64.80.183
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657441720
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d1399b0-002a-11ed-bb11-93744d705888
+
+
+
diff --git a/graph/incidents_graphml/4/4d13f970-9e24-11ee-9ce0-3dd61bd6a247.graphml b/graph/incidents_graphml/4/4d13f970-9e24-11ee-9ce0-3dd61bd6a247.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2c18255f6ac48d918239fcae4c6b4c1f3e6214c
--- /dev/null
+++ b/graph/incidents_graphml/4/4d13f970-9e24-11ee-9ce0-3dd61bd6a247.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.84
+ 100.64.14.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702958924
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4d13f970-9e24-11ee-9ce0-3dd61bd6a247
+
+
+
diff --git a/graph/incidents_graphml/4/4d1449e0-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4d1449e0-4c1a-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91b7a927f00427491f75e8fb5d4c6427f919fd77
--- /dev/null
+++ b/graph/incidents_graphml/4/4d1449e0-4c1a-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.32
+ 100.64.12.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693938634
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d1449e0-4c1a-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/4/4d16e1e0-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4d16e1e0-d325-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45ccdd799098e6a6925e60e25a431a5205911393
--- /dev/null
+++ b/graph/incidents_graphml/4/4d16e1e0-d325-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.170
+ 100.64.42.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708786765
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d16e1e0-d325-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/4d194cf0-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/4/4d194cf0-f9b3-11ee-9419-336c262dcd55.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f1c4778331e87bd635871c46b3695deabde2c7c
--- /dev/null
+++ b/graph/incidents_graphml/4/4d194cf0-f9b3-11ee-9419-336c262dcd55.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.192
+ 100.64.41.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713025898
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4d194cf0-f9b3-11ee-9419-336c262dcd55
+
+
+
diff --git a/graph/incidents_graphml/4/4d196760-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4d196760-1ed2-11ee-b536-839ca7748106.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cecd7bfb9da13906563b56b5140fa0bf9a936428
--- /dev/null
+++ b/graph/incidents_graphml/4/4d196760-1ed2-11ee-b536-839ca7748106.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.39
+ 100.64.44.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688959908
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4d196760-1ed2-11ee-b536-839ca7748106
+
+
+
diff --git a/graph/incidents_graphml/4/4d228150-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4d228150-0727-11ee-9050-71ab19a2f61d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..708631ae883e746796e2964280ea874948f10f3b
--- /dev/null
+++ b/graph/incidents_graphml/4/4d228150-0727-11ee-9050-71ab19a2f61d.graphml
@@ -0,0 +1,767 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.247
+ 100.64.73.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.58
+ 100.64.1.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.55
+ 100.64.1.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.7.67
+ 100.64.7.67
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.231
+ 100.64.10.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.248
+ 100.64.73.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.249
+ 100.64.73.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.14.105
+ 100.64.14.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.105
+ 100.64.11.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.14.41
+ 100.64.14.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.130
+ 100.64.71.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.250
+ 100.64.73.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.23.203
+ 100.64.23.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.126
+ 100.64.71.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.251
+ 100.64.73.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.21
+ 100.64.71.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.114
+ 100.64.11.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.199
+ 100.64.72.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d228150-0727-11ee-9050-71ab19a2f61d
+
+
+
diff --git a/graph/incidents_graphml/4/4d23ed60-002a-11ed-bb11-93744d705888.graphml b/graph/incidents_graphml/4/4d23ed60-002a-11ed-bb11-93744d705888.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e27786300c4ee27e49443a2e5ad4a886c1d117af
--- /dev/null
+++ b/graph/incidents_graphml/4/4d23ed60-002a-11ed-bb11-93744d705888.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.183
+ 100.64.80.183
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657441720
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4d23ed60-002a-11ed-bb11-93744d705888
+
+
+
diff --git a/graph/incidents_graphml/4/4d2e6180-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4d2e6180-d325-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7968bd32d215379e796cbade10cd36de064f8578
--- /dev/null
+++ b/graph/incidents_graphml/4/4d2e6180-d325-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.170
+ 100.64.42.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708786765
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d2e6180-d325-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/4d2e8a40-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/4d2e8a40-f5ee-11ec-ae2b-8fa08eaee108.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f8ad71b6ab1e98390f550dd7d885f8a40790e80
--- /dev/null
+++ b/graph/incidents_graphml/4/4d2e8a40-f5ee-11ec-ae2b-8fa08eaee108.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.38
+ USER-0015-1917.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656316438
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d2e8a40-f5ee-11ec-ae2b-8fa08eaee108
+
+
+
diff --git a/graph/incidents_graphml/4/4d2f3a60-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4d2f3a60-becc-11ed-93f3-fff421178c5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..caa6b9ea0890157725bd97c4b0fe524b81d4d110
--- /dev/null
+++ b/graph/incidents_graphml/4/4d2f3a60-becc-11ed-93f3-fff421178c5e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.250
+ 100.64.17.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678402019
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d2f3a60-becc-11ed-93f3-fff421178c5e
+
+
+
diff --git a/graph/incidents_graphml/4/4d3221e0-3558-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/4/4d3221e0-3558-11ef-bea6-a94fc9e3b8ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e84cf8c166568ebce25e6198d952e3bd02425f8d
--- /dev/null
+++ b/graph/incidents_graphml/4/4d3221e0-3558-11ef-bea6-a94fc9e3b8ec.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.37.13
+ USER-0015-2042.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.77
+ USER-0015-2043.example.internal
+ ["Exploiting Target"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d3221e0-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d3221e0-3558-11ef-bea6-a94fc9e3b8ec
+
+
+
diff --git a/graph/incidents_graphml/4/4d33a620-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4d33a620-1ed2-11ee-b536-839ca7748106.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1542b5d84d7209037bbddac58490edcf04829094
--- /dev/null
+++ b/graph/incidents_graphml/4/4d33a620-1ed2-11ee-b536-839ca7748106.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.134
+ 100.64.19.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688959908
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d33a620-1ed2-11ee-b536-839ca7748106
+
+
+
diff --git a/graph/incidents_graphml/4/4d33b8c0-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4d33b8c0-4c1a-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1a1295254ef04beea38914e377e8d228a013627
--- /dev/null
+++ b/graph/incidents_graphml/4/4d33b8c0-4c1a-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.205
+ 100.64.23.205
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693938634
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d33b8c0-4c1a-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/4/4d36cca0-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4d36cca0-0727-11ee-9050-71ab19a2f61d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85bf8d36e35ffdf8e4b6051b65810b7e2a94a750
--- /dev/null
+++ b/graph/incidents_graphml/4/4d36cca0-0727-11ee-9050-71ab19a2f61d.graphml
@@ -0,0 +1,301 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.252
+ 100.64.73.252
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.225
+ 100.64.71.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.21.56
+ 100.64.21.56
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.21.65
+ 100.64.21.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.185
+ 100.64.73.185
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.253
+ 100.64.73.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.158
+ HOST-13435
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.254
+ 100.64.73.254
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.13.59
+ 100.64.13.59
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d36cca0-0727-11ee-9050-71ab19a2f61d
+
+
+
diff --git a/graph/incidents_graphml/4/4d38ad80-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/4d38ad80-6ba5-11ee-adf9-937001d43276.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d64e4561b9d811e2de2d654ba6545f1c91c2db9
--- /dev/null
+++ b/graph/incidents_graphml/4/4d38ad80-6ba5-11ee-adf9-937001d43276.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697406820
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d38ad80-6ba5-11ee-adf9-937001d43276
+
+
+
diff --git a/graph/incidents_graphml/4/4d422770-3558-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/4/4d422770-3558-11ef-bea6-a94fc9e3b8ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd91dbe4bd3b1dd58dcde3d759d32e821dae2daf
--- /dev/null
+++ b/graph/incidents_graphml/4/4d422770-3558-11ef-bea6-a94fc9e3b8ec.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.90.79
+ USER-0015-2044.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.21.150
+ 100.64.21.150
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.80
+ 100.64.90.80
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.130
+ 100.64.39.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.983125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.234
+ 100.64.59.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 192.0.2.182
+ 192.0.2.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719583884
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d422770-3558-11ef-bea6-a94fc9e3b8ec
+
+
+
diff --git a/graph/incidents_graphml/4/4d437030-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4d437030-4c1a-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66dd07288558494af3191e6a9ea7c11d67a52bfc
--- /dev/null
+++ b/graph/incidents_graphml/4/4d437030-4c1a-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.205
+ 100.64.23.205
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693938634
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4d437030-4c1a-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/4/4d491e30-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4d491e30-2aec-11ee-9870-89912039a0d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71100d5a7b0596d969af4990d30f33653480e392
--- /dev/null
+++ b/graph/incidents_graphml/4/4d491e30-2aec-11ee-9870-89912039a0d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.200
+ 100.64.20.200
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690290489
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4d491e30-2aec-11ee-9870-89912039a0d0
+
+
+
diff --git a/graph/incidents_graphml/4/4d499150-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4d499150-0727-11ee-9050-71ab19a2f61d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc00f7989b9822bea8ca0ffa2d00beea2b8570c9
--- /dev/null
+++ b/graph/incidents_graphml/4/4d499150-0727-11ee-9050-71ab19a2f61d.graphml
@@ -0,0 +1,373 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.85
+ 100.64.73.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.255
+ 100.64.73.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.187
+ 100.64.10.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.12.59
+ 100.64.12.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.195
+ 100.64.73.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.50.138
+ USER-0015-1641.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.86
+ 100.64.73.86
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.1
+ 100.64.74.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.68.225
+ 100.64.68.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d499150-0727-11ee-9050-71ab19a2f61d
+
+
+
diff --git a/graph/incidents_graphml/4/4d4e8470-06fc-11ed-b0df-8957a66f2fd5.graphml b/graph/incidents_graphml/4/4d4e8470-06fc-11ed-b0df-8957a66f2fd5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eeb99b7d8bb99a8b342e1e062b572827b64963a6
--- /dev/null
+++ b/graph/incidents_graphml/4/4d4e8470-06fc-11ed-b0df-8957a66f2fd5.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.5
+ 100.64.72.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 192.168.31.246
+ 192.168.31.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658191621
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d4e8470-06fc-11ed-b0df-8957a66f2fd5
+
+
+ INCIDENT_LINK
+ 1658191621
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d4e8470-06fc-11ed-b0df-8957a66f2fd5
+
+
+
diff --git a/graph/incidents_graphml/4/4d5007c0-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4d5007c0-1ed2-11ee-b536-839ca7748106.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e671718d4b7f4051247d7d669f250eefd7454578
--- /dev/null
+++ b/graph/incidents_graphml/4/4d5007c0-1ed2-11ee-b536-839ca7748106.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.134
+ 100.64.19.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688959908
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4d5007c0-1ed2-11ee-b536-839ca7748106
+
+
+
diff --git a/graph/incidents_graphml/4/4d54faa0-3f5c-11ee-a7a8-a9c952ce7042.graphml b/graph/incidents_graphml/4/4d54faa0-3f5c-11ee-a7a8-a9c952ce7042.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f6b5ac594389e101f90879d9337774e63ce282c
--- /dev/null
+++ b/graph/incidents_graphml/4/4d54faa0-3f5c-11ee-a7a8-a9c952ce7042.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.244
+ 100.64.69.244
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692537616
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d54faa0-3f5c-11ee-a7a8-a9c952ce7042
+
+
+ INCIDENT_LINK
+ 1692537616
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d54faa0-3f5c-11ee-a7a8-a9c952ce7042
+
+
+
diff --git a/graph/incidents_graphml/4/4d572160-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/4/4d572160-20a2-11ed-ab44-599bbcff3eda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8cac91081e0f247aca1fb61c2cdb36397f4bb834
--- /dev/null
+++ b/graph/incidents_graphml/4/4d572160-20a2-11ed-ab44-599bbcff3eda.graphml
@@ -0,0 +1,277 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.56
+ 100.64.76.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.114
+ 100.64.71.114
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.79
+ 100.64.79.79
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.25
+ 100.64.1.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.80
+ 100.64.79.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.81
+ 100.64.79.81
+ ["Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.82
+ 100.64.79.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ ACTOR
+ []
+ 0.25
+ []
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011697
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d572160-20a2-11ed-ab44-599bbcff3eda
+
+
+
diff --git a/graph/incidents_graphml/4/4d5991e0-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/4d5991e0-f5ee-11ec-ae2b-8fa08eaee108.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a52700590316de2d83c7e96f882f0d91efe9a099
--- /dev/null
+++ b/graph/incidents_graphml/4/4d5991e0-f5ee-11ec-ae2b-8fa08eaee108.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.38
+ USER-0015-1917.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656316439
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4d5991e0-f5ee-11ec-ae2b-8fa08eaee108
+
+
+
diff --git a/graph/incidents_graphml/4/4d5a5400-ea51-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/4/4d5a5400-ea51-11ee-a5b0-ebb549372bba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..624d391db3d9aa3ac6181d53a8b390aec1438f5b
--- /dev/null
+++ b/graph/incidents_graphml/4/4d5a5400-ea51-11ee-a5b0-ebb549372bba.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.6.202
+ 100.64.6.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711334540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d5a5400-ea51-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711334540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d5a5400-ea51-11ee-a5b0-ebb549372bba
+
+
+
diff --git a/graph/incidents_graphml/4/4d5c6280-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4d5c6280-034d-11ef-8489-99c106ef6fee.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..409164b08b7d9cf62df90ad378823ed8526936e0
--- /dev/null
+++ b/graph/incidents_graphml/4/4d5c6280-034d-11ef-8489-99c106ef6fee.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.230
+ 100.64.11.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714081601
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d5c6280-034d-11ef-8489-99c106ef6fee
+
+
+
diff --git a/graph/incidents_graphml/4/4d600e00-4522-11ef-b505-f5f313488713.graphml b/graph/incidents_graphml/4/4d600e00-4522-11ef-b505-f5f313488713.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a88392fc6e33aae7a36c293e7608a6b890e94752
--- /dev/null
+++ b/graph/incidents_graphml/4/4d600e00-4522-11ef-b505-f5f313488713.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.106.52
+ 172.29.106.52
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.0.148
+ 100.64.0.148
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1721319910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d600e00-4522-11ef-b505-f5f313488713
+
+
+ INCIDENT_LINK
+ 1721319910
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d600e00-4522-11ef-b505-f5f313488713
+
+
+
diff --git a/graph/incidents_graphml/4/4d66cce0-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4d66cce0-47cb-11ee-be8c-ef3f416b8a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04f5a2fac36f2c8b428ff675f59f20a14105f2e8
--- /dev/null
+++ b/graph/incidents_graphml/4/4d66cce0-47cb-11ee-be8c-ef3f416b8a04.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.155
+ 100.64.7.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693464899
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d66cce0-47cb-11ee-be8c-ef3f416b8a04
+
+
+
diff --git a/graph/incidents_graphml/4/4d67e700-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4d67e700-32d2-11ee-a4d6-4bc10938c808.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00064f2611ab3fa5ed29322bc17d6a5c26ba5a0a
--- /dev/null
+++ b/graph/incidents_graphml/4/4d67e700-32d2-11ee-a4d6-4bc10938c808.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.49
+ 100.64.25.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691158931
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d67e700-32d2-11ee-a4d6-4bc10938c808
+
+
+ INCIDENT_LINK
+ 1691158931
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d67e700-32d2-11ee-a4d6-4bc10938c808
+
+
+
diff --git a/graph/incidents_graphml/4/4d6f9140-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4d6f9140-b6d5-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b443f524e9a6adc54a23b63765f575ab446aeb9
--- /dev/null
+++ b/graph/incidents_graphml/4/4d6f9140-b6d5-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.30.177
+ 172.22.30.177
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.191
+ 100.64.94.191
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677526276
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4d6f9140-b6d5-11ed-b037-89e5a8e9b2b8
+
+
+ INCIDENT_LINK
+ 1677526276
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4d6f9140-b6d5-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/4/4d6fea80-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4d6fea80-034d-11ef-8489-99c106ef6fee.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3558dedbd585410e2a712a59e769c92c7dca33fa
--- /dev/null
+++ b/graph/incidents_graphml/4/4d6fea80-034d-11ef-8489-99c106ef6fee.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.230
+ 100.64.11.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714081601
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d6fea80-034d-11ef-8489-99c106ef6fee
+
+
+
diff --git a/graph/incidents_graphml/4/4d77c1a0-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4d77c1a0-699d-11ee-b92f-dba1102b39ba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e03d359d7dfc5eb14f5218cc2db8d9bc08f0f400
--- /dev/null
+++ b/graph/incidents_graphml/4/4d77c1a0-699d-11ee-b92f-dba1102b39ba.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.103
+ 100.64.56.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697183482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d77c1a0-699d-11ee-b92f-dba1102b39ba
+
+
+
diff --git a/graph/incidents_graphml/4/4d7f8f70-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4d7f8f70-2244-11ee-a208-019103756a24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7ebd68b40d492155d7be18b0754e25c3734e1b8
--- /dev/null
+++ b/graph/incidents_graphml/4/4d7f8f70-2244-11ee-a208-019103756a24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.31
+ 100.64.15.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689338725
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d7f8f70-2244-11ee-a208-019103756a24
+
+
+
diff --git a/graph/incidents_graphml/4/4d7fe020-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4d7fe020-f91c-11ed-8f07-3d261ba980ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c58d4ce91bdbf11c4c9d58c9536f62f68fdb41c
--- /dev/null
+++ b/graph/incidents_graphml/4/4d7fe020-f91c-11ed-8f07-3d261ba980ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.246
+ 100.64.72.246
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684813547
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4d7fe020-f91c-11ed-8f07-3d261ba980ce
+
+
+
diff --git a/graph/incidents_graphml/4/4d813b60-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4d813b60-32d2-11ee-a4d6-4bc10938c808.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b886f99db35ab58083244232d99d97afd712fd90
--- /dev/null
+++ b/graph/incidents_graphml/4/4d813b60-32d2-11ee-a4d6-4bc10938c808.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.49
+ 100.64.25.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691158932
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d813b60-32d2-11ee-a4d6-4bc10938c808
+
+
+
diff --git a/graph/incidents_graphml/4/4d830770-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4d830770-47cb-11ee-be8c-ef3f416b8a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..069f6a1550f83186b3e2fc9d9204b5c329daefd0
--- /dev/null
+++ b/graph/incidents_graphml/4/4d830770-47cb-11ee-be8c-ef3f416b8a04.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.178
+ 100.64.40.178
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693464900
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d830770-47cb-11ee-be8c-ef3f416b8a04
+
+
+
diff --git a/graph/incidents_graphml/4/4d852f20-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4d852f20-699d-11ee-b92f-dba1102b39ba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fad8cdb8270da26ea80c8711a3d1915e9fbd3416
--- /dev/null
+++ b/graph/incidents_graphml/4/4d852f20-699d-11ee-b92f-dba1102b39ba.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.103
+ 100.64.56.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697183482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d852f20-699d-11ee-b92f-dba1102b39ba
+
+
+
diff --git a/graph/incidents_graphml/4/4d91b240-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4d91b240-699d-11ee-b92f-dba1102b39ba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d2b55568cc078c05d7eb2adedcc51bc4513acb5
--- /dev/null
+++ b/graph/incidents_graphml/4/4d91b240-699d-11ee-b92f-dba1102b39ba.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.246
+ 100.64.48.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697183482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d91b240-699d-11ee-b92f-dba1102b39ba
+
+
+ INCIDENT_LINK
+ 1697183482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d91b240-699d-11ee-b92f-dba1102b39ba
+
+
+
diff --git a/graph/incidents_graphml/4/4d91e180-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4d91e180-f91c-11ed-8f07-3d261ba980ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6aafbc8dfbf972002560372f9798f5e70c18f7b5
--- /dev/null
+++ b/graph/incidents_graphml/4/4d91e180-f91c-11ed-8f07-3d261ba980ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.246
+ 100.64.72.246
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1684813547
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d91e180-f91c-11ed-8f07-3d261ba980ce
+
+
+
diff --git a/graph/incidents_graphml/4/4d9e4470-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4d9e4470-f83f-11ee-a565-4974183b9eb9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c84bc4e3c290167da386e3bbecc7d5e9c048724
--- /dev/null
+++ b/graph/incidents_graphml/4/4d9e4470-f83f-11ee-a565-4974183b9eb9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.207
+ 100.64.22.207
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712866126
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4d9e4470-f83f-11ee-a565-4974183b9eb9
+
+
+
diff --git a/graph/incidents_graphml/4/4d9ed1a0-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4d9ed1a0-699d-11ee-b92f-dba1102b39ba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd525f5f76ad744689ef78f6d85e6cff90875d9f
--- /dev/null
+++ b/graph/incidents_graphml/4/4d9ed1a0-699d-11ee-b92f-dba1102b39ba.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.246
+ 100.64.48.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697183482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4d9ed1a0-699d-11ee-b92f-dba1102b39ba
+
+
+
diff --git a/graph/incidents_graphml/4/4da30560-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/4/4da30560-43ac-11ef-a622-2be670a61274.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..471b5b81766457cecf113e6cadb253e500d9e6e8
--- /dev/null
+++ b/graph/incidents_graphml/4/4da30560-43ac-11ef-a622-2be670a61274.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.241
+ 100.64.37.241
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.16
+ 100.64.2.16
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.242
+ USER-0015-1314.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.243
+ 100.64.37.243
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.244
+ 100.64.37.244
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.245
+ 100.64.37.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.246
+ 100.64.37.246
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.247
+ 100.64.37.247
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159278
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4da30560-43ac-11ef-a622-2be670a61274
+
+
+
diff --git a/graph/incidents_graphml/4/4da4f450-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4da4f450-f91c-11ed-8f07-3d261ba980ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b1e22f7ab6784932782e96c31874beac52fffbe
--- /dev/null
+++ b/graph/incidents_graphml/4/4da4f450-f91c-11ed-8f07-3d261ba980ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.202
+ 100.64.71.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684813547
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4da4f450-f91c-11ed-8f07-3d261ba980ce
+
+
+
diff --git a/graph/incidents_graphml/4/4db0e0b0-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4db0e0b0-2aec-11ee-9870-89912039a0d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50de9b26fd47ab19a7e509d2f872720fc84fe89d
--- /dev/null
+++ b/graph/incidents_graphml/4/4db0e0b0-2aec-11ee-9870-89912039a0d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.202
+ 100.64.20.202
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690290490
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4db0e0b0-2aec-11ee-9870-89912039a0d0
+
+
+
diff --git a/graph/incidents_graphml/4/4db5a3b0-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4db5a3b0-4e6f-11ee-a8e2-c1e2e4930822.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ca5d97f1a0aba801c219b8919d713a43ae74c53
--- /dev/null
+++ b/graph/incidents_graphml/4/4db5a3b0-4e6f-11ee-a8e2-c1e2e4930822.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.62
+ 100.64.46.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694195044
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4db5a3b0-4e6f-11ee-a8e2-c1e2e4930822
+
+
+
diff --git a/graph/incidents_graphml/4/4db76ae0-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4db76ae0-f91c-11ed-8f07-3d261ba980ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb9fc057f0145c45282885ed8811b1bf55796320
--- /dev/null
+++ b/graph/incidents_graphml/4/4db76ae0-f91c-11ed-8f07-3d261ba980ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.71.202
+ 100.64.71.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684813547
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4db76ae0-f91c-11ed-8f07-3d261ba980ce
+
+
+
diff --git a/graph/incidents_graphml/4/4dc998d0-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4dc998d0-2aec-11ee-9870-89912039a0d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf95d937c7c4db0ece5e7b830b30fda9cf4182ba
--- /dev/null
+++ b/graph/incidents_graphml/4/4dc998d0-2aec-11ee-9870-89912039a0d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.204
+ 100.64.20.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690290490
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4dc998d0-2aec-11ee-9870-89912039a0d0
+
+
+
diff --git a/graph/incidents_graphml/4/4dcbdd40-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4dcbdd40-f91c-11ed-8f07-3d261ba980ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb07c61b8941e1bce41c1c5e0604434b16899dc6
--- /dev/null
+++ b/graph/incidents_graphml/4/4dcbdd40-f91c-11ed-8f07-3d261ba980ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.92
+ 100.64.78.92
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684813547
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4dcbdd40-f91c-11ed-8f07-3d261ba980ce
+
+
+
diff --git a/graph/incidents_graphml/4/4ddb94b0-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4ddb94b0-f91c-11ed-8f07-3d261ba980ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7c5401e99b355639b82192e4c16d1cc82d730de
--- /dev/null
+++ b/graph/incidents_graphml/4/4ddb94b0-f91c-11ed-8f07-3d261ba980ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.78.92
+ 100.64.78.92
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1684813548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ddb94b0-f91c-11ed-8f07-3d261ba980ce
+
+
+
diff --git a/graph/incidents_graphml/4/4ddbacf0-2f9c-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/4/4ddbacf0-2f9c-11ee-812f-67af952e62fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79e7320980763696214624222411efd32e76d82a
--- /dev/null
+++ b/graph/incidents_graphml/4/4ddbacf0-2f9c-11ee-812f-67af952e62fd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.141
+ 100.64.68.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1690805886
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ddbacf0-2f9c-11ee-812f-67af952e62fd
+
+
+ INCIDENT_LINK
+ 1690805886
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ddbacf0-2f9c-11ee-812f-67af952e62fd
+
+
+
diff --git a/graph/incidents_graphml/4/4ddbb890-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4ddbb890-4c1a-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3685138e4c4a577d7e877169e5bab3b471299c44
--- /dev/null
+++ b/graph/incidents_graphml/4/4ddbb890-4c1a-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.207
+ 100.64.23.207
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693938635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ddbb890-4c1a-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/4/4de202d0-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4de202d0-2aec-11ee-9870-89912039a0d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2460b114a5075407bdc0e77d675d582181e3f2b2
--- /dev/null
+++ b/graph/incidents_graphml/4/4de202d0-2aec-11ee-9870-89912039a0d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.204
+ 100.64.20.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690290490
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4de202d0-2aec-11ee-9870-89912039a0d0
+
+
+
diff --git a/graph/incidents_graphml/4/4de862b0-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4de862b0-d325-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17745d02388f8802d077eae4b00109c87956a60a
--- /dev/null
+++ b/graph/incidents_graphml/4/4de862b0-d325-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.100
+ 100.64.22.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708786767
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4de862b0-d325-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/4deca880-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4deca880-4c1a-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39acf2e5754eefc31fe970d9ea4f5b54e7416fad
--- /dev/null
+++ b/graph/incidents_graphml/4/4deca880-4c1a-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.207
+ 100.64.23.207
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693938635
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4deca880-4c1a-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/4/4dfd2330-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4dfd2330-d325-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe9bedbe917639622f40f16e312bbf1862293124
--- /dev/null
+++ b/graph/incidents_graphml/4/4dfd2330-d325-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.100
+ 100.64.22.100
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708786767
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4dfd2330-d325-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/4e016820-eb0d-11ec-bcf3-e1f20fd7057a.graphml b/graph/incidents_graphml/4/4e016820-eb0d-11ec-bcf3-e1f20fd7057a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..693147a1b1dd8b1b125fa61505441531ff312e90
--- /dev/null
+++ b/graph/incidents_graphml/4/4e016820-eb0d-11ec-bcf3-e1f20fd7057a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.191
+ USER-0015-1308.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.93
+ USER-0015-1616.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655120291
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e016820-eb0d-11ec-bcf3-e1f20fd7057a
+
+
+
diff --git a/graph/incidents_graphml/4/4e04deb0-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e04deb0-535d-11ee-9d47-d7b7ec818502.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be7fd89ed7711a0d59ede3ef4ad482f833b79985
--- /dev/null
+++ b/graph/incidents_graphml/4/4e04deb0-535d-11ee-9d47-d7b7ec818502.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.147
+ 100.64.58.147
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694737070
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4e04deb0-535d-11ee-9d47-d7b7ec818502
+
+
+
diff --git a/graph/incidents_graphml/4/4e08bf30-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4e08bf30-f91c-11ed-8f07-3d261ba980ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d716fd867d4028b6bf79ca4645b607602c9afd14
--- /dev/null
+++ b/graph/incidents_graphml/4/4e08bf30-f91c-11ed-8f07-3d261ba980ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.95
+ 100.64.78.95
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1684813548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e08bf30-f91c-11ed-8f07-3d261ba980ce
+
+
+
diff --git a/graph/incidents_graphml/4/4e0a0130-7b51-11ee-a1fb-a12255f73d88.graphml b/graph/incidents_graphml/4/4e0a0130-7b51-11ee-a1fb-a12255f73d88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8fef886f116c17cedcb4358fd697a679b7c9ff01
--- /dev/null
+++ b/graph/incidents_graphml/4/4e0a0130-7b51-11ee-a1fb-a12255f73d88.graphml
@@ -0,0 +1,805 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.98
+ 100.64.48.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.99
+ 100.64.48.99
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.100
+ 100.64.48.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.22
+ 100.64.21.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.59
+ 100.64.5.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.239
+ 100.64.45.239
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.139
+ 100.64.26.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.255
+ 100.64.23.255
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.20
+ 100.64.8.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.204
+ 100.64.20.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.20
+ 100.64.31.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.6
+ 100.64.4.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.83
+ 100.64.10.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.103
+ 100.64.43.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.32
+ 100.64.30.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.169
+ 100.64.19.169
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.101
+ 100.64.48.101
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.232
+ 100.64.26.232
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+ INCIDENT_LINK
+ 1699129962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e0a0130-7b51-11ee-a1fb-a12255f73d88
+
+
+
diff --git a/graph/incidents_graphml/4/4e144800-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e144800-535d-11ee-9d47-d7b7ec818502.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d14583c14b6b2af9bb00c9353314fd20e2c66aae
--- /dev/null
+++ b/graph/incidents_graphml/4/4e144800-535d-11ee-9d47-d7b7ec818502.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694737070
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e144800-535d-11ee-9d47-d7b7ec818502
+
+
+
diff --git a/graph/incidents_graphml/4/4e183a50-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/4/4e183a50-0948-11ee-899e-3d5be197ab3b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b243518ba37720a3d7d97e9972f9243bb6bf6704
--- /dev/null
+++ b/graph/incidents_graphml/4/4e183a50-0948-11ee-899e-3d5be197ab3b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.231
+ 100.64.35.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.17
+ 100.64.77.17
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686591664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e183a50-0948-11ee-899e-3d5be197ab3b
+
+
+ INCIDENT_LINK
+ 1686591664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e183a50-0948-11ee-899e-3d5be197ab3b
+
+
+
diff --git a/graph/incidents_graphml/4/4e197240-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4e197240-1ed2-11ee-b536-839ca7748106.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16cc17aeb4509650f99ce5f46ff3846f80df0bc2
--- /dev/null
+++ b/graph/incidents_graphml/4/4e197240-1ed2-11ee-b536-839ca7748106.graphml
@@ -0,0 +1,459 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.159
+ 100.64.9.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.218
+ 100.64.41.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.41
+ 100.64.44.41
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.42
+ 100.64.44.42
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.66
+ 100.64.18.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.10
+ 100.64.9.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.24
+ 100.64.13.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.43
+ 100.64.44.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.44
+ 100.64.44.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.45
+ 100.64.44.45
+ []
+ 0.578125
+ ["Precinct"]
+
+
+ HOST
+ 100.64.44.46
+ 100.64.44.46
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+ INCIDENT_LINK
+ 1688959909
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e197240-1ed2-11ee-b536-839ca7748106
+
+
+
diff --git a/graph/incidents_graphml/4/4e221700-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4e221700-0727-11ee-9050-71ab19a2f61d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4fc67814750b0f716a634cfa2aac03529dea40f1
--- /dev/null
+++ b/graph/incidents_graphml/4/4e221700-0727-11ee-9050-71ab19a2f61d.graphml
@@ -0,0 +1,569 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.1
+ 100.64.74.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.123
+ 100.64.72.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.2
+ 100.64.74.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.30.5
+ 100.64.30.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.40.208
+ 100.64.40.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.3
+ 100.64.74.3
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.34.10
+ 100.64.34.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.4
+ 100.64.74.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.5
+ 100.64.74.5
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.45.252
+ 100.64.45.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.25.153
+ 100.64.25.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.16.102
+ 100.64.16.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.158
+ HOST-13435
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.41.224
+ 100.64.41.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.25
+ HOST-13452
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.15.227
+ 100.64.15.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.6
+ 100.64.74.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.55.36
+ 100.64.55.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e221700-0727-11ee-9050-71ab19a2f61d
+
+
+
diff --git a/graph/incidents_graphml/4/4e23ff70-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e23ff70-535d-11ee-9d47-d7b7ec818502.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5dfac2617873e0a54e88791d0e5b7586aa71f32
--- /dev/null
+++ b/graph/incidents_graphml/4/4e23ff70-535d-11ee-9d47-d7b7ec818502.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694737070
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4e23ff70-535d-11ee-9d47-d7b7ec818502
+
+
+
diff --git a/graph/incidents_graphml/4/4e25e790-3d36-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/4/4e25e790-3d36-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eafed0161c867685a4e01a61980be19644cd1741
--- /dev/null
+++ b/graph/incidents_graphml/4/4e25e790-3d36-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,357 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.37
+ USER-0015-2059.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1984.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.38
+ 100.64.91.38
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.39
+ USER-0015-2060.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.35.217
+ 100.64.35.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.40
+ 100.64.91.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.41
+ 100.64.91.41
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e25e790-3d36-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/4/4e2a1ce0-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4e2a1ce0-47cb-11ee-be8c-ef3f416b8a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c533ffd41cf6850e0943d11ccfebf67e49abc1ac
--- /dev/null
+++ b/graph/incidents_graphml/4/4e2a1ce0-47cb-11ee-be8c-ef3f416b8a04.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.180
+ 100.64.40.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693464901
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e2a1ce0-47cb-11ee-be8c-ef3f416b8a04
+
+
+
diff --git a/graph/incidents_graphml/4/4e319400-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e319400-535d-11ee-9d47-d7b7ec818502.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a136607a4f8e39a04bf8a1bd9bff7067cc1f764
--- /dev/null
+++ b/graph/incidents_graphml/4/4e319400-535d-11ee-9d47-d7b7ec818502.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.11
+ 100.64.11.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694737070
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e319400-535d-11ee-9d47-d7b7ec818502
+
+
+
diff --git a/graph/incidents_graphml/4/4e3df300-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4e3df300-47cb-11ee-be8c-ef3f416b8a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe47acb17172334fdb25f6ddbd55a9075ffa157c
--- /dev/null
+++ b/graph/incidents_graphml/4/4e3df300-47cb-11ee-be8c-ef3f416b8a04.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.180
+ 100.64.40.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693464901
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e3df300-47cb-11ee-be8c-ef3f416b8a04
+
+
+
diff --git a/graph/incidents_graphml/4/4e40d640-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e40d640-535d-11ee-9d47-d7b7ec818502.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e69c95cf074a0f740442fcd81eefd968c426ae66
--- /dev/null
+++ b/graph/incidents_graphml/4/4e40d640-535d-11ee-9d47-d7b7ec818502.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.11
+ 100.64.11.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694737070
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e40d640-535d-11ee-9d47-d7b7ec818502
+
+
+
diff --git a/graph/incidents_graphml/4/4e514b20-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4e514b20-1ed2-11ee-b536-839ca7748106.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b1f6bf3be9c6c4c7e5410b34095851498a58a0d
--- /dev/null
+++ b/graph/incidents_graphml/4/4e514b20-1ed2-11ee-b536-839ca7748106.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.159
+ 100.64.9.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688959910
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4e514b20-1ed2-11ee-b536-839ca7748106
+
+
+
diff --git a/graph/incidents_graphml/4/4e521aa0-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4e521aa0-394e-11ee-a463-c9469bb75709.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f8485a8a8e70230544fe975a27bf48169d21086
--- /dev/null
+++ b/graph/incidents_graphml/4/4e521aa0-394e-11ee-a463-c9469bb75709.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.61
+ 100.64.28.61
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691871898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e521aa0-394e-11ee-a463-c9469bb75709
+
+
+
diff --git a/graph/incidents_graphml/4/4e53a7a0-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4e53a7a0-d325-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64860930a687497b7f4a9b5b05396cb1457da927
--- /dev/null
+++ b/graph/incidents_graphml/4/4e53a7a0-d325-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.172
+ 100.64.42.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708786767
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e53a7a0-d325-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/4e56d700-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4e56d700-699d-11ee-b92f-dba1102b39ba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6dd3825987438ab26ccbbeb1a0fd7efca9dba50c
--- /dev/null
+++ b/graph/incidents_graphml/4/4e56d700-699d-11ee-b92f-dba1102b39ba.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.34
+ 100.64.18.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697183484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e56d700-699d-11ee-b92f-dba1102b39ba
+
+
+
diff --git a/graph/incidents_graphml/4/4e5aeaf0-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/4/4e5aeaf0-be91-11ed-9416-c54055a72e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11661c2150c0d89540c094e48ccbabb26842698e
--- /dev/null
+++ b/graph/incidents_graphml/4/4e5aeaf0-be91-11ed-9416-c54055a72e53.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.187
+ 100.64.79.187
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.245
+ 100.64.76.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1678376681
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e5aeaf0-be91-11ed-9416-c54055a72e53
+
+
+ INCIDENT_LINK
+ 1678376681
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e5aeaf0-be91-11ed-9416-c54055a72e53
+
+
+
diff --git a/graph/incidents_graphml/4/4e5c8fd0-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4e5c8fd0-9fb5-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..630a0fb964c3802d8b197d0607ef38954699eecb
--- /dev/null
+++ b/graph/incidents_graphml/4/4e5c8fd0-9fb5-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.126
+ 100.64.24.126
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703131154
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e5c8fd0-9fb5-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/4e60cfc0-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4e60cfc0-2aec-11ee-9870-89912039a0d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..430eb4a8b8f0a271d09acfb63c70797dd677f2f5
--- /dev/null
+++ b/graph/incidents_graphml/4/4e60cfc0-2aec-11ee-9870-89912039a0d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.206
+ 100.64.20.206
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690290491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e60cfc0-2aec-11ee-9870-89912039a0d0
+
+
+
diff --git a/graph/incidents_graphml/4/4e65cb20-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4e65cb20-699d-11ee-b92f-dba1102b39ba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..189be7df7407578f16369883ff42b1579986f882
--- /dev/null
+++ b/graph/incidents_graphml/4/4e65cb20-699d-11ee-b92f-dba1102b39ba.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.34
+ 100.64.18.34
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697183484
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4e65cb20-699d-11ee-b92f-dba1102b39ba
+
+
+
diff --git a/graph/incidents_graphml/4/4e68a610-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/4/4e68a610-3cab-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6aa213df443fd446cb927617bb6288b842abdd02
--- /dev/null
+++ b/graph/incidents_graphml/4/4e68a610-3cab-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ USER-0015-1979.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.184
+ USER-0015-2049.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.46.208
+ USER-0015-1982.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1720389192
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e68a610-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389192
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e68a610-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389192
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e68a610-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389192
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e68a610-3cab-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/4/4e695280-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4e695280-d325-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..699304e5cf0f784546b3725623fb5f6ee4fb743e
--- /dev/null
+++ b/graph/incidents_graphml/4/4e695280-d325-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.172
+ 100.64.42.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708786767
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e695280-d325-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/4e69d640-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4e69d640-9fb5-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3518140de20312eafd5998dab777ab075b1403f2
--- /dev/null
+++ b/graph/incidents_graphml/4/4e69d640-9fb5-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.126
+ 100.64.24.126
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703131154
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4e69d640-9fb5-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/4e73d370-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4e73d370-394e-11ee-a463-c9469bb75709.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..73614422c67403c14b0472ce37ac09269e010ccb
--- /dev/null
+++ b/graph/incidents_graphml/4/4e73d370-394e-11ee-a463-c9469bb75709.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.61
+ 100.64.28.61
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691871898
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4e73d370-394e-11ee-a463-c9469bb75709
+
+
+
diff --git a/graph/incidents_graphml/4/4e74f3a0-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4e74f3a0-62c9-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..618558e617017adac18a793ca6cda1ad4f9fce89
--- /dev/null
+++ b/graph/incidents_graphml/4/4e74f3a0-62c9-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.169
+ 100.64.57.169
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696432724
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e74f3a0-62c9-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/4/4e76a7d0-0483-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/4/4e76a7d0-0483-11ee-9300-094b5588de47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..74b08a9883d5b2fee3c5b53d6493f42bf339bdc4
--- /dev/null
+++ b/graph/incidents_graphml/4/4e76a7d0-0483-11ee-9300-094b5588de47.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.123
+ 100.64.60.123
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.23.211
+ 100.64.23.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.83
+ 100.64.30.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.124
+ 100.64.60.124
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.119
+ 100.64.7.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.75
+ 100.64.21.75
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.19.5
+ 100.64.19.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.125
+ 100.64.60.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.126
+ 100.64.60.126
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.127
+ 100.64.60.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.128
+ 100.64.60.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.73
+ 100.64.29.73
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.216
+ USER-0015-1439.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067249
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e76a7d0-0483-11ee-9300-094b5588de47
+
+
+
diff --git a/graph/incidents_graphml/4/4e7a7240-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4e7a7240-2aec-11ee-9870-89912039a0d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87255393d927b013ee7659da8f679c94ad01565e
--- /dev/null
+++ b/graph/incidents_graphml/4/4e7a7240-2aec-11ee-9870-89912039a0d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.206
+ 100.64.20.206
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690290491
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4e7a7240-2aec-11ee-9870-89912039a0d0
+
+
+
diff --git a/graph/incidents_graphml/4/4e7c4eb0-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4e7c4eb0-f859-11ec-94e5-2949377000d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..501b8d3ba40234af2e183e38e0b534c87d575e3f
--- /dev/null
+++ b/graph/incidents_graphml/4/4e7c4eb0-f859-11ec-94e5-2949377000d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.248
+ 100.64.72.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.73
+ USER-0015-1646.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656582299
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7c4eb0-f859-11ec-94e5-2949377000d8
+
+
+
diff --git a/graph/incidents_graphml/4/4e7ce300-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4e7ce300-6fe7-11ee-bec7-efacac475e54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ff6827b8ff3533bc883e495bb8051bd6b43cce2
--- /dev/null
+++ b/graph/incidents_graphml/4/4e7ce300-6fe7-11ee-bec7-efacac475e54.graphml
@@ -0,0 +1,505 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.29
+ 100.64.63.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.23
+ 100.64.17.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.30
+ 100.64.63.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.31
+ 100.64.63.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.32
+ 100.64.63.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.33
+ 100.64.63.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.154
+ 100.64.29.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.138
+ 100.64.38.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.34
+ 100.64.63.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.214
+ 100.64.48.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.35
+ 100.64.63.35
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7ce300-6fe7-11ee-bec7-efacac475e54
+
+
+
diff --git a/graph/incidents_graphml/4/4e7e6fb0-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4e7e6fb0-9fb5-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53a1e0fc99fdd6f84c22a896088cfb04f6956c46
--- /dev/null
+++ b/graph/incidents_graphml/4/4e7e6fb0-9fb5-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.13
+ 100.64.11.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703131155
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e7e6fb0-9fb5-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/4e7e8720-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4e7e8720-32d2-11ee-a4d6-4bc10938c808.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5d3d67fdbd17aef4fccf19b06f747a05bba53e0
--- /dev/null
+++ b/graph/incidents_graphml/4/4e7e8720-32d2-11ee-a4d6-4bc10938c808.graphml
@@ -0,0 +1,259 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.26
+ 100.64.65.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.249
+ 100.64.18.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.108
+ 100.64.53.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.106
+ 100.64.34.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.221
+ 100.64.13.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.33
+ 100.64.17.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.27
+ 100.64.65.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7e8720-32d2-11ee-a4d6-4bc10938c808
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7e8720-32d2-11ee-a4d6-4bc10938c808
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7e8720-32d2-11ee-a4d6-4bc10938c808
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7e8720-32d2-11ee-a4d6-4bc10938c808
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7e8720-32d2-11ee-a4d6-4bc10938c808
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7e8720-32d2-11ee-a4d6-4bc10938c808
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7e8720-32d2-11ee-a4d6-4bc10938c808
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7e8720-32d2-11ee-a4d6-4bc10938c808
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7e8720-32d2-11ee-a4d6-4bc10938c808
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7e8720-32d2-11ee-a4d6-4bc10938c808
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e7e8720-32d2-11ee-a4d6-4bc10938c808
+
+
+
diff --git a/graph/incidents_graphml/4/4e81a5e0-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4e81a5e0-f859-11ec-94e5-2949377000d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90de0550a3523cc73eb0623592991029576a7e26
--- /dev/null
+++ b/graph/incidents_graphml/4/4e81a5e0-f859-11ec-94e5-2949377000d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.73
+ USER-0015-1646.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.248
+ 100.64.72.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656582299
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4e81a5e0-f859-11ec-94e5-2949377000d8
+
+
+
diff --git a/graph/incidents_graphml/4/4e837290-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4e837290-62c9-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abe596ae304565b98533565b07c7e80e924c0125
--- /dev/null
+++ b/graph/incidents_graphml/4/4e837290-62c9-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.169
+ 100.64.57.169
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696432724
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4e837290-62c9-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/4/4e84da30-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4e84da30-f859-11ec-94e5-2949377000d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc912a5e00c3653a39b28671a190508348c77587
--- /dev/null
+++ b/graph/incidents_graphml/4/4e84da30-f859-11ec-94e5-2949377000d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.249
+ 100.64.72.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.158
+ USER-0015-1647.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656582299
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e84da30-f859-11ec-94e5-2949377000d8
+
+
+
diff --git a/graph/incidents_graphml/4/4e897c20-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4e897c20-efa8-11ec-88e9-cd157aceabd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..332779ac250469543be5def7b862a212a962c8c1
--- /dev/null
+++ b/graph/incidents_graphml/4/4e897c20-efa8-11ec-88e9-cd157aceabd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.227
+ 100.64.81.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655626669
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e897c20-efa8-11ec-88e9-cd157aceabd3
+
+
+
diff --git a/graph/incidents_graphml/4/4e8b8f60-0483-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/4/4e8b8f60-0483-11ee-9300-094b5588de47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16170e1ad887b21df686b40e1728e8680ecb54db
--- /dev/null
+++ b/graph/incidents_graphml/4/4e8b8f60-0483-11ee-9300-094b5588de47.graphml
@@ -0,0 +1,847 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.149
+ 100.64.3.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.143
+ 100.64.18.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.135
+ 100.64.60.135
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.60.127
+ 100.64.60.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.60.136
+ 100.64.60.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.68
+ 100.64.21.68
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.79
+ 100.64.14.79
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.91
+ 100.64.30.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.41
+ 100.64.14.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.23.211
+ 100.64.23.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.167
+ 100.64.23.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+ INCIDENT_LINK
+ 1686067250
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e8b8f60-0483-11ee-9300-094b5588de47
+
+
+
diff --git a/graph/incidents_graphml/4/4e8cc180-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4e8cc180-6fe7-11ee-bec7-efacac475e54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..01601cbde04dcdf8eb699fa9d8dc005e5ad0ac58
--- /dev/null
+++ b/graph/incidents_graphml/4/4e8cc180-6fe7-11ee-bec7-efacac475e54.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.29
+ 100.64.63.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e8cc180-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e8cc180-6fe7-11ee-bec7-efacac475e54
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4e8cc180-6fe7-11ee-bec7-efacac475e54
+
+
+
diff --git a/graph/incidents_graphml/4/4e94f770-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4e94f770-70ae-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..02550326b9eeb68aa645c37f0bdef891b89e1243
--- /dev/null
+++ b/graph/incidents_graphml/4/4e94f770-70ae-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.198
+ 100.64.57.198
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697960444
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e94f770-70ae-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/4e964f90-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4e964f90-394e-11ee-a463-c9469bb75709.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6286e1d447ca763d7bf4aec0302e8746de1850db
--- /dev/null
+++ b/graph/incidents_graphml/4/4e964f90-394e-11ee-a463-c9469bb75709.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.187
+ USER-0015-1268.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691871898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e964f90-394e-11ee-a463-c9469bb75709
+
+
+
diff --git a/graph/incidents_graphml/4/4e994cf0-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4e994cf0-4e6f-11ee-a8e2-c1e2e4930822.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..563bba560134d9382d401e3a0c89a7b634ccad44
--- /dev/null
+++ b/graph/incidents_graphml/4/4e994cf0-4e6f-11ee-a8e2-c1e2e4930822.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.64
+ 100.64.46.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694195046
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e994cf0-4e6f-11ee-a8e2-c1e2e4930822
+
+
+
diff --git a/graph/incidents_graphml/4/4e9a8c00-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/4e9a8c00-6e59-11ee-bd33-e97c9a557859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a6a71b2935e2727bf755576a16238d983f01af4
--- /dev/null
+++ b/graph/incidents_graphml/4/4e9a8c00-6e59-11ee-bd33-e97c9a557859.graphml
@@ -0,0 +1,437 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.247
+ 100.64.19.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.105
+ 100.64.40.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.106
+ 100.64.40.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.178
+ 100.64.26.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.243
+ 100.64.24.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.35
+ 100.64.25.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.107
+ 100.64.40.107
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.232
+ 100.64.3.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.191
+ 100.64.9.191
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.28
+ 100.64.30.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.108
+ USER-0015-1328.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704034
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4e9a8c00-6e59-11ee-bd33-e97c9a557859
+
+
+
diff --git a/graph/incidents_graphml/4/4e9b1960-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4e9b1960-6fe7-11ee-bec7-efacac475e54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3b9baf380ea09dacedd3825d64ce13efa0532142
--- /dev/null
+++ b/graph/incidents_graphml/4/4e9b1960-6fe7-11ee-bec7-efacac475e54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.170
+ 100.64.24.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697874974
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e9b1960-6fe7-11ee-bec7-efacac475e54
+
+
+
diff --git a/graph/incidents_graphml/4/4e9dc350-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e9dc350-535d-11ee-9d47-d7b7ec818502.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db5ed6b0fe4295e43972d8445962f245cc31220e
--- /dev/null
+++ b/graph/incidents_graphml/4/4e9dc350-535d-11ee-9d47-d7b7ec818502.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.149
+ 100.64.58.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694737071
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4e9dc350-535d-11ee-9d47-d7b7ec818502
+
+
+
diff --git a/graph/incidents_graphml/4/4ea03ff0-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4ea03ff0-32d2-11ee-a4d6-4bc10938c808.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f8f77974ce7a5c291a1443baa38e7675b4c3985
--- /dev/null
+++ b/graph/incidents_graphml/4/4ea03ff0-32d2-11ee-a4d6-4bc10938c808.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.26
+ 100.64.65.26
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691158933
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ea03ff0-32d2-11ee-a4d6-4bc10938c808
+
+
+
diff --git a/graph/incidents_graphml/4/4ea5adc0-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4ea5adc0-becc-11ed-93f3-fff421178c5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25e264085228e1ed4f2773b3351e8820b3462397
--- /dev/null
+++ b/graph/incidents_graphml/4/4ea5adc0-becc-11ed-93f3-fff421178c5e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.17.250
+ 100.64.17.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678402022
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ea5adc0-becc-11ed-93f3-fff421178c5e
+
+
+
diff --git a/graph/incidents_graphml/4/4ea60e70-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4ea60e70-70ae-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec06e59510fd9cbaf27f215528b876a0be8f15bf
--- /dev/null
+++ b/graph/incidents_graphml/4/4ea60e70-70ae-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.198
+ 100.64.57.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697960444
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ea60e70-70ae-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/4ea76460-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4ea76460-efa8-11ec-88e9-cd157aceabd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4ce3c49f7cfade52ad2d4e72709714a4b74d2f9
--- /dev/null
+++ b/graph/incidents_graphml/4/4ea76460-efa8-11ec-88e9-cd157aceabd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.228
+ 100.64.81.228
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655626669
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ea76460-efa8-11ec-88e9-cd157aceabd3
+
+
+
diff --git a/graph/incidents_graphml/4/4ea78280-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4ea78280-becc-11ed-93f3-fff421178c5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3278803bfb9e516a700bdad83e487d128e029b68
--- /dev/null
+++ b/graph/incidents_graphml/4/4ea78280-becc-11ed-93f3-fff421178c5e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.138
+ 100.64.94.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678402022
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ea78280-becc-11ed-93f3-fff421178c5e
+
+
+
diff --git a/graph/incidents_graphml/4/4eaa1a90-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4eaa1a90-becc-11ed-93f3-fff421178c5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aad86bbf8ccc8f662111c6f1ac7b615d1c10be79
--- /dev/null
+++ b/graph/incidents_graphml/4/4eaa1a90-becc-11ed-93f3-fff421178c5e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.138
+ 100.64.94.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678402022
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4eaa1a90-becc-11ed-93f3-fff421178c5e
+
+
+
diff --git a/graph/incidents_graphml/4/4eae3e10-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4eae3e10-535d-11ee-9d47-d7b7ec818502.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ddddc5d881f54fe642c9e6f0483e1faa0ec30cb8
--- /dev/null
+++ b/graph/incidents_graphml/4/4eae3e10-535d-11ee-9d47-d7b7ec818502.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.149
+ 100.64.58.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694737071
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4eae3e10-535d-11ee-9d47-d7b7ec818502
+
+
+
diff --git a/graph/incidents_graphml/4/4eb11ab0-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4eb11ab0-4e6f-11ee-a8e2-c1e2e4930822.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29f0660607ea94d56d451a953bfeac2d13ab862f
--- /dev/null
+++ b/graph/incidents_graphml/4/4eb11ab0-4e6f-11ee-a8e2-c1e2e4930822.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.64
+ 100.64.46.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694195046
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4eb11ab0-4e6f-11ee-a8e2-c1e2e4930822
+
+
+
diff --git a/graph/incidents_graphml/4/4eb77930-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4eb77930-0727-11ee-9050-71ab19a2f61d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cae5ad8144416a731bb5da8d53112470cf6239ae
--- /dev/null
+++ b/graph/incidents_graphml/4/4eb77930-0727-11ee-9050-71ab19a2f61d.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.183
+ 100.64.9.183
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.29
+ 100.64.1.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.20.211
+ 100.64.20.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.7
+ 100.64.74.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.77
+ 100.64.72.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.29.127
+ 100.64.29.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.255
+ 100.64.70.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.8
+ 100.64.74.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.9
+ 100.64.74.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.10
+ 100.64.74.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.58.79
+ 100.64.58.79
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.118
+ 100.64.72.118
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.13.250
+ 100.64.13.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.123
+ 100.64.71.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.11
+ USER-0015-1664.example.internal
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.66.236
+ 100.64.66.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.12
+ 100.64.74.12
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.39.21
+ 100.64.39.21
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.190
+ 100.64.72.190
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.17.248
+ 100.64.17.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eb77930-0727-11ee-9050-71ab19a2f61d
+
+
+
diff --git a/graph/incidents_graphml/4/4eb85a00-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4eb85a00-5c8e-11ee-b468-75a223656fa7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82d1c8c6e0fad1b0f9aca65e5147310503c74242
--- /dev/null
+++ b/graph/incidents_graphml/4/4eb85a00-5c8e-11ee-b468-75a223656fa7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695747677
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4eb85a00-5c8e-11ee-b468-75a223656fa7
+
+
+
diff --git a/graph/incidents_graphml/4/4ebac130-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4ebac130-535d-11ee-9d47-d7b7ec818502.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ae3022b803d1bb2b9edb06bb07b303b8d6d9f53
--- /dev/null
+++ b/graph/incidents_graphml/4/4ebac130-535d-11ee-9d47-d7b7ec818502.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.58
+ 100.64.57.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694737071
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ebac130-535d-11ee-9d47-d7b7ec818502
+
+
+
diff --git a/graph/incidents_graphml/4/4ebba4b0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/4/4ebba4b0-2ff4-11ee-881d-9b9601b76edb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..368c192f19ff92d41905f997bec2f8e0ff9c23b0
--- /dev/null
+++ b/graph/incidents_graphml/4/4ebba4b0-2ff4-11ee-881d-9b9601b76edb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.46
+ 100.64.28.46
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690843683
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ebba4b0-2ff4-11ee-881d-9b9601b76edb
+
+
+
diff --git a/graph/incidents_graphml/4/4ec0d220-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4ec0d220-4e6f-11ee-a8e2-c1e2e4930822.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ba862f0e96e73e1a078ac0432625081d40b901c
--- /dev/null
+++ b/graph/incidents_graphml/4/4ec0d220-4e6f-11ee-a8e2-c1e2e4930822.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.9
+ 100.64.42.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694195046
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ec0d220-4e6f-11ee-a8e2-c1e2e4930822
+
+
+
diff --git a/graph/incidents_graphml/4/4ec33450-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/4ec33450-62c1-11ee-b24d-ffed8a6ae3b7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad7b308bd552c5ec3eb75a239003cfb80bfddb1c
--- /dev/null
+++ b/graph/incidents_graphml/4/4ec33450-62c1-11ee-b24d-ffed8a6ae3b7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.134
+ 100.64.19.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696429288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ec33450-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+
diff --git a/graph/incidents_graphml/4/4ec71de0-15ff-11ee-b6c1-6f3fa2e3bf20.graphml b/graph/incidents_graphml/4/4ec71de0-15ff-11ee-b6c1-6f3fa2e3bf20.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b49a1566603b7af5ef54c28b7d7d414e81077674
--- /dev/null
+++ b/graph/incidents_graphml/4/4ec71de0-15ff-11ee-b6c1-6f3fa2e3bf20.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.106
+ 100.64.69.106
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1687989677
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ec71de0-15ff-11ee-b6c1-6f3fa2e3bf20
+
+
+ INCIDENT_LINK
+ 1687989677
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ec71de0-15ff-11ee-b6c1-6f3fa2e3bf20
+
+
+
diff --git a/graph/incidents_graphml/4/4eca16d0-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4eca16d0-0727-11ee-9050-71ab19a2f61d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5421166328d278f93313fe0f6c4425927974021
--- /dev/null
+++ b/graph/incidents_graphml/4/4eca16d0-0727-11ee-9050-71ab19a2f61d.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.104
+ 100.64.15.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.36
+ 100.64.1.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.104
+ HOST-13483
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eca16d0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eca16d0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eca16d0-0727-11ee-9050-71ab19a2f61d
+
+
+ INCIDENT_LINK
+ 1686357590
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4eca16d0-0727-11ee-9050-71ab19a2f61d
+
+
+
diff --git a/graph/incidents_graphml/4/4ecac6c0-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4ecac6c0-535d-11ee-9d47-d7b7ec818502.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1de3808102dd65052c957a5c54b3c25cd40f45ac
--- /dev/null
+++ b/graph/incidents_graphml/4/4ecac6c0-535d-11ee-9d47-d7b7ec818502.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.58
+ 100.64.57.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694737071
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ecac6c0-535d-11ee-9d47-d7b7ec818502
+
+
+
diff --git a/graph/incidents_graphml/4/4ecb1900-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4ecb1900-efa8-11ec-88e9-cd157aceabd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a36b0e89e87933ed5c96bc34fbbbc67082bd66c4
--- /dev/null
+++ b/graph/incidents_graphml/4/4ecb1900-efa8-11ec-88e9-cd157aceabd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.229
+ 100.64.81.229
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655626669
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ecb1900-efa8-11ec-88e9-cd157aceabd3
+
+
+
diff --git a/graph/incidents_graphml/4/4ecec0a0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/4ecec0a0-249e-11ef-8629-fb371c38e19d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1962b183a8ecf85dd284510f230331ad4f06ffe2
--- /dev/null
+++ b/graph/incidents_graphml/4/4ecec0a0-249e-11ef-8629-fb371c38e19d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.126
+ 100.64.56.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717744781
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ecec0a0-249e-11ef-8629-fb371c38e19d
+
+
+
diff --git a/graph/incidents_graphml/4/4ed47ef0-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4ed47ef0-9fb5-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c0eb7e8c82907106cdb86d615f390a40d3fc7b0
--- /dev/null
+++ b/graph/incidents_graphml/4/4ed47ef0-9fb5-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.128
+ 100.64.24.128
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703131155
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ed47ef0-9fb5-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/4ed50ea0-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/4ed50ea0-62c1-11ee-b24d-ffed8a6ae3b7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb9607dc1419c71b487b22271d426fd0fdccec46
--- /dev/null
+++ b/graph/incidents_graphml/4/4ed50ea0-62c1-11ee-b24d-ffed8a6ae3b7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.134
+ 100.64.19.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696429288
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ed50ea0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+
diff --git a/graph/incidents_graphml/4/4edacc50-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4edacc50-535d-11ee-9d47-d7b7ec818502.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06a2f17753a9c1630e489733f526bfeabb55daa0
--- /dev/null
+++ b/graph/incidents_graphml/4/4edacc50-535d-11ee-9d47-d7b7ec818502.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.123
+ 100.64.9.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694737071
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4edacc50-535d-11ee-9d47-d7b7ec818502
+
+
+
diff --git a/graph/incidents_graphml/4/4ee13f00-98f8-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/4/4ee13f00-98f8-11ee-8096-1db1b3bdcb7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6fc1cf7c2ba7297b66652a703b4c6e64a95d51e9
--- /dev/null
+++ b/graph/incidents_graphml/4/4ee13f00-98f8-11ee-8096-1db1b3bdcb7c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.220
+ 100.64.69.220
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1702390273
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ee13f00-98f8-11ee-8096-1db1b3bdcb7c
+
+
+ INCIDENT_LINK
+ 1702390273
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ee13f00-98f8-11ee-8096-1db1b3bdcb7c
+
+
+
diff --git a/graph/incidents_graphml/4/4ee296c0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/4ee296c0-249e-11ef-8629-fb371c38e19d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c240315a5ba5bc44172adf700742862012ef5646
--- /dev/null
+++ b/graph/incidents_graphml/4/4ee296c0-249e-11ef-8629-fb371c38e19d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.114
+ 100.64.37.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717744781
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ee296c0-249e-11ef-8629-fb371c38e19d
+
+
+
diff --git a/graph/incidents_graphml/4/4ef50f30-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4ef50f30-efa8-11ec-88e9-cd157aceabd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..215bc62ac9f33c48bc9113a5a25395353a9527b9
--- /dev/null
+++ b/graph/incidents_graphml/4/4ef50f30-efa8-11ec-88e9-cd157aceabd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.41
+ USER-0015-1863.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655626670
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ef50f30-efa8-11ec-88e9-cd157aceabd3
+
+
+
diff --git a/graph/incidents_graphml/4/4ef5d0a0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/4ef5d0a0-249e-11ef-8629-fb371c38e19d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f72271f3868d3c20c7b432509f6f890d7a5d3df1
--- /dev/null
+++ b/graph/incidents_graphml/4/4ef5d0a0-249e-11ef-8629-fb371c38e19d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.114
+ 100.64.37.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1717744782
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4ef5d0a0-249e-11ef-8629-fb371c38e19d
+
+
+
diff --git a/graph/incidents_graphml/4/4ef79620-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/4/4ef79620-ed09-11ec-8ab6-b3d858f740e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..daba765bca8d437a5010cbe0c2677a7bff4567fc
--- /dev/null
+++ b/graph/incidents_graphml/4/4ef79620-ed09-11ec-8ab6-b3d858f740e7.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.192
+ 100.64.28.192
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.253
+ 100.64.70.253
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655338477
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ef79620-ed09-11ec-8ab6-b3d858f740e7
+
+
+ INCIDENT_LINK
+ 1655338477
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4ef79620-ed09-11ec-8ab6-b3d858f740e7
+
+
+
diff --git a/graph/incidents_graphml/4/4eff2700-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4eff2700-5c8e-11ee-b468-75a223656fa7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed7e36dc8c499449565b6dfbe449e7e08f4a04b0
--- /dev/null
+++ b/graph/incidents_graphml/4/4eff2700-5c8e-11ee-b468-75a223656fa7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.199
+ 100.64.56.199
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695747677
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4eff2700-5c8e-11ee-b468-75a223656fa7
+
+
+
diff --git a/graph/incidents_graphml/4/4f05dd50-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/4f05dd50-2270-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..378c0974a333c2f1f87ba9f25e1223e32555ac5b
--- /dev/null
+++ b/graph/incidents_graphml/4/4f05dd50-2270-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.231
+ 100.64.62.231
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1689357625
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f05dd50-2270-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/4/4f07d100-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/4/4f07d100-68ac-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48f93ec5e0ffd525c087e98f56bb67fa76eeb0ef
--- /dev/null
+++ b/graph/incidents_graphml/4/4f07d100-68ac-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.82
+ 100.64.18.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697079976
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f07d100-68ac-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/4/4f0c67c0-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4f0c67c0-efa8-11ec-88e9-cd157aceabd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c19a36e8035ceb61e280b5ceca6c91c85296623e
--- /dev/null
+++ b/graph/incidents_graphml/4/4f0c67c0-efa8-11ec-88e9-cd157aceabd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.231
+ USER-0015-1907.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655626670
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f0c67c0-efa8-11ec-88e9-cd157aceabd3
+
+
+
diff --git a/graph/incidents_graphml/4/4f0ede70-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4f0ede70-5c8e-11ee-b468-75a223656fa7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cf9c5dbb5f8972207a1af120375e7f653c3ccfc
--- /dev/null
+++ b/graph/incidents_graphml/4/4f0ede70-5c8e-11ee-b468-75a223656fa7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.199
+ 100.64.56.199
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695747677
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f0ede70-5c8e-11ee-b468-75a223656fa7
+
+
+
diff --git a/graph/incidents_graphml/4/4f1481b0-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4f1481b0-699d-11ee-b92f-dba1102b39ba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0e510086d53de50aacfa6b8761b673d34dda363
--- /dev/null
+++ b/graph/incidents_graphml/4/4f1481b0-699d-11ee-b92f-dba1102b39ba.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.101
+ 100.64.18.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697183485
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f1481b0-699d-11ee-b92f-dba1102b39ba
+
+
+
diff --git a/graph/incidents_graphml/4/4f191a90-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4f191a90-4c1a-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..835f88db10970597a6fc3536dd266c499a56ea8e
--- /dev/null
+++ b/graph/incidents_graphml/4/4f191a90-4c1a-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.209
+ 100.64.23.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693938637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f191a90-4c1a-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/4/4f19bcf0-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/4f19bcf0-2f75-11ee-b11e-87149c94e410.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79864a5aac452ef18cfaed9acd5c8ff2590c791c
--- /dev/null
+++ b/graph/incidents_graphml/4/4f19bcf0-2f75-11ee-b11e-87149c94e410.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.88
+ 100.64.42.88
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.189
+ 100.64.23.189
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.87
+ 100.64.41.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.89
+ 100.64.42.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.90
+ USER-0015-1336.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.206
+ 100.64.6.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f19bcf0-2f75-11ee-b11e-87149c94e410
+
+
+
diff --git a/graph/incidents_graphml/4/4f22b280-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4f22b280-699d-11ee-b92f-dba1102b39ba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0026d5796b93a5c6413657682ad0d4cf69a13b4f
--- /dev/null
+++ b/graph/incidents_graphml/4/4f22b280-699d-11ee-b92f-dba1102b39ba.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.101
+ 100.64.18.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697183485
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4f22b280-699d-11ee-b92f-dba1102b39ba
+
+
+
diff --git a/graph/incidents_graphml/4/4f23e8a0-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4f23e8a0-5fa5-11ee-8f29-f592a54d646c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5164129df921add9536773e12670ae926aedbd50
--- /dev/null
+++ b/graph/incidents_graphml/4/4f23e8a0-5fa5-11ee-8f29-f592a54d646c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.3
+ 100.64.33.3
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696087409
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f23e8a0-5fa5-11ee-8f29-f592a54d646c
+
+
+
diff --git a/graph/incidents_graphml/4/4f279620-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/4f279620-2270-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a59feddeff3fa8c52f7793af42b1012923ef31ac
--- /dev/null
+++ b/graph/incidents_graphml/4/4f279620-2270-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.62.231
+ 100.64.62.231
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689357625
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f279620-2270-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/4/4f282a40-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/4/4f282a40-68ac-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..944c2665e6771ed148e9d3c5ee87506d70e8ee6c
--- /dev/null
+++ b/graph/incidents_graphml/4/4f282a40-68ac-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.84
+ 100.64.18.84
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697079976
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f282a40-68ac-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/4/4f2ec570-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4f2ec570-4c1a-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dbb6567080ba29197926060194468e6dac6ea66f
--- /dev/null
+++ b/graph/incidents_graphml/4/4f2ec570-4c1a-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.209
+ 100.64.23.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693938637
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f2ec570-4c1a-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/4/4f302000-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4f302000-699d-11ee-b92f-dba1102b39ba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e41a637d68cfc1c442d73c515f211921fd770af
--- /dev/null
+++ b/graph/incidents_graphml/4/4f302000-699d-11ee-b92f-dba1102b39ba.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697183485
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f302000-699d-11ee-b92f-dba1102b39ba
+
+
+
diff --git a/graph/incidents_graphml/4/4f33c720-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4f33c720-5fa5-11ee-8f29-f592a54d646c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce954c9d81604c87119267bb7c1382b7b180de72
--- /dev/null
+++ b/graph/incidents_graphml/4/4f33c720-5fa5-11ee-8f29-f592a54d646c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.3
+ 100.64.33.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696087409
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f33c720-5fa5-11ee-8f29-f592a54d646c
+
+
+
diff --git a/graph/incidents_graphml/4/4f371e60-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/4/4f371e60-68ac-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..463fca9b6f7b097a306aba53ed4615a4f86475f3
--- /dev/null
+++ b/graph/incidents_graphml/4/4f371e60-68ac-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.84
+ 100.64.18.84
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697079976
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f371e60-68ac-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/4/4f3d09e0-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/4/4f3d09e0-2ade-11ed-961c-99a30b1a3145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4e92d650c8fae9242c129f634cbb131f41001d0
--- /dev/null
+++ b/graph/incidents_graphml/4/4f3d09e0-2ade-11ed-961c-99a30b1a3145.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.3
+ 100.64.83.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.152
+ 100.64.72.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.112
+ 100.64.76.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662136981
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4f3d09e0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136981
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4f3d09e0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136981
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4f3d09e0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136981
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4f3d09e0-2ade-11ed-961c-99a30b1a3145
+
+
+
diff --git a/graph/incidents_graphml/4/4f3dcf70-ed79-11ed-a662-a9c0e7c292a4.graphml b/graph/incidents_graphml/4/4f3dcf70-ed79-11ed-a662-a9c0e7c292a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..580fe0ea06deadd8399da995874c851ba02eb5c9
--- /dev/null
+++ b/graph/incidents_graphml/4/4f3dcf70-ed79-11ed-a662-a9c0e7c292a4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.188
+ 100.64.68.188
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1683534079
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4f3dcf70-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534079
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4f3dcf70-ed79-11ed-a662-a9c0e7c292a4
+
+
+
diff --git a/graph/incidents_graphml/4/4f3e29c0-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4f3e29c0-699d-11ee-b92f-dba1102b39ba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b08925490f7b470b2aad775d1d089255abc17db3
--- /dev/null
+++ b/graph/incidents_graphml/4/4f3e29c0-699d-11ee-b92f-dba1102b39ba.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697183485
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f3e29c0-699d-11ee-b92f-dba1102b39ba
+
+
+
diff --git a/graph/incidents_graphml/4/4f40bf70-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4f40bf70-5fa5-11ee-8f29-f592a54d646c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ff6165e9c2ab572deec46c650638be39afcf0d1
--- /dev/null
+++ b/graph/incidents_graphml/4/4f40bf70-5fa5-11ee-8f29-f592a54d646c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.5
+ 100.64.33.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696087409
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f40bf70-5fa5-11ee-8f29-f592a54d646c
+
+
+
diff --git a/graph/incidents_graphml/4/4f43e650-dfa2-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/4/4f43e650-dfa2-11ee-9120-ff7b7094ac3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c25ab6b0895e5ac4a6a3b1a508958754c5b0d879
--- /dev/null
+++ b/graph/incidents_graphml/4/4f43e650-dfa2-11ee-9120-ff7b7094ac3d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.41.129
+ 100.64.41.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710159870
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f43e650-dfa2-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159870
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f43e650-dfa2-11ee-9120-ff7b7094ac3d
+
+
+
diff --git a/graph/incidents_graphml/4/4f4e7b10-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4f4e7b10-5fa5-11ee-8f29-f592a54d646c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91ef8edebc67a10041ce9c9a9800873e1b978410
--- /dev/null
+++ b/graph/incidents_graphml/4/4f4e7b10-5fa5-11ee-8f29-f592a54d646c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.5
+ 100.64.33.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696087410
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f4e7b10-5fa5-11ee-8f29-f592a54d646c
+
+
+
diff --git a/graph/incidents_graphml/4/4f63e030-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4f63e030-70ae-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a79832d9bfa14e4dcd422b3585a34fff01377e4
--- /dev/null
+++ b/graph/incidents_graphml/4/4f63e030-70ae-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.189
+ 100.64.17.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697960445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f63e030-70ae-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/4f6742e0-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4f6742e0-62c9-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f0eb6e9a1c5269719b6a4752671c2af7b2f198d
--- /dev/null
+++ b/graph/incidents_graphml/4/4f6742e0-62c9-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696432725
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f6742e0-62c9-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/4/4f69fc20-6183-11ee-a390-cde4d9cd4c71.graphml b/graph/incidents_graphml/4/4f69fc20-6183-11ee-a390-cde4d9cd4c71.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3346a15be2dcee140e2488998cded99006313517
--- /dev/null
+++ b/graph/incidents_graphml/4/4f69fc20-6183-11ee-a390-cde4d9cd4c71.graphml
@@ -0,0 +1,141 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.134
+ 100.64.54.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.11.42
+ 100.64.11.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1696292709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 4f69fc20-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 4f69fc20-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 4f69fc20-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 4f69fc20-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 4f69fc20-6183-11ee-a390-cde4d9cd4c71
+
+
+
diff --git a/graph/incidents_graphml/4/4f6f2720-98f8-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/4/4f6f2720-98f8-11ee-8096-1db1b3bdcb7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4627c8533dd90be27054fa5502beed5d0ef863b
--- /dev/null
+++ b/graph/incidents_graphml/4/4f6f2720-98f8-11ee-8096-1db1b3bdcb7c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.15
+ 100.64.55.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1702390274
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f6f2720-98f8-11ee-8096-1db1b3bdcb7c
+
+
+ INCIDENT_LINK
+ 1702390274
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f6f2720-98f8-11ee-8096-1db1b3bdcb7c
+
+
+
diff --git a/graph/incidents_graphml/4/4f7406d0-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/4/4f7406d0-5133-11ee-b458-8f76bdd93836.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78625a7d63cfa3496205830d2fb30a9d0de0a0fd
--- /dev/null
+++ b/graph/incidents_graphml/4/4f7406d0-5133-11ee-b458-8f76bdd93836.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.156
+ 100.64.49.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f7406d0-5133-11ee-b458-8f76bdd93836
+
+
+
diff --git a/graph/incidents_graphml/4/4f7a2750-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4f7a2750-70ae-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13b45dbad71ff1a200f86ac1bedfa0922e5ae8bc
--- /dev/null
+++ b/graph/incidents_graphml/4/4f7a2750-70ae-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.189
+ 100.64.17.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697960445
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f7a2750-70ae-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/4f7ab270-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/4/4f7ab270-10f0-11ed-9f22-2fed65d2efbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..01e8324774a125e10049570f140e6144909b7f54
--- /dev/null
+++ b/graph/incidents_graphml/4/4f7ab270-10f0-11ed-9f22-2fed65d2efbb.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.175
+ 100.64.81.175
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.172
+ 100.64.1.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.176
+ 100.64.81.176
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659285983
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4f7ab270-10f0-11ed-9f22-2fed65d2efbb
+
+
+ INCIDENT_LINK
+ 1659285983
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4f7ab270-10f0-11ed-9f22-2fed65d2efbb
+
+
+ INCIDENT_LINK
+ 1659285983
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4f7ab270-10f0-11ed-9f22-2fed65d2efbb
+
+
+ INCIDENT_LINK
+ 1659285983
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4f7ab270-10f0-11ed-9f22-2fed65d2efbb
+
+
+
diff --git a/graph/incidents_graphml/4/4f860830-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/4/4f860830-5133-11ee-b458-8f76bdd93836.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30a36d9a2256864417db280439bd52c728a8ba8a
--- /dev/null
+++ b/graph/incidents_graphml/4/4f860830-5133-11ee-b458-8f76bdd93836.graphml
@@ -0,0 +1,561 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.91
+ 100.64.66.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.92
+ 100.64.66.92
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.93
+ 100.64.66.93
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.94
+ 100.64.66.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.158
+ 100.64.11.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.106
+ 100.64.34.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.95
+ 100.64.66.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.9
+ 100.64.53.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.114
+ USER-0015-1204.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.202
+ 100.64.8.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.131
+ 100.64.7.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.96
+ 100.64.66.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f860830-5133-11ee-b458-8f76bdd93836
+
+
+
diff --git a/graph/incidents_graphml/4/4f885820-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4f885820-70ae-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae325915a852e24e1aa637a7e4d1a9d3deb50ab1
--- /dev/null
+++ b/graph/incidents_graphml/4/4f885820-70ae-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.200
+ 100.64.57.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697960445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f885820-70ae-11ee-89bb-13047ce19953
+
+
+ INCIDENT_LINK
+ 1697960445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f885820-70ae-11ee-89bb-13047ce19953
+
+
+ INCIDENT_LINK
+ 1697960445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f885820-70ae-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/4f8ab580-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4f8ab580-1ed2-11ee-b536-839ca7748106.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d984a6d0ff7c085e98463195d69d6fb5cb05321b
--- /dev/null
+++ b/graph/incidents_graphml/4/4f8ab580-1ed2-11ee-b536-839ca7748106.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.140
+ 100.64.26.140
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688959912
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4f8ab580-1ed2-11ee-b536-839ca7748106
+
+
+
diff --git a/graph/incidents_graphml/4/4f94bd10-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/4f94bd10-40ff-11ee-b8c2-77c1ecbb2825.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0d1cc47eacfd1e39ac19a0063a8b7690a63a685
--- /dev/null
+++ b/graph/incidents_graphml/4/4f94bd10-40ff-11ee-b8c2-77c1ecbb2825.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.203
+ 100.64.7.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692717579
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f94bd10-40ff-11ee-b8c2-77c1ecbb2825
+
+
+
diff --git a/graph/incidents_graphml/4/4f954a70-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/4/4f954a70-5133-11ee-b458-8f76bdd93836.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ab414be9e4021b8476a27ae7cfdfa3641832640
--- /dev/null
+++ b/graph/incidents_graphml/4/4f954a70-5133-11ee-b458-8f76bdd93836.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.230
+ 100.64.9.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f954a70-5133-11ee-b458-8f76bdd93836
+
+
+
diff --git a/graph/incidents_graphml/4/4f9613c0-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4f9613c0-70ae-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8834d87d308e462cbb959ba8276eb3062a835852
--- /dev/null
+++ b/graph/incidents_graphml/4/4f9613c0-70ae-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.200
+ 100.64.57.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697960445
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4f9613c0-70ae-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/4f9708e0-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/4/4f9708e0-140e-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf65987a8b3e8d16d517518ee678d6c89df398c5
--- /dev/null
+++ b/graph/incidents_graphml/4/4f9708e0-140e-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.19
+ 100.64.29.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.82
+ 100.64.71.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.250
+ 100.64.73.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687776219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f9708e0-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f9708e0-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f9708e0-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f9708e0-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f9708e0-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4f9708e0-140e-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/4/4f9ecf30-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/4f9ecf30-40ff-11ee-b8c2-77c1ecbb2825.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d253be2c04bdabf29c3215f7828f1afe29d60f03
--- /dev/null
+++ b/graph/incidents_graphml/4/4f9ecf30-40ff-11ee-b8c2-77c1ecbb2825.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.7.203
+ 100.64.7.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692717579
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4f9ecf30-40ff-11ee-b8c2-77c1ecbb2825
+
+
+
diff --git a/graph/incidents_graphml/4/4fa28340-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4fa28340-1ed2-11ee-b536-839ca7748106.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d883867db9ad192571efcdaa03b903f48338e80
--- /dev/null
+++ b/graph/incidents_graphml/4/4fa28340-1ed2-11ee-b536-839ca7748106.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.140
+ 100.64.26.140
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688959912
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4fa28340-1ed2-11ee-b536-839ca7748106
+
+
+
diff --git a/graph/incidents_graphml/4/4fa3f070-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/4/4fa3f070-5133-11ee-b458-8f76bdd93836.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11914c3faaba81c3fcb28493a6f87750e943c52e
--- /dev/null
+++ b/graph/incidents_graphml/4/4fa3f070-5133-11ee-b458-8f76bdd93836.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.230
+ 100.64.9.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694499131
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4fa3f070-5133-11ee-b458-8f76bdd93836
+
+
+
diff --git a/graph/incidents_graphml/4/4fa507e0-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4fa507e0-70ae-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8679bcf3c78313ba78ae0258c161034a0ce00d6b
--- /dev/null
+++ b/graph/incidents_graphml/4/4fa507e0-70ae-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.189
+ 100.64.16.189
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697960445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4fa507e0-70ae-11ee-89bb-13047ce19953
+
+
+ INCIDENT_LINK
+ 1697960445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4fa507e0-70ae-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/4fa66e30-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/4/4fa66e30-0fb1-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb0ab9f3feacb8d885d2645c4abe133a5a59a072
--- /dev/null
+++ b/graph/incidents_graphml/4/4fa66e30-0fb1-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.162
+ 100.64.42.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715443969
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4fa66e30-0fb1-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/4/4fa8f810-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4fa8f810-394e-11ee-a463-c9469bb75709.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06fba4809f706ff24539485dd5860eab9a657756
--- /dev/null
+++ b/graph/incidents_graphml/4/4fa8f810-394e-11ee-a463-c9469bb75709.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.63
+ 100.64.28.63
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691871900
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4fa8f810-394e-11ee-a463-c9469bb75709
+
+
+
diff --git a/graph/incidents_graphml/4/4fb70940-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4fb70940-70ae-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30a45cbb600c70d723078291b7d6863e5d608b78
--- /dev/null
+++ b/graph/incidents_graphml/4/4fb70940-70ae-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.189
+ 100.64.16.189
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697960446
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4fb70940-70ae-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/4fb87890-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4fb87890-4e6f-11ee-a8e2-c1e2e4930822.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ef5265518e3277dfec3cfed38da89d4f21b5d50
--- /dev/null
+++ b/graph/incidents_graphml/4/4fb87890-4e6f-11ee-a8e2-c1e2e4930822.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.4
+ 100.64.8.4
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694195048
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4fb87890-4e6f-11ee-a8e2-c1e2e4930822
+
+
+ INCIDENT_LINK
+ 1694195048
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4fb87890-4e6f-11ee-a8e2-c1e2e4930822
+
+
+
diff --git a/graph/incidents_graphml/4/4fbfcf40-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4fbfcf40-1ed2-11ee-b536-839ca7748106.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b50ca9e29d36ebac8d33586705a2a97393a5bf4f
--- /dev/null
+++ b/graph/incidents_graphml/4/4fbfcf40-1ed2-11ee-b536-839ca7748106.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.53
+ 100.64.44.53
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688959912
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4fbfcf40-1ed2-11ee-b536-839ca7748106
+
+
+
diff --git a/graph/incidents_graphml/4/4fc204c0-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4fc204c0-4c1a-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a87e61a0fb0fc4cbf7cb0d4f58ee6f34de3c761e
--- /dev/null
+++ b/graph/incidents_graphml/4/4fc204c0-4c1a-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.211
+ 100.64.23.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693938638
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4fc204c0-4c1a-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/4/4fd87000-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4fd87000-5c8e-11ee-b468-75a223656fa7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a9ef9b273ae8adbb44dc386ddcc448dd8e64f48
--- /dev/null
+++ b/graph/incidents_graphml/4/4fd87000-5c8e-11ee-b468-75a223656fa7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.200
+ 100.64.56.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695747679
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4fd87000-5c8e-11ee-b468-75a223656fa7
+
+
+
diff --git a/graph/incidents_graphml/4/4fd93040-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/4/4fd93040-f9b3-11ee-9419-336c262dcd55.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa990fd0aa584384c1cf16367bebf4df5617b76a
--- /dev/null
+++ b/graph/incidents_graphml/4/4fd93040-f9b3-11ee-9419-336c262dcd55.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.4
+ 100.64.10.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713025902
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4fd93040-f9b3-11ee-9419-336c262dcd55
+
+
+
diff --git a/graph/incidents_graphml/4/4fd9cd30-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/4/4fd9cd30-0c22-11ef-9a57-bba1bbebb052.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4eabc8f27b2a817b1ef6a29dc6e97fd0f118282
--- /dev/null
+++ b/graph/incidents_graphml/4/4fd9cd30-0c22-11ef-9a57-bba1bbebb052.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.225
+ 100.64.14.225
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715052698
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4fd9cd30-0c22-11ef-9a57-bba1bbebb052
+
+
+
diff --git a/graph/incidents_graphml/4/4fe1af20-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4fe1af20-1ed2-11ee-b536-839ca7748106.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66563efccddbe8c86ba90f93f97e67a08033bf49
--- /dev/null
+++ b/graph/incidents_graphml/4/4fe1af20-1ed2-11ee-b536-839ca7748106.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.53
+ 100.64.44.53
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688959912
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4fe1af20-1ed2-11ee-b536-839ca7748106
+
+
+
diff --git a/graph/incidents_graphml/4/4fe2e560-1aa5-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/4/4fe2e560-1aa5-11ee-ae54-3b636b49055b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8405b5fc71d530ec55e5e9d33120eddc14f45d8
--- /dev/null
+++ b/graph/incidents_graphml/4/4fe2e560-1aa5-11ee-ae54-3b636b49055b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.7.183
+ 172.18.7.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.176
+ 100.64.89.176
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688500780
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4fe2e560-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500780
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4fe2e560-1aa5-11ee-ae54-3b636b49055b
+
+
+
diff --git a/graph/incidents_graphml/4/4fe94c90-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4fe94c90-4e6f-11ee-a8e2-c1e2e4930822.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..186fd365359d6287e1f8e9d19be6c3f239f27897
--- /dev/null
+++ b/graph/incidents_graphml/4/4fe94c90-4e6f-11ee-a8e2-c1e2e4930822.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.4
+ 100.64.8.4
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694195048
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4fe94c90-4e6f-11ee-a8e2-c1e2e4930822
+
+
+
diff --git a/graph/incidents_graphml/4/4febce90-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/4/4febce90-0c22-11ef-9a57-bba1bbebb052.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00a4dd3932a2266b2fb6907b33876b4bd94abb6c
--- /dev/null
+++ b/graph/incidents_graphml/4/4febce90-0c22-11ef-9a57-bba1bbebb052.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.225
+ 100.64.14.225
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715052698
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4febce90-0c22-11ef-9a57-bba1bbebb052
+
+
+
diff --git a/graph/incidents_graphml/4/4febdc30-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4febdc30-62c9-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f0494a62896bf510e2e405ad59b0f57f790f550
--- /dev/null
+++ b/graph/incidents_graphml/4/4febdc30-62c9-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,461 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.171
+ 100.64.57.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.172
+ 100.64.57.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.200
+ 100.64.54.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.173
+ 100.64.57.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.174
+ 100.64.13.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.50
+ 100.64.24.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.174
+ 100.64.57.174
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.24
+ 100.64.46.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.249
+ 100.64.13.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.175
+ 100.64.57.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.176
+ 100.64.57.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4febdc30-62c9-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/4/4fefefa0-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4fefefa0-5c8e-11ee-b468-75a223656fa7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce275ddb2a4a9a4c0a17c4ac597a3e7386424d31
--- /dev/null
+++ b/graph/incidents_graphml/4/4fefefa0-5c8e-11ee-b468-75a223656fa7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.200
+ 100.64.56.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695747679
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4fefefa0-5c8e-11ee-b468-75a223656fa7
+
+
+
diff --git a/graph/incidents_graphml/4/4ff60710-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/4/4ff60710-f9b3-11ee-9419-336c262dcd55.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09f0083d7a42a6213946432163c8d85907303a11
--- /dev/null
+++ b/graph/incidents_graphml/4/4ff60710-f9b3-11ee-9419-336c262dcd55.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.194
+ 100.64.41.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713025903
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ff60710-f9b3-11ee-9419-336c262dcd55
+
+
+
diff --git a/graph/incidents_graphml/4/4ffb1e70-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4ffb1e70-62c9-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eea1994d6415f18b8d71a02fc6ec5f9ad0bdecc8
--- /dev/null
+++ b/graph/incidents_graphml/4/4ffb1e70-62c9-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,215 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.171
+ 100.64.57.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.89
+ 100.64.44.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.182
+ 100.64.57.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.188
+ 100.64.18.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.183
+ 100.64.57.183
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ffb1e70-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ffb1e70-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ffb1e70-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ffb1e70-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ffb1e70-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ffb1e70-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ffb1e70-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ffb1e70-62c9-11ee-a98e-093b6593236c
+
+
+ INCIDENT_LINK
+ 1696432726
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4ffb1e70-62c9-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/4/4ffb8600-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/4/4ffb8600-0c22-11ef-9a57-bba1bbebb052.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68dc57c376749d927e86ffde83ce8f9c79ce015d
--- /dev/null
+++ b/graph/incidents_graphml/4/4ffb8600-0c22-11ef-9a57-bba1bbebb052.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.112
+ 100.64.36.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715052698
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4ffb8600-0c22-11ef-9a57-bba1bbebb052
+
+
+
diff --git a/graph/incidents_graphml/5/5007a010-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5007a010-2227-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8dcd6a2dbe66abc1b282bd35d8ad5aca3be38abf
--- /dev/null
+++ b/graph/incidents_graphml/5/5007a010-2227-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.65
+ 100.64.21.65
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689326273
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5007a010-2227-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/500cc410-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/500cc410-0c22-11ef-9a57-bba1bbebb052.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4fa75e6f4957a18a1a046461d7b4b98f30c89dac
--- /dev/null
+++ b/graph/incidents_graphml/5/500cc410-0c22-11ef-9a57-bba1bbebb052.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.112
+ 100.64.36.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1715052698
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 500cc410-0c22-11ef-9a57-bba1bbebb052
+
+
+
diff --git a/graph/incidents_graphml/5/501d8cf0-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/501d8cf0-0c22-11ef-9a57-bba1bbebb052.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e54dfb57e83c12ba527406f776c1a943a492582
--- /dev/null
+++ b/graph/incidents_graphml/5/501d8cf0-0c22-11ef-9a57-bba1bbebb052.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.181
+ 100.64.26.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715052698
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 501d8cf0-0c22-11ef-9a57-bba1bbebb052
+
+
+
diff --git a/graph/incidents_graphml/5/501e2d70-93b6-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/5/501e2d70-93b6-11ee-ad07-e3190f846a2a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56832b6eb1027ffb21d5b66800e76a0a47d48cf3
--- /dev/null
+++ b/graph/incidents_graphml/5/501e2d70-93b6-11ee-ad07-e3190f846a2a.graphml
@@ -0,0 +1,97 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.20
+ 100.64.68.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.84
+ 100.64.14.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ INCIDENT_LINK
+ 1701812173
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 501e2d70-93b6-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812173
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 501e2d70-93b6-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812173
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 501e2d70-93b6-11ee-ad07-e3190f846a2a
+
+
+
diff --git a/graph/incidents_graphml/5/5023ef60-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/5/5023ef60-68ac-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2ae177564da5fb3f93015d2442710de93fad8ec
--- /dev/null
+++ b/graph/incidents_graphml/5/5023ef60-68ac-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.56
+ 100.64.18.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697079978
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5023ef60-68ac-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/5/502fdc70-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/502fdc70-0c22-11ef-9a57-bba1bbebb052.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4cc8ed7e10998658f8225431cbb8b08a88536d3
--- /dev/null
+++ b/graph/incidents_graphml/5/502fdc70-0c22-11ef-9a57-bba1bbebb052.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.181
+ 100.64.26.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715052698
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 502fdc70-0c22-11ef-9a57-bba1bbebb052
+
+
+
diff --git a/graph/incidents_graphml/5/503df250-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/503df250-2227-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7c38f668e948f962a9a7a86d0120681b3a50e76
--- /dev/null
+++ b/graph/incidents_graphml/5/503df250-2227-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689326274
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 503df250-2227-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/5043c180-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/5043c180-1394-11ef-9295-05a4a3befc7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f1c35d4660ca04efe5fa74a5973182af326cd9f
--- /dev/null
+++ b/graph/incidents_graphml/5/5043c180-1394-11ef-9295-05a4a3befc7c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.221
+ 100.64.56.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1715871319
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5043c180-1394-11ef-9295-05a4a3befc7c
+
+
+
diff --git a/graph/incidents_graphml/5/5048e300-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/5048e300-5133-11ee-b458-8f76bdd93836.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1bef0bebad05d42c372420eecbe56e965520a19
--- /dev/null
+++ b/graph/incidents_graphml/5/5048e300-5133-11ee-b458-8f76bdd93836.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.243
+ 100.64.13.243
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694499132
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5048e300-5133-11ee-b458-8f76bdd93836
+
+
+
diff --git a/graph/incidents_graphml/5/505b3280-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/505b3280-5133-11ee-b458-8f76bdd93836.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0391f0095742adb3a39e3da4e9f94af0fe08473d
--- /dev/null
+++ b/graph/incidents_graphml/5/505b3280-5133-11ee-b458-8f76bdd93836.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.97
+ 100.64.59.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694499132
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 505b3280-5133-11ee-b458-8f76bdd93836
+
+
+
diff --git a/graph/incidents_graphml/5/5061a6f0-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5061a6f0-2227-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8635e4c389df9e0a78bcf0e8c4eb84ef034a8d0d
--- /dev/null
+++ b/graph/incidents_graphml/5/5061a6f0-2227-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689326274
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5061a6f0-2227-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/5067a350-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/5/5067a350-535c-11ee-aeed-cffe9ef9c7cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a6e086f834d66e326702baf84a0a2a5bc2619ec
--- /dev/null
+++ b/graph/incidents_graphml/5/5067a350-535c-11ee-aeed-cffe9ef9c7cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.122
+ 100.64.15.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1694736644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5067a350-535c-11ee-aeed-cffe9ef9c7cb
+
+
+
diff --git a/graph/incidents_graphml/5/506ab090-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/5/506ab090-535c-11ee-aeed-cffe9ef9c7cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60ee64735d40fa304888d811c6c0213ed191e7c2
--- /dev/null
+++ b/graph/incidents_graphml/5/506ab090-535c-11ee-aeed-cffe9ef9c7cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.15.122
+ 100.64.15.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1694736644
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 506ab090-535c-11ee-aeed-cffe9ef9c7cb
+
+
+
diff --git a/graph/incidents_graphml/5/507be6a0-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/507be6a0-0fb1-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abe713de09bf33aa02ca917da2d5d41380b47ef3
--- /dev/null
+++ b/graph/incidents_graphml/5/507be6a0-0fb1-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.164
+ 100.64.42.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715443970
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 507be6a0-0fb1-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/5/507e9b10-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/5/507e9b10-5c8e-11ee-b468-75a223656fa7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b435185ce0d1b5b68e5a8541fa77f859b5480d6
--- /dev/null
+++ b/graph/incidents_graphml/5/507e9b10-5c8e-11ee-b468-75a223656fa7.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695747680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 507e9b10-5c8e-11ee-b468-75a223656fa7
+
+
+ INCIDENT_LINK
+ 1695747680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 507e9b10-5c8e-11ee-b468-75a223656fa7
+
+
+ INCIDENT_LINK
+ 1695747680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 507e9b10-5c8e-11ee-b468-75a223656fa7
+
+
+
diff --git a/graph/incidents_graphml/5/508caf80-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/508caf80-0fb1-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ecd67b5e60466f9a80f0cbc557d4190fc0f60344
--- /dev/null
+++ b/graph/incidents_graphml/5/508caf80-0fb1-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.164
+ 100.64.42.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715443970
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 508caf80-0fb1-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/5/509186d0-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/5/509186d0-5c8e-11ee-b468-75a223656fa7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..277571fc3e3ba2e8cc0f89654c4dcd5f02bce5de
--- /dev/null
+++ b/graph/incidents_graphml/5/509186d0-5c8e-11ee-b468-75a223656fa7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695747680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 509186d0-5c8e-11ee-b468-75a223656fa7
+
+
+
diff --git a/graph/incidents_graphml/5/50932d30-9183-11ee-afab-0bead911b18a.graphml b/graph/incidents_graphml/5/50932d30-9183-11ee-afab-0bead911b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fca359ee9d63075a9bcbc70436667dd9d94c2d81
--- /dev/null
+++ b/graph/incidents_graphml/5/50932d30-9183-11ee-afab-0bead911b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.18
+ 100.64.49.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701570367
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 50932d30-9183-11ee-afab-0bead911b18a
+
+
+
diff --git a/graph/incidents_graphml/5/509512d0-3d36-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/5/509512d0-3d36-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab391a252762f40712db0ee7f1a5c16dc120c431
--- /dev/null
+++ b/graph/incidents_graphml/5/509512d0-3d36-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.28.63.204
+ USER-0015-2061.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.87.3
+ 100.64.87.3
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.1.77
+ 100.64.1.77
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720448896
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 509512d0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448896
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 509512d0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448896
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 509512d0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720448896
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 509512d0-3d36-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/5/509ba800-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/5/509ba800-2f33-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5590b127b5840cb8e2d6679c9c6ffca0c2f2844
--- /dev/null
+++ b/graph/incidents_graphml/5/509ba800-2f33-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.188
+ 100.64.25.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.82
+ 100.64.73.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.52
+ 100.64.82.52
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690760793
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 509ba800-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760793
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 509ba800-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760793
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 509ba800-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760793
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 509ba800-2f33-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/5/50a3d650-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/5/50a3d650-5c8e-11ee-b468-75a223656fa7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bdb2d3bf5bc35a23cbe848c9553e4b4ebb74bbae
--- /dev/null
+++ b/graph/incidents_graphml/5/50a3d650-5c8e-11ee-b468-75a223656fa7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.133
+ 100.64.13.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695747680
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 50a3d650-5c8e-11ee-b468-75a223656fa7
+
+
+
diff --git a/graph/incidents_graphml/5/50a4ac60-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/5/50a4ac60-2435-11ee-bc29-cfb067a56058.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9532b0dc6049288db88e43c1029b97b4f9b12727
--- /dev/null
+++ b/graph/incidents_graphml/5/50a4ac60-2435-11ee-bc29-cfb067a56058.graphml
@@ -0,0 +1,459 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.217
+ 100.64.20.217
+ ["Exploiting Host"]
+ 0.6203125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.113
+ 100.64.11.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.93
+ 100.64.69.93
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.94
+ 100.64.69.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552190
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50a4ac60-2435-11ee-bc29-cfb067a56058
+
+
+
diff --git a/graph/incidents_graphml/5/50acb6d0-121a-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/5/50acb6d0-121a-11ee-a890-99c329874409.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..761bea12b6b1d2f8da332fe4887192c81b7c5431
--- /dev/null
+++ b/graph/incidents_graphml/5/50acb6d0-121a-11ee-a890-99c329874409.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.22
+ 100.64.20.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687561472
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 50acb6d0-121a-11ee-a890-99c329874409
+
+
+
diff --git a/graph/incidents_graphml/5/50b35f30-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/50b35f30-6a4e-11ee-a1cb-53f21743b64f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c0490c2399e89bb20885d3c4916b67da78d85f9
--- /dev/null
+++ b/graph/incidents_graphml/5/50b35f30-6a4e-11ee-a1cb-53f21743b64f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.41
+ 100.64.58.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697259508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 50b35f30-6a4e-11ee-a1cb-53f21743b64f
+
+
+
diff --git a/graph/incidents_graphml/5/50c20530-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/50c20530-6a4e-11ee-a1cb-53f21743b64f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59de2f7768619c42a9c7c36c80bdb7732d17884f
--- /dev/null
+++ b/graph/incidents_graphml/5/50c20530-6a4e-11ee-a1cb-53f21743b64f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.15
+ 100.64.62.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697259509
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 50c20530-6a4e-11ee-a1cb-53f21743b64f
+
+
+
diff --git a/graph/incidents_graphml/5/50cb8170-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/50cb8170-063d-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e5990f8dfb03111488f0d99b5e466556c3587fa
--- /dev/null
+++ b/graph/incidents_graphml/5/50cb8170-063d-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.34
+ 100.64.37.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686257091
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 50cb8170-063d-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/5/50d03600-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/50d03600-6a4e-11ee-a1cb-53f21743b64f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c7520d39264de5e1443c8ba1a7a5c5adcee3c5b
--- /dev/null
+++ b/graph/incidents_graphml/5/50d03600-6a4e-11ee-a1cb-53f21743b64f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.15
+ 100.64.62.15
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697259509
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 50d03600-6a4e-11ee-a1cb-53f21743b64f
+
+
+
diff --git a/graph/incidents_graphml/5/50d48a20-121a-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/5/50d48a20-121a-11ee-a890-99c329874409.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28ccbf6bd96c99e49811cdb44993b217a8dbf9fd
--- /dev/null
+++ b/graph/incidents_graphml/5/50d48a20-121a-11ee-a890-99c329874409.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.74
+ USER-0015-1252.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687561473
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50d48a20-121a-11ee-a890-99c329874409
+
+
+
diff --git a/graph/incidents_graphml/5/50dee890-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/50dee890-20a2-11ed-ab44-599bbcff3eda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6cec14ed7e93f8feefb829c0fb795d097b17be69
--- /dev/null
+++ b/graph/incidents_graphml/5/50dee890-20a2-11ed-ab44-599bbcff3eda.graphml
@@ -0,0 +1,725 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.73
+ 100.64.38.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.58
+ 100.64.72.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.83
+ 100.64.79.83
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.29
+ 100.64.71.29
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.84
+ 100.64.79.84
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.85
+ 100.64.79.85
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.86
+ 100.64.79.86
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.87
+ 100.64.79.87
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.88
+ 100.64.79.88
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.36
+ USER-0015-1668.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.89
+ 100.64.79.89
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.90
+ 100.64.79.90
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.91
+ 100.64.79.91
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.92
+ USER-0015-1811.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.48.120
+ 100.64.48.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.93
+ 100.64.79.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.94
+ 100.64.79.94
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.95
+ USER-0015-1812.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.31.220
+ 100.64.31.220
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011703
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50dee890-20a2-11ed-ab44-599bbcff3eda
+
+
+
diff --git a/graph/incidents_graphml/5/50e15360-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/50e15360-063d-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b265c921ca5290318563d5eab7b58bf9854115c0
--- /dev/null
+++ b/graph/incidents_graphml/5/50e15360-063d-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.34
+ 100.64.37.34
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686257091
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 50e15360-063d-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/5/50e9b320-2957-11ed-833a-955cfd42297d.graphml b/graph/incidents_graphml/5/50e9b320-2957-11ed-833a-955cfd42297d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69bc726b4b362f4fea8218337376181c8b72b4b1
--- /dev/null
+++ b/graph/incidents_graphml/5/50e9b320-2957-11ed-833a-955cfd42297d.graphml
@@ -0,0 +1,509 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.74.165
+ 172.21.74.165
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.129
+ 100.64.88.129
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.130
+ 100.64.88.130
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.131
+ 100.64.88.131
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.132
+ 100.64.88.132
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.91
+ 100.64.2.91
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.72
+ 100.64.2.72
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.242
+ 100.64.87.242
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.133
+ 100.64.88.133
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.134
+ 100.64.88.134
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.242.39
+ 172.24.242.39
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.135
+ 100.64.88.135
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.136
+ 100.64.88.136
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.137
+ 100.64.88.137
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969051
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50e9b320-2957-11ed-833a-955cfd42297d
+
+
+
diff --git a/graph/incidents_graphml/5/50f7b600-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/5/50f7b600-2122-11ee-9a61-05dd24aa353e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a3c0c4375b71bcc8c8abab36424968656f2f135
--- /dev/null
+++ b/graph/incidents_graphml/5/50f7b600-2122-11ee-9a61-05dd24aa353e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.248
+ 100.64.24.248
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1689214176
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50f7b600-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214176
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50f7b600-2122-11ee-9a61-05dd24aa353e
+
+
+
diff --git a/graph/incidents_graphml/5/50f8c770-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/5/50f8c770-2122-11ee-9a61-05dd24aa353e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6668987ec848bedab0fed4b2626caa6267f8f52f
--- /dev/null
+++ b/graph/incidents_graphml/5/50f8c770-2122-11ee-9a61-05dd24aa353e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.39
+ 100.64.54.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.124
+ 100.64.69.124
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1689214176
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50f8c770-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214176
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50f8c770-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214176
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50f8c770-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214176
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 50f8c770-2122-11ee-9a61-05dd24aa353e
+
+
+
diff --git a/graph/incidents_graphml/5/510accf0-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/5/510accf0-68ac-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..699f45d3bdad3b6e0f6a2147e0e899cb7e795d63
--- /dev/null
+++ b/graph/incidents_graphml/5/510accf0-68ac-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.86
+ 100.64.18.86
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697079979
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 510accf0-68ac-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/5/51122670-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/51122670-5133-11ee-b458-8f76bdd93836.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63fdae262f033baededa61aefaed4407be628606
--- /dev/null
+++ b/graph/incidents_graphml/5/51122670-5133-11ee-b458-8f76bdd93836.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.103
+ 100.64.66.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694499134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 51122670-5133-11ee-b458-8f76bdd93836
+
+
+
diff --git a/graph/incidents_graphml/5/5113d320-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/5/5113d320-f9b3-11ee-9419-336c262dcd55.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4babc9bffa1c9554602858230024707460e21da0
--- /dev/null
+++ b/graph/incidents_graphml/5/5113d320-f9b3-11ee-9419-336c262dcd55.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.196
+ 100.64.41.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713025905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5113d320-f9b3-11ee-9419-336c262dcd55
+
+
+
diff --git a/graph/incidents_graphml/5/512168b0-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/512168b0-5133-11ee-b458-8f76bdd93836.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8de6eb9060cc9e51a4419adc5f381551aa299226
--- /dev/null
+++ b/graph/incidents_graphml/5/512168b0-5133-11ee-b458-8f76bdd93836.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.105
+ 100.64.66.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694499134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 512168b0-5133-11ee-b458-8f76bdd93836
+
+
+
diff --git a/graph/incidents_graphml/5/5121b5d0-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/5/5121b5d0-f9b3-11ee-9419-336c262dcd55.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80b22fb7e385e72ef4a82243b8fb3d9f537491e8
--- /dev/null
+++ b/graph/incidents_graphml/5/5121b5d0-f9b3-11ee-9419-336c262dcd55.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.196
+ 100.64.41.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713025905
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5121b5d0-f9b3-11ee-9419-336c262dcd55
+
+
+
diff --git a/graph/incidents_graphml/5/512db620-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/512db620-2ff4-11ee-881d-9b9601b76edb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c51e4b60f8e5636c457d0145f8e5ee796196d13b
--- /dev/null
+++ b/graph/incidents_graphml/5/512db620-2ff4-11ee-881d-9b9601b76edb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.164
+ USER-0015-1318.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690843687
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 512db620-2ff4-11ee-881d-9b9601b76edb
+
+
+
diff --git a/graph/incidents_graphml/5/51319550-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/51319550-5133-11ee-b458-8f76bdd93836.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83796e25cbd1b2ad15d00f250d34f95cef47380a
--- /dev/null
+++ b/graph/incidents_graphml/5/51319550-5133-11ee-b458-8f76bdd93836.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.105
+ 100.64.66.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694499134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 51319550-5133-11ee-b458-8f76bdd93836
+
+
+
diff --git a/graph/incidents_graphml/5/513e1ad0-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/5/513e1ad0-fe0c-11ec-809b-91d71d0233d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab9ae919f4195c96a3e41809dc0224e3e85201b2
--- /dev/null
+++ b/graph/incidents_graphml/5/513e1ad0-fe0c-11ec-809b-91d71d0233d6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.14
+ 100.64.79.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.45
+ 100.64.73.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657208939
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 513e1ad0-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208939
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 513e1ad0-fe0c-11ec-809b-91d71d0233d6
+
+
+
diff --git a/graph/incidents_graphml/5/51427fd0-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/51427fd0-6a4e-11ee-a1cb-53f21743b64f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d99c43c7f9dc6c81da695b99817ef74ab4629529
--- /dev/null
+++ b/graph/incidents_graphml/5/51427fd0-6a4e-11ee-a1cb-53f21743b64f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.17
+ 100.64.62.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697259509
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51427fd0-6a4e-11ee-a1cb-53f21743b64f
+
+
+
diff --git a/graph/incidents_graphml/5/51521030-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/51521030-6a4e-11ee-a1cb-53f21743b64f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b7c5b1e102e5753b33f040750efda73ea319e39
--- /dev/null
+++ b/graph/incidents_graphml/5/51521030-6a4e-11ee-a1cb-53f21743b64f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.17
+ 100.64.62.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697259510
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 51521030-6a4e-11ee-a1cb-53f21743b64f
+
+
+
diff --git a/graph/incidents_graphml/5/5153dbc0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/5153dbc0-2ff4-11ee-881d-9b9601b76edb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bfc47ef8b172c155ef91d86d97ff3c754c01fe20
--- /dev/null
+++ b/graph/incidents_graphml/5/5153dbc0-2ff4-11ee-881d-9b9601b76edb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.178
+ 100.64.32.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690843687
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5153dbc0-2ff4-11ee-881d-9b9601b76edb
+
+
+
diff --git a/graph/incidents_graphml/5/515e6c40-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/515e6c40-6a4e-11ee-a1cb-53f21743b64f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08b19713afb77200ea375645e4fe644eacb0ee3d
--- /dev/null
+++ b/graph/incidents_graphml/5/515e6c40-6a4e-11ee-a1cb-53f21743b64f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.50
+ 100.64.51.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697259510
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 515e6c40-6a4e-11ee-a1cb-53f21743b64f
+
+
+
diff --git a/graph/incidents_graphml/5/5167d8f0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/5167d8f0-2ff4-11ee-881d-9b9601b76edb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1dd50b36d40fdb56d1d33d11d878f7f39c6479fa
--- /dev/null
+++ b/graph/incidents_graphml/5/5167d8f0-2ff4-11ee-881d-9b9601b76edb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.178
+ 100.64.32.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690843688
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5167d8f0-2ff4-11ee-881d-9b9601b76edb
+
+
+
diff --git a/graph/incidents_graphml/5/516c00d0-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/516c00d0-6a4e-11ee-a1cb-53f21743b64f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac6ba2dcaf72ba3dd5dce6d63fe1a5fd3b403819
--- /dev/null
+++ b/graph/incidents_graphml/5/516c00d0-6a4e-11ee-a1cb-53f21743b64f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.50
+ 100.64.51.50
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697259510
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 516c00d0-6a4e-11ee-a1cb-53f21743b64f
+
+
+
diff --git a/graph/incidents_graphml/5/516f1f50-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/516f1f50-2227-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7761e6d54bfe1cf1dbdc089f1a758033ad842bf0
--- /dev/null
+++ b/graph/incidents_graphml/5/516f1f50-2227-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.208
+ 100.64.3.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689326276
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 516f1f50-2227-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/517492b0-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/517492b0-063d-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c2af7054d2544bb40aff92df770879c57e9987f
--- /dev/null
+++ b/graph/incidents_graphml/5/517492b0-063d-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.125
+ 100.64.12.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686257092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 517492b0-063d-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/5/517694b0-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/517694b0-20a2-11ed-ab44-599bbcff3eda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8c166b07a13ee4ab8e0d2af0db2cea3bd69bf79
--- /dev/null
+++ b/graph/incidents_graphml/5/517694b0-20a2-11ed-ab44-599bbcff3eda.graphml
@@ -0,0 +1,243 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.167
+ 100.64.72.167
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.74
+ 100.64.75.74
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.38.73
+ 100.64.38.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.128
+ 100.64.79.128
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.26.73
+ 100.64.26.73
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.52
+ 100.64.72.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.129
+ 100.64.79.129
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 517694b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 517694b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 517694b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 517694b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 517694b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 517694b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 517694b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 517694b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 517694b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 517694b0-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 517694b0-20a2-11ed-ab44-599bbcff3eda
+
+
+
diff --git a/graph/incidents_graphml/5/51789080-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/51789080-20a2-11ed-ab44-599bbcff3eda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eed4f2c049076521b055e09560aefd23942efb13
--- /dev/null
+++ b/graph/incidents_graphml/5/51789080-20a2-11ed-ab44-599bbcff3eda.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.130
+ 100.64.79.130
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.233
+ 100.64.73.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.138
+ 100.64.72.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.131
+ 100.64.79.131
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.68.129
+ 100.64.68.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.132
+ 100.64.79.132
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+ INCIDENT_LINK
+ 1661011704
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51789080-20a2-11ed-ab44-599bbcff3eda
+
+
+
diff --git a/graph/incidents_graphml/5/5178a1d0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/5178a1d0-2ff4-11ee-881d-9b9601b76edb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c3c55ff05afc62a6b3039b8e5225b58b7ba4085
--- /dev/null
+++ b/graph/incidents_graphml/5/5178a1d0-2ff4-11ee-881d-9b9601b76edb.graphml
@@ -0,0 +1,129 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.73
+ 100.64.29.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690843688
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5178a1d0-2ff4-11ee-881d-9b9601b76edb
+
+
+ INCIDENT_LINK
+ 1690843688
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5178a1d0-2ff4-11ee-881d-9b9601b76edb
+
+
+ INCIDENT_LINK
+ 1690843688
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5178a1d0-2ff4-11ee-881d-9b9601b76edb
+
+
+ INCIDENT_LINK
+ 1690843688
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5178a1d0-2ff4-11ee-881d-9b9601b76edb
+
+
+
diff --git a/graph/incidents_graphml/5/518ef880-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/518ef880-063d-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c402a0a9e3053097208e2c82c33c2b109bbb64dd
--- /dev/null
+++ b/graph/incidents_graphml/5/518ef880-063d-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.125
+ 100.64.12.125
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686257092
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 518ef880-063d-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/5/5191b6a0-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/5191b6a0-51f7-11ee-8f5a-e9a9bd036d73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2da03604dd42dd2098a406e7c490db923aa87b78
--- /dev/null
+++ b/graph/incidents_graphml/5/5191b6a0-51f7-11ee-8f5a-e9a9bd036d73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.74
+ 100.64.83.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694583316
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5191b6a0-51f7-11ee-8f5a-e9a9bd036d73
+
+
+
diff --git a/graph/incidents_graphml/5/5192d410-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/5192d410-0835-11ee-9239-4117e3175884.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f3cc5d08025af932acaf0d1fd153845b66397c0
--- /dev/null
+++ b/graph/incidents_graphml/5/5192d410-0835-11ee-9239-4117e3175884.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.141
+ USER-0015-1430.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473559
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5192d410-0835-11ee-9239-4117e3175884
+
+
+
diff --git a/graph/incidents_graphml/5/51950370-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/51950370-2ff4-11ee-881d-9b9601b76edb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..172b1f2d99c6a0972c79fd861b3a2edc57ee6156
--- /dev/null
+++ b/graph/incidents_graphml/5/51950370-2ff4-11ee-881d-9b9601b76edb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.73
+ 100.64.29.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690843688
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 51950370-2ff4-11ee-881d-9b9601b76edb
+
+
+
diff --git a/graph/incidents_graphml/5/519e87e0-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/519e87e0-51f7-11ee-8f5a-e9a9bd036d73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8bc6a547f8c387e4863be5dc8794b720c7af53d0
--- /dev/null
+++ b/graph/incidents_graphml/5/519e87e0-51f7-11ee-8f5a-e9a9bd036d73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.83.74
+ 100.64.83.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694583316
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 519e87e0-51f7-11ee-8f5a-e9a9bd036d73
+
+
+
diff --git a/graph/incidents_graphml/5/51a8a6d0-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/51a8a6d0-0fb1-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35db02a21b9d5c76973c742fbd944d0fcdd998c4
--- /dev/null
+++ b/graph/incidents_graphml/5/51a8a6d0-0fb1-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.166
+ 100.64.42.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715443972
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51a8a6d0-0fb1-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/5/51a98560-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/51a98560-063d-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be1e21fa3d3eadaf64f3694cfe93184d58aa18f0
--- /dev/null
+++ b/graph/incidents_graphml/5/51a98560-063d-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.36
+ 100.64.37.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686257092
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51a98560-063d-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/5/51a99ce0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/51a99ce0-2ff4-11ee-881d-9b9601b76edb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13680846197e247c220985a776ed4538f9574216
--- /dev/null
+++ b/graph/incidents_graphml/5/51a99ce0-2ff4-11ee-881d-9b9601b76edb.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.166
+ 100.64.38.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690843688
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51a99ce0-2ff4-11ee-881d-9b9601b76edb
+
+
+ INCIDENT_LINK
+ 1690843688
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51a99ce0-2ff4-11ee-881d-9b9601b76edb
+
+
+
diff --git a/graph/incidents_graphml/5/51b83cc0-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/5/51b83cc0-ed09-11ec-8ab6-b3d858f740e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d11f46e6ea7b71a29fc0d76557091eb4eae1f6f
--- /dev/null
+++ b/graph/incidents_graphml/5/51b83cc0-ed09-11ec-8ab6-b3d858f740e7.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.172
+ USER-0015-1789.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.3.254
+ 100.64.3.254
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655338482
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51b83cc0-ed09-11ec-8ab6-b3d858f740e7
+
+
+ INCIDENT_LINK
+ 1655338482
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51b83cc0-ed09-11ec-8ab6-b3d858f740e7
+
+
+
diff --git a/graph/incidents_graphml/5/51b96fb0-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/51b96fb0-0fb1-11ef-ba57-a7da65bcbce4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9bb42a64d6f4f1d601fd1994c0e867b71cc1c56
--- /dev/null
+++ b/graph/incidents_graphml/5/51b96fb0-0fb1-11ef-ba57-a7da65bcbce4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.166
+ 100.64.42.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715443972
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 51b96fb0-0fb1-11ef-ba57-a7da65bcbce4
+
+
+
diff --git a/graph/incidents_graphml/5/51b9aba0-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/51b9aba0-6a4e-11ee-a1cb-53f21743b64f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10d58f5fa104786ac25888b1e4638ffab6163fde
--- /dev/null
+++ b/graph/incidents_graphml/5/51b9aba0-6a4e-11ee-a1cb-53f21743b64f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.19
+ 100.64.62.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697259510
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51b9aba0-6a4e-11ee-a1cb-53f21743b64f
+
+
+
diff --git a/graph/incidents_graphml/5/51bfe400-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/51bfe400-2ff4-11ee-881d-9b9601b76edb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03ed686ca1e35443bd4a1981e01f71b8a72f7cb4
--- /dev/null
+++ b/graph/incidents_graphml/5/51bfe400-2ff4-11ee-881d-9b9601b76edb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.166
+ 100.64.38.166
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690843688
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 51bfe400-2ff4-11ee-881d-9b9601b76edb
+
+
+
diff --git a/graph/incidents_graphml/5/51c67e50-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/51c67e50-515f-11ee-9251-b53d19eaa2b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ff7cd369a91788515048724072832c703e6be91
--- /dev/null
+++ b/graph/incidents_graphml/5/51c67e50-515f-11ee-9251-b53d19eaa2b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.236
+ 100.64.52.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694518033
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51c67e50-515f-11ee-9251-b53d19eaa2b9
+
+
+
diff --git a/graph/incidents_graphml/5/51c8c6d0-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/51c8c6d0-6a4e-11ee-a1cb-53f21743b64f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3231e233b3399ded6c9728184a5fc7c22211375b
--- /dev/null
+++ b/graph/incidents_graphml/5/51c8c6d0-6a4e-11ee-a1cb-53f21743b64f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.19
+ 100.64.62.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697259510
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 51c8c6d0-6a4e-11ee-a1cb-53f21743b64f
+
+
+
diff --git a/graph/incidents_graphml/5/51cb3e30-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/51cb3e30-063d-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e406d20c2742b155225fb558d3378766132ffc7
--- /dev/null
+++ b/graph/incidents_graphml/5/51cb3e30-063d-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.36
+ 100.64.37.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686257093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 51cb3e30-063d-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/5/51d0e290-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/51d0e290-5133-11ee-b458-8f76bdd93836.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ecd204717a4a252def33112b9933b4d399471436
--- /dev/null
+++ b/graph/incidents_graphml/5/51d0e290-5133-11ee-b458-8f76bdd93836.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.46
+ 100.64.21.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694499135
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 51d0e290-5133-11ee-b458-8f76bdd93836
+
+
+
diff --git a/graph/incidents_graphml/5/51d1a070-7412-11ee-91c2-7545920d3cab.graphml b/graph/incidents_graphml/5/51d1a070-7412-11ee-91c2-7545920d3cab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d97661b93a6eaa09255d560ac3b3b829e63f61eb
--- /dev/null
+++ b/graph/incidents_graphml/5/51d1a070-7412-11ee-91c2-7545920d3cab.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.8
+ 100.64.70.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.29.177
+ 100.64.29.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1698333252
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51d1a070-7412-11ee-91c2-7545920d3cab
+
+
+ INCIDENT_LINK
+ 1698333252
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51d1a070-7412-11ee-91c2-7545920d3cab
+
+
+ INCIDENT_LINK
+ 1698333252
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51d1a070-7412-11ee-91c2-7545920d3cab
+
+
+ INCIDENT_LINK
+ 1698333252
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51d1a070-7412-11ee-91c2-7545920d3cab
+
+
+
diff --git a/graph/incidents_graphml/5/51da22c0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/51da22c0-2ff4-11ee-881d-9b9601b76edb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..563589aff73521368adc3b6cf0704a71d0e2ea92
--- /dev/null
+++ b/graph/incidents_graphml/5/51da22c0-2ff4-11ee-881d-9b9601b76edb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.168
+ 100.64.38.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690843688
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51da22c0-2ff4-11ee-881d-9b9601b76edb
+
+
+
diff --git a/graph/incidents_graphml/5/51db65e0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/51db65e0-515f-11ee-9251-b53d19eaa2b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a45d392e739093f53ef25d490ffd4d41cdb11e39
--- /dev/null
+++ b/graph/incidents_graphml/5/51db65e0-515f-11ee-9251-b53d19eaa2b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.236
+ 100.64.52.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694518033
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51db65e0-515f-11ee-9251-b53d19eaa2b9
+
+
+
diff --git a/graph/incidents_graphml/5/51e1ac60-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/51e1ac60-063d-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34e5ef79d32005f81cc49cce1f794a0c191cb448
--- /dev/null
+++ b/graph/incidents_graphml/5/51e1ac60-063d-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.254
+ 100.64.17.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686257093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51e1ac60-063d-11ee-a6b9-2fa958ecde6f
+
+
+ INCIDENT_LINK
+ 1686257093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51e1ac60-063d-11ee-a6b9-2fa958ecde6f
+
+
+ INCIDENT_LINK
+ 1686257093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51e1ac60-063d-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/5/51f2c260-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/51f2c260-51f7-11ee-8f5a-e9a9bd036d73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85c805ed89bb8c701dbe25e7814a74413b6d9d67
--- /dev/null
+++ b/graph/incidents_graphml/5/51f2c260-51f7-11ee-8f5a-e9a9bd036d73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.169
+ USER-0015-2071.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1694583316
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 51f2c260-51f7-11ee-8f5a-e9a9bd036d73
+
+
+
diff --git a/graph/incidents_graphml/5/51f3dfa0-adbb-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/5/51f3dfa0-adbb-11ed-a9cd-bdbbd3b810c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e69d6a8071f25e1317a86d3242c4e4c4575a2801
--- /dev/null
+++ b/graph/incidents_graphml/5/51f3dfa0-adbb-11ed-a9cd-bdbbd3b810c7.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.163.188.4
+ 10.163.188.4
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","AWS VPC Security","Windows Logs"]
+
+
+ HOST
+ 10.187.158.205
+ 10.187.158.205
+ ["Exploiting Target"]
+ 0.7890625
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1676525556
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51f3dfa0-adbb-11ed-a9cd-bdbbd3b810c7
+
+
+ INCIDENT_LINK
+ 1676525556
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 51f3dfa0-adbb-11ed-a9cd-bdbbd3b810c7
+
+
+
diff --git a/graph/incidents_graphml/5/51f904f0-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/51f904f0-063d-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55ee54e73108b9073b32178a00dc9160d283dc74
--- /dev/null
+++ b/graph/incidents_graphml/5/51f904f0-063d-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.254
+ 100.64.17.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686257093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 51f904f0-063d-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/5/52044e90-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/52044e90-51f7-11ee-8f5a-e9a9bd036d73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..acc552141b284194f99532b97b4bc39cf13b9df7
--- /dev/null
+++ b/graph/incidents_graphml/5/52044e90-51f7-11ee-8f5a-e9a9bd036d73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.91.169
+ USER-0015-2071.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694583317
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 52044e90-51f7-11ee-8f5a-e9a9bd036d73
+
+
+
diff --git a/graph/incidents_graphml/5/520b8bb0-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/5/520b8bb0-2f33-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9816edeb3214f1498a48ca644195370560289b2f
--- /dev/null
+++ b/graph/incidents_graphml/5/520b8bb0-2f33-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.126
+ 100.64.71.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.53
+ 100.64.82.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.54
+ 100.64.82.54
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.18.117
+ 100.64.18.117
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.85
+ 100.64.73.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.116
+ 100.64.72.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.52
+ 100.64.72.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.24.235
+ 100.64.24.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.9.12
+ 100.64.9.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760796
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 520b8bb0-2f33-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/5/520bba90-3662-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/5/520bba90-3662-11ef-b33d-111abc4c57da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f7518f842e1d044149b6a3073dff3a18b70e70f
--- /dev/null
+++ b/graph/incidents_graphml/5/520bba90-3662-11ef-b33d-111abc4c57da.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.73
+ USER-0015-1343.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719698138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 520bba90-3662-11ef-b33d-111abc4c57da
+
+
+ INCIDENT_LINK
+ 1719698138
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 520bba90-3662-11ef-b33d-111abc4c57da
+
+
+