diff --git a/graph/incidents_graphml/4/48ef54a0-6d11-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/4/48ef54a0-6d11-11ee-9911-f50eb88c1287.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ee64db7638f99cb71a70706949dcfcb04d333b1 --- /dev/null +++ b/graph/incidents_graphml/4/48ef54a0-6d11-11ee-9911-f50eb88c1287.graphml @@ -0,0 +1,797 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.235 + 100.64.15.235 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.236 + 100.64.15.236 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.237 + 100.64.15.237 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.238 + 100.64.15.238 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.239 + 100.64.15.239 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.240 + 100.64.15.240 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.241 + 100.64.15.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.242 + 100.64.15.242 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.243 + 100.64.15.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.244 + 100.64.15.244 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.83 + 100.64.5.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.245 + 100.64.15.245 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + INCIDENT_LINK + 1697563150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 48ef54a0-6d11-11ee-9911-f50eb88c1287 + + + diff --git a/graph/incidents_graphml/4/48fb4580-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/48fb4580-850d-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..532e5bc708ea57ac9fd6260161e24a1383b76de5 --- /dev/null +++ b/graph/incidents_graphml/4/48fb4580-850d-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.50 + 100.64.9.50 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700200260 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48fb4580-850d-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/4/48ff9730-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/48ff9730-631f-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a5579c40160de186c42c3d332b41e0f1945c7e8 --- /dev/null +++ b/graph/incidents_graphml/4/48ff9730-631f-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.228 + 100.64.37.228 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696469651 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 48ff9730-631f-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/4/49001890-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/49001890-efa8-11ec-88e9-cd157aceabd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..73ed79f9a853154842a57aedd8795ef53d029457 --- /dev/null +++ b/graph/incidents_graphml/4/49001890-efa8-11ec-88e9-cd157aceabd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.79.61 + USER-0015-1904.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655626660 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 49001890-efa8-11ec-88e9-cd157aceabd3 + + + diff --git a/graph/incidents_graphml/4/49048aa0-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/49048aa0-2270-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae9eee9458d3c77b6b22573d01cdd1d3d04641e8 --- /dev/null +++ b/graph/incidents_graphml/4/49048aa0-2270-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.134 + 100.64.91.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689357615 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 49048aa0-2270-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/4/490670c0-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/4/490670c0-30fe-11ef-82e2-b166e7a5de57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc72c629f09b8719405bea9e8108f3b3cc3491e7 --- /dev/null +++ b/graph/incidents_graphml/4/490670c0-30fe-11ef-82e2-b166e7a5de57.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.144 + 100.64.46.144 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.145 + 100.64.46.145 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.146 + 100.64.46.146 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.230 + 100.64.40.230 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719105417 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490670c0-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490670c0-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490670c0-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490670c0-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490670c0-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490670c0-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490670c0-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490670c0-30fe-11ef-82e2-b166e7a5de57 + + + diff --git a/graph/incidents_graphml/4/49077fb0-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/49077fb0-5909-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6942cd465e310033181de1b167406931d3d8ec0f --- /dev/null +++ b/graph/incidents_graphml/4/49077fb0-5909-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.243 + 100.64.56.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360691 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49077fb0-5909-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/4/49096700-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/49096700-2cc0-11ee-9ea2-17c9a8b72baa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc362357ad3a27a3e751d3f5f980a629e6f9a2a7 --- /dev/null +++ b/graph/incidents_graphml/4/49096700-2cc0-11ee-9ea2-17c9a8b72baa.graphml @@ -0,0 +1,489 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.218 + 100.64.42.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.140 + 100.64.14.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.219 + 100.64.42.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.44 + 100.64.20.44 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.220 + 100.64.42.220 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.221 + 100.64.42.221 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.11 + 100.64.29.11 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.222 + 100.64.42.222 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491486 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49096700-2cc0-11ee-9ea2-17c9a8b72baa + + + diff --git a/graph/incidents_graphml/4/49098040-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/49098040-d383-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03104a3135d559bf793aa1464b8d64df758cd893 --- /dev/null +++ b/graph/incidents_graphml/4/49098040-d383-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.240 + 100.64.31.240 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708827131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49098040-d383-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/490a89e0-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/490a89e0-6fe7-11ee-bec7-efacac475e54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e7a6bca6d9d724ce44294c6bac7960312425d92 --- /dev/null +++ b/graph/incidents_graphml/4/490a89e0-6fe7-11ee-bec7-efacac475e54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.27 + 100.64.63.27 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697874964 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 490a89e0-6fe7-11ee-bec7-efacac475e54 + + + diff --git a/graph/incidents_graphml/4/490bfd10-676e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/4/490bfd10-676e-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0387a69f596bbe1171a437819566f82923e1505 --- /dev/null +++ b/graph/incidents_graphml/4/490bfd10-676e-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,841 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.178 + USER-0015-1303.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.179 + 100.64.34.179 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.180 + 100.64.34.180 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.181 + 100.64.34.181 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.108 + 100.64.19.108 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.89 + 100.64.26.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.182 + 100.64.34.182 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.183 + 100.64.34.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.217 + 100.64.20.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.184 + 100.64.34.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.185 + 100.64.34.185 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.186 + 100.64.34.186 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.187 + 100.64.34.187 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.27 + 100.64.25.27 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.188 + 100.64.34.188 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.189 + 100.64.34.189 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.216 + 100.64.23.216 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + INCIDENT_LINK + 1696943386 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 490bfd10-676e-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/4/490d46e0-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/490d46e0-850d-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0dd98da21469e2223fd78a49bd88232fee4d578c --- /dev/null +++ b/graph/incidents_graphml/4/490d46e0-850d-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.52 + 100.64.9.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700200260 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 490d46e0-850d-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/4/490f9cc0-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/490f9cc0-631f-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a550e04c0ac579a2644ee7b5053d1078724f1aa --- /dev/null +++ b/graph/incidents_graphml/4/490f9cc0-631f-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.228 + 100.64.37.228 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696469651 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 490f9cc0-631f-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/4/4914ee10-331d-11ed-b7a7-43dc40721942.graphml b/graph/incidents_graphml/4/4914ee10-331d-11ed-b7a7-43dc40721942.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c4a18c534168075f76e1df399b4e8f0c75828b2 --- /dev/null +++ b/graph/incidents_graphml/4/4914ee10-331d-11ed-b7a7-43dc40721942.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.147.151 + 192.168.147.151 + ["Exploiting Target","Exploiting Host"] + 0.9296875 + ["Precinct","Meraki","Umbrella","Windows Active Directory"] + + + HOST + HOST-14470 + USER-0015-1751.example.internal + ["Exploiting Target","Exploiting Host"] + 0.9296875 + ["Precinct","Umbrella","Meraki"] + + + INCIDENT_LINK + 1663043639 + malicious + 0.9296875 + 0.9296875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4914ee10-331d-11ed-b7a7-43dc40721942 + + + diff --git a/graph/incidents_graphml/4/49151a40-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/49151a40-0836-11ee-b8d0-013dce35746a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcac184bce5e1c8f504e1e5973ca244869c2a13f --- /dev/null +++ b/graph/incidents_graphml/4/49151a40-0836-11ee-b8d0-013dce35746a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.46 + 100.64.19.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49151a40-0836-11ee-b8d0-013dce35746a + + + diff --git a/graph/incidents_graphml/4/49171290-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/4/49171290-30fe-11ef-82e2-b166e7a5de57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da3d8337922e3ed7b82353138f1e822b1965ac77 --- /dev/null +++ b/graph/incidents_graphml/4/49171290-30fe-11ef-82e2-b166e7a5de57.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.150 + 100.64.46.150 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.179 + 100.64.21.179 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.151 + 100.64.46.151 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.152 + 100.64.46.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.25 + 100.64.21.25 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719105417 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49171290-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49171290-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49171290-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49171290-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49171290-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49171290-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49171290-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49171290-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49171290-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105417 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49171290-30fe-11ef-82e2-b166e7a5de57 + + + diff --git a/graph/incidents_graphml/4/491932f0-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/491932f0-5909-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..365df023d9eac7641781f013c52932eb55771184 --- /dev/null +++ b/graph/incidents_graphml/4/491932f0-5909-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.243 + 100.64.56.243 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360691 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 491932f0-5909-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/4/491b6370-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/491b6370-dba2-11ed-8f69-23b0b50da3c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a980ec8276637c6819703eccdf81cca27b6cc4cf --- /dev/null +++ b/graph/incidents_graphml/4/491b6370-dba2-11ed-8f69-23b0b50da3c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.139 + 100.64.75.139 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681572557 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 491b6370-dba2-11ed-8f69-23b0b50da3c2 + + + diff --git a/graph/incidents_graphml/4/491d0f50-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/4/491d0f50-be91-11ed-9416-c54055a72e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a03adb119401720cc4b6e6a4d62567ed1fc1daad --- /dev/null +++ b/graph/incidents_graphml/4/491d0f50-be91-11ed-9416-c54055a72e53.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.177 + 100.64.75.177 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.79.186 + 100.64.79.186 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1678376672 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 491d0f50-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376672 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 491d0f50-be91-11ed-9416-c54055a72e53 + + + diff --git a/graph/incidents_graphml/4/491d3150-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/491d3150-631f-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52d31a1a4978c1bcb745f0e0a85009023fa1596a --- /dev/null +++ b/graph/incidents_graphml/4/491d3150-631f-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.242 + 100.64.40.242 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696469651 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 491d3150-631f-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/4/491fa930-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/491fa930-dba2-11ed-8f69-23b0b50da3c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c24051b7d7e549286e86f8bff3f1c980e7b9ea9f --- /dev/null +++ b/graph/incidents_graphml/4/491fa930-dba2-11ed-8f69-23b0b50da3c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.139 + 100.64.75.139 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1681572557 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 491fa930-dba2-11ed-8f69-23b0b50da3c2 + + + diff --git a/graph/incidents_graphml/4/49221150-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/49221150-d383-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..973482a6f3c54fb725a5d80c71a12e7ae1ee7d91 --- /dev/null +++ b/graph/incidents_graphml/4/49221150-d383-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.240 + 100.64.31.240 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708827131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 49221150-d383-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/49222900-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/4/49222900-1f34-11ee-bd83-b52c9cbf0232.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cc03074dc437d53c53452f23e2b705449a8a873 --- /dev/null +++ b/graph/incidents_graphml/4/49222900-1f34-11ee-bd83-b52c9cbf0232.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.131 + 100.64.34.131 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.234 + 100.64.71.234 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.68.136 + 100.64.68.136 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689001992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49222900-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49222900-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49222900-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49222900-1f34-11ee-bd83-b52c9cbf0232 + + + diff --git a/graph/incidents_graphml/4/49236a80-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/4/49236a80-f286-11ec-babd-d5ed2eda1ac6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0192f27082a96f8b9363d372a381e7fd59e5a83c --- /dev/null +++ b/graph/incidents_graphml/4/49236a80-f286-11ec-babd-d5ed2eda1ac6.graphml @@ -0,0 +1,805 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.153 + USER-0015-1853.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.202 + USER-0015-1870.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.55 + USER-0015-1871.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.81 + 100.64.81.81 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.82 + USER-0015-1872.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.247 + USER-0015-1873.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.152 + USER-0015-1874.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.83 + USER-0015-1875.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.39 + USER-0015-1706.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.193 + USER-0015-1876.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.84 + USER-0015-1877.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.182 + USER-0015-1639.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.165 + USER-0015-1878.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.120 + USER-0015-1661.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.155 + USER-0015-1879.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.241 + USER-0015-1880.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.19 + USER-0015-1881.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.79.72 + USER-0015-1882.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.136 + USER-0015-1708.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.166 + USER-0015-1883.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.171 + USER-0015-1884.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.222 + USER-0015-1885.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.47 + USER-0015-1886.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.151 + USER-0015-1887.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.248 + USER-0015-1888.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.47 + USER-0015-1889.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.85 + USER-0015-1890.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.181 + USER-0015-1891.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.86 + USER-0015-1892.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49236a80-f286-11ec-babd-d5ed2eda1ac6 + + + diff --git a/graph/incidents_graphml/4/492715a0-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/492715a0-5909-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae73e5438211f1411b542f7a88f22ff890c707a0 --- /dev/null +++ b/graph/incidents_graphml/4/492715a0-5909-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.10 + 100.64.61.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360691 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 492715a0-5909-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/4/492c7390-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/492c7390-631f-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4884c3ea9e09c15ed238699eaf60e233381b0eac --- /dev/null +++ b/graph/incidents_graphml/4/492c7390-631f-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.242 + 100.64.40.242 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696469651 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 492c7390-631f-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/4/493023f0-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/493023f0-dba2-11ed-8f69-23b0b50da3c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96b9793552104521adcf5de0e7eab9abad25c774 --- /dev/null +++ b/graph/incidents_graphml/4/493023f0-dba2-11ed-8f69-23b0b50da3c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.10 + 100.64.76.10 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681572557 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 493023f0-dba2-11ed-8f69-23b0b50da3c2 + + + diff --git a/graph/incidents_graphml/4/49337f50-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/49337f50-dba2-11ed-8f69-23b0b50da3c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4896b8afdb3647a81bb11827ab48a9dda6262354 --- /dev/null +++ b/graph/incidents_graphml/4/49337f50-dba2-11ed-8f69-23b0b50da3c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.76.10 + 100.64.76.10 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681572557 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 49337f50-dba2-11ed-8f69-23b0b50da3c2 + + + diff --git a/graph/incidents_graphml/4/4934fe50-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/4934fe50-0836-11ee-b8d0-013dce35746a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d44ce4d82ff8a0c6ca8a6054f95f3426bec8cb00 --- /dev/null +++ b/graph/incidents_graphml/4/4934fe50-0836-11ee-b8d0-013dce35746a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.46 + 100.64.19.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473974 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4934fe50-0836-11ee-b8d0-013dce35746a + + + diff --git a/graph/incidents_graphml/4/4935a230-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/4935a230-dba2-11ed-8f69-23b0b50da3c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8fa864e87fa6d7bc4052015a34f04e9f4526f265 --- /dev/null +++ b/graph/incidents_graphml/4/4935a230-dba2-11ed-8f69-23b0b50da3c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.11 + 100.64.76.11 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681572557 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4935a230-dba2-11ed-8f69-23b0b50da3c2 + + + diff --git a/graph/incidents_graphml/4/493683b0-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/493683b0-d383-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25b3f8edc6760cdbaf6575cec4666db103b4e0d1 --- /dev/null +++ b/graph/incidents_graphml/4/493683b0-d383-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.242 + 100.64.31.242 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708827131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 493683b0-d383-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/4938af70-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/4938af70-dba2-11ed-8f69-23b0b50da3c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bf20def7a770324ea7a56ddc2f6c03c1a934f6b --- /dev/null +++ b/graph/incidents_graphml/4/4938af70-dba2-11ed-8f69-23b0b50da3c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.76.11 + 100.64.76.11 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681572557 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4938af70-dba2-11ed-8f69-23b0b50da3c2 + + + diff --git a/graph/incidents_graphml/4/493944d0-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/493944d0-631f-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1b531b484934636fdbd058c17d9b9fee47006c5 --- /dev/null +++ b/graph/incidents_graphml/4/493944d0-631f-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.243 + 100.64.40.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696469651 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 493944d0-631f-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/4/493b60f0-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/493b60f0-5909-11ee-a459-5b20d657705e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc035c5901e54d62fe96e84e51ece96571bb2927 --- /dev/null +++ b/graph/incidents_graphml/4/493b60f0-5909-11ee-a459-5b20d657705e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.10 + 100.64.61.10 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360691 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 493b60f0-5909-11ee-a459-5b20d657705e + + + diff --git a/graph/incidents_graphml/4/49458960-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/49458960-9ff2-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad8a370cde933f4510117673bbac68fe8be27189 --- /dev/null +++ b/graph/incidents_graphml/4/49458960-9ff2-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.252 + 100.64.7.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703157345 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49458960-9ff2-11ee-b57e-09f55271957e + + + INCIDENT_LINK + 1703157345 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49458960-9ff2-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/4946cba0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/4946cba0-2611-11ee-a11d-5dcee9a57544.graphml new file mode 100644 index 0000000000000000000000000000000000000000..873b1d0e5eb00d670970ad6839bef2c80d3d4868 --- /dev/null +++ b/graph/incidents_graphml/4/4946cba0-2611-11ee-a11d-5dcee9a57544.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.115 + 100.64.57.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689756618 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4946cba0-2611-11ee-a11d-5dcee9a57544 + + + diff --git a/graph/incidents_graphml/4/49487ee0-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/49487ee0-f83f-11ee-a565-4974183b9eb9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ede2efd6dd29ec9f6dff671fb7f334936f1a1023 --- /dev/null +++ b/graph/incidents_graphml/4/49487ee0-f83f-11ee-a565-4974183b9eb9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.199 + 100.64.22.199 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712866119 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49487ee0-f83f-11ee-a565-4974183b9eb9 + + + diff --git a/graph/incidents_graphml/4/49518c00-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/49518c00-0ef9-11ed-ae8a-a78294a70068.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f50c6057ca2138f8ce79c05f6d475bcc691ff74 --- /dev/null +++ b/graph/incidents_graphml/4/49518c00-0ef9-11ed-ae8a-a78294a70068.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1985.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659069935 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 49518c00-0ef9-11ed-ae8a-a78294a70068 + + + diff --git a/graph/incidents_graphml/4/4952def0-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/4/4952def0-f286-11ec-babd-d5ed2eda1ac6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f58d7cf74ade4be86e8afa92dee00ac19693bef --- /dev/null +++ b/graph/incidents_graphml/4/4952def0-f286-11ec-babd-d5ed2eda1ac6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.100 + 100.64.81.100 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655941911 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4952def0-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941911 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4952def0-f286-11ec-babd-d5ed2eda1ac6 + + + diff --git a/graph/incidents_graphml/4/49544b20-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/49544b20-0ef9-11ed-ae8a-a78294a70068.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d48984d7e02c327231d0a98dde898e98715c1b3 --- /dev/null +++ b/graph/incidents_graphml/4/49544b20-0ef9-11ed-ae8a-a78294a70068.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.224 + 100.64.97.224 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659069935 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49544b20-0ef9-11ed-ae8a-a78294a70068 + + + diff --git a/graph/incidents_graphml/4/49577f70-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/49577f70-0ef9-11ed-ae8a-a78294a70068.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1642b4765853e9d85d2af7e00b2c65ed3f1a28dc --- /dev/null +++ b/graph/incidents_graphml/4/49577f70-0ef9-11ed-ae8a-a78294a70068.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.224 + 100.64.97.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659069935 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 49577f70-0ef9-11ed-ae8a-a78294a70068 + + + diff --git a/graph/incidents_graphml/4/4958d290-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4958d290-f83f-11ee-a565-4974183b9eb9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ed357d0325336c1b243cf0b89073bc40042c89e --- /dev/null +++ b/graph/incidents_graphml/4/4958d290-f83f-11ee-a565-4974183b9eb9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.199 + 100.64.22.199 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712866119 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4958d290-f83f-11ee-a565-4974183b9eb9 + + + diff --git a/graph/incidents_graphml/4/495f0ee0-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/495f0ee0-0068-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e99a36d866fcfe98a80c8e970ee72ed03df9514 --- /dev/null +++ b/graph/incidents_graphml/4/495f0ee0-0068-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.182 + 100.64.59.182 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713763338 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 495f0ee0-0068-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/4/49643eb0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/49643eb0-2611-11ee-a11d-5dcee9a57544.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b60b249389732870780489015e110c4822ccd98 --- /dev/null +++ b/graph/incidents_graphml/4/49643eb0-2611-11ee-a11d-5dcee9a57544.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.115 + 100.64.57.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689756618 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 49643eb0-2611-11ee-a11d-5dcee9a57544 + + + diff --git a/graph/incidents_graphml/4/4965a3d0-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4965a3d0-f83f-11ee-a565-4974183b9eb9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c66d741bab49be5bdca302e403cc44337772b1a --- /dev/null +++ b/graph/incidents_graphml/4/4965a3d0-f83f-11ee-a565-4974183b9eb9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.201 + 100.64.22.201 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712866119 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4965a3d0-f83f-11ee-a565-4974183b9eb9 + + + diff --git a/graph/incidents_graphml/4/496f7b30-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/496f7b30-08cf-11ef-81ac-a7f609e446b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71d0c6637bea515a2515eab2fa718ee224e5c922 --- /dev/null +++ b/graph/incidents_graphml/4/496f7b30-08cf-11ef-81ac-a7f609e446b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.211 + USER-0015-2066.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1999.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1714687185 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 496f7b30-08cf-11ef-81ac-a7f609e446b5 + + + diff --git a/graph/incidents_graphml/4/497470e0-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/497470e0-f83f-11ee-a565-4974183b9eb9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be562873a99fca917c36061bb02b855b35c8b58b --- /dev/null +++ b/graph/incidents_graphml/4/497470e0-f83f-11ee-a565-4974183b9eb9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.201 + 100.64.22.201 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1712866119 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 497470e0-f83f-11ee-a565-4974183b9eb9 + + + diff --git a/graph/incidents_graphml/4/4977c700-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4977c700-0068-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04621d4b1cc103da4d2b9727bb14d7bd65cca727 --- /dev/null +++ b/graph/incidents_graphml/4/4977c700-0068-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.182 + 100.64.59.182 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713763338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4977c700-0068-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/4/497852f0-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/4/497852f0-68ac-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29052077a040071b101667f65dced286b09a0b24 --- /dev/null +++ b/graph/incidents_graphml/4/497852f0-68ac-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.80 + 100.64.18.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697079967 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 497852f0-68ac-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/4/497ad3f0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/497ad3f0-2611-11ee-a11d-5dcee9a57544.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0aae71cd2b47324b39ddaf1b4696dae5248337df --- /dev/null +++ b/graph/incidents_graphml/4/497ad3f0-2611-11ee-a11d-5dcee9a57544.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.54 + 100.64.39.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689756618 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 497ad3f0-2611-11ee-a11d-5dcee9a57544 + + + diff --git a/graph/incidents_graphml/4/49807ea0-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/49807ea0-40ff-11ee-b8c2-77c1ecbb2825.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8511cd1bda3fcc279dfb5216462c855a43e42ad6 --- /dev/null +++ b/graph/incidents_graphml/4/49807ea0-40ff-11ee-b8c2-77c1ecbb2825.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692717568 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49807ea0-40ff-11ee-b8c2-77c1ecbb2825 + + + diff --git a/graph/incidents_graphml/4/4982b510-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/4982b510-08cf-11ef-81ac-a7f609e446b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84027cce57e0ee3d586d64907ca481b654dcf5fa --- /dev/null +++ b/graph/incidents_graphml/4/4982b510-08cf-11ef-81ac-a7f609e446b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1999.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.30.211 + USER-0015-2066.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714687185 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4982b510-08cf-11ef-81ac-a7f609e446b5 + + + diff --git a/graph/incidents_graphml/4/4984fa40-2824-11ef-b581-4d62d2263ef1.graphml b/graph/incidents_graphml/4/4984fa40-2824-11ef-b581-4d62d2263ef1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..261a644e0688b16a5330e10a93c653ad25c52972 --- /dev/null +++ b/graph/incidents_graphml/4/4984fa40-2824-11ef-b581-4d62d2263ef1.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.246.203 + 172.27.246.203 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.117 + 100.64.97.117 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.33 + 100.64.89.33 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.118 + 100.64.97.118 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718132178 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4984fa40-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132178 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4984fa40-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132178 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4984fa40-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132178 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4984fa40-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132178 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4984fa40-2824-11ef-b581-4d62d2263ef1 + + + INCIDENT_LINK + 1718132178 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4984fa40-2824-11ef-b581-4d62d2263ef1 + + + diff --git a/graph/incidents_graphml/4/4989f480-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/4989f480-40ff-11ee-b8c2-77c1ecbb2825.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc507f0681b92d4c921af6a56ccca872204f6bfb --- /dev/null +++ b/graph/incidents_graphml/4/4989f480-40ff-11ee-b8c2-77c1ecbb2825.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692717568 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4989f480-40ff-11ee-b8c2-77c1ecbb2825 + + + diff --git a/graph/incidents_graphml/4/4989f4b0-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4989f4b0-f83f-11ee-a565-4974183b9eb9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..970970ca115e2f8bfba1d0b3a22f6c0293853e7f --- /dev/null +++ b/graph/incidents_graphml/4/4989f4b0-f83f-11ee-a565-4974183b9eb9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.203 + 100.64.22.203 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712866119 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4989f4b0-f83f-11ee-a565-4974183b9eb9 + + + diff --git a/graph/incidents_graphml/4/498fec10-30fe-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/4/498fec10-30fe-11ef-82e2-b166e7a5de57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfde9c8facb61b618dfd831fe674ed4d3e8acdb2 --- /dev/null +++ b/graph/incidents_graphml/4/498fec10-30fe-11ef-82e2-b166e7a5de57.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.156 + 100.64.46.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.157 + 100.64.46.157 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.158 + 100.64.46.158 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.210 + 100.64.44.210 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719105418 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 498fec10-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105418 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 498fec10-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105418 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 498fec10-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105418 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 498fec10-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105418 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 498fec10-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105418 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 498fec10-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105418 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 498fec10-30fe-11ef-82e2-b166e7a5de57 + + + INCIDENT_LINK + 1719105418 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 498fec10-30fe-11ef-82e2-b166e7a5de57 + + + diff --git a/graph/incidents_graphml/4/4990ea40-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4990ea40-9ff2-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a9f6681694b59bc4932da6b2d476675a2cb5bb9 --- /dev/null +++ b/graph/incidents_graphml/4/4990ea40-9ff2-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.150 + 100.64.48.150 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703157346 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4990ea40-9ff2-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/4999f4b0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/4999f4b0-2611-11ee-a11d-5dcee9a57544.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc4c7f349d4342b5965b1ee62db7862945d659a5 --- /dev/null +++ b/graph/incidents_graphml/4/4999f4b0-2611-11ee-a11d-5dcee9a57544.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.54 + 100.64.39.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689756618 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4999f4b0-2611-11ee-a11d-5dcee9a57544 + + + diff --git a/graph/incidents_graphml/4/49a0f1b0-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/49a0f1b0-2270-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08975494836a08a95acf6517031f3393431a5ae4 --- /dev/null +++ b/graph/incidents_graphml/4/49a0f1b0-2270-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1689357616 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49a0f1b0-2270-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/4/49aa26b0-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/49aa26b0-40ff-11ee-b8c2-77c1ecbb2825.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3300ef80dcce67746fe0a0cb339b8ae375fb72a --- /dev/null +++ b/graph/incidents_graphml/4/49aa26b0-40ff-11ee-b8c2-77c1ecbb2825.graphml @@ -0,0 +1,251 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.21 + 100.64.39.21 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.70.208 + 100.64.70.208 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.4.233 + 100.64.4.233 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.32.174 + 100.64.32.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692717569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825 + + + INCIDENT_LINK + 1692717569 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49aa26b0-40ff-11ee-b8c2-77c1ecbb2825 + + + diff --git a/graph/incidents_graphml/4/49ae0c60-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/49ae0c60-5489-11ee-aade-a558f2065e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b0a1f0d4f1ba88774d0c613dd66cc3998b6a5a4 --- /dev/null +++ b/graph/incidents_graphml/4/49ae0c60-5489-11ee-aade-a558f2065e36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.91 + 100.64.47.91 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694865911 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49ae0c60-5489-11ee-aade-a558f2065e36 + + + diff --git a/graph/incidents_graphml/4/49ae3640-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/49ae3640-9ff2-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..804d6d56d0692d511b907801956212737bc74139 --- /dev/null +++ b/graph/incidents_graphml/4/49ae3640-9ff2-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.250 + 100.64.26.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703157346 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49ae3640-9ff2-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/49af1c40-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/49af1c40-08cf-11ef-81ac-a7f609e446b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19ad4abfc122a6b70bfc509845195ea919f3caf2 --- /dev/null +++ b/graph/incidents_graphml/4/49af1c40-08cf-11ef-81ac-a7f609e446b5.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.25.138 + 172.22.25.138 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.91.85 + 100.64.91.85 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714687186 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49af1c40-08cf-11ef-81ac-a7f609e446b5 + + + INCIDENT_LINK + 1714687186 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49af1c40-08cf-11ef-81ac-a7f609e446b5 + + + diff --git a/graph/incidents_graphml/4/49bf2360-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/49bf2360-5489-11ee-aade-a558f2065e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44926b539e8d865788f95ed5c6e5c4da46099f3a --- /dev/null +++ b/graph/incidents_graphml/4/49bf2360-5489-11ee-aade-a558f2065e36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.91 + 100.64.47.91 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694865912 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 49bf2360-5489-11ee-aade-a558f2065e36 + + + diff --git a/graph/incidents_graphml/4/49c17200-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/49c17200-2270-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1fb2d44c131b4ac4451d83fb8da5047503d5faa --- /dev/null +++ b/graph/incidents_graphml/4/49c17200-2270-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689357616 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 49c17200-2270-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/4/49c9d620-6d11-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/4/49c9d620-6d11-11ee-9911-f50eb88c1287.graphml new file mode 100644 index 0000000000000000000000000000000000000000..490df734d5cfe00f0484fbf238c0de1d017dd995 --- /dev/null +++ b/graph/incidents_graphml/4/49c9d620-6d11-11ee-9911-f50eb88c1287.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.2 + 100.64.16.2 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697563151 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49c9d620-6d11-11ee-9911-f50eb88c1287 + + + diff --git a/graph/incidents_graphml/4/49cbf770-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/49cbf770-9ff2-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e494cedd4fa409842e8ad098d15853ccddc6198c --- /dev/null +++ b/graph/incidents_graphml/4/49cbf770-9ff2-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.152 + 100.64.48.152 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703157346 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49cbf770-9ff2-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/49d5b710-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/49d5b710-08cf-11ef-81ac-a7f609e446b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24a90466dce3726990e0d70ee1001603cf8e8f63 --- /dev/null +++ b/graph/incidents_graphml/4/49d5b710-08cf-11ef-81ac-a7f609e446b5.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.19.54.137 + 172.19.54.137 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","Stealthwatch","Barracuda WAF"] + + + HOST + 100.64.91.87 + 100.64.91.87 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.88 + 100.64.91.88 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714687186 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49d5b710-08cf-11ef-81ac-a7f609e446b5 + + + INCIDENT_LINK + 1714687186 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49d5b710-08cf-11ef-81ac-a7f609e446b5 + + + INCIDENT_LINK + 1714687186 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49d5b710-08cf-11ef-81ac-a7f609e446b5 + + + INCIDENT_LINK + 1714687186 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 49d5b710-08cf-11ef-81ac-a7f609e446b5 + + + diff --git a/graph/incidents_graphml/4/49db39b0-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/49db39b0-9ff2-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa54e794699594dac5886fef199445407137f844 --- /dev/null +++ b/graph/incidents_graphml/4/49db39b0-9ff2-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.152 + 100.64.48.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703157346 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 49db39b0-9ff2-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/49e83620-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/49e83620-32d2-11ee-a4d6-4bc10938c808.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f421b09f5143be8bb8f0dbd0a9dd292d8f72c87 --- /dev/null +++ b/graph/incidents_graphml/4/49e83620-32d2-11ee-a4d6-4bc10938c808.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.22 + 100.64.65.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691158926 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 49e83620-32d2-11ee-a4d6-4bc10938c808 + + + diff --git a/graph/incidents_graphml/4/49fcda20-e50c-11ee-9817-3f0d09cf653c.graphml b/graph/incidents_graphml/4/49fcda20-e50c-11ee-9817-3f0d09cf653c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff62764155fd8bf4d46e719f1c3c601abede0e76 --- /dev/null +++ b/graph/incidents_graphml/4/49fcda20-e50c-11ee-9817-3f0d09cf653c.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.17 + 100.64.69.17 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.69.18 + 100.64.69.18 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.19 + 100.64.69.19 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710755143 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49fcda20-e50c-11ee-9817-3f0d09cf653c + + + INCIDENT_LINK + 1710755143 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49fcda20-e50c-11ee-9817-3f0d09cf653c + + + INCIDENT_LINK + 1710755143 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49fcda20-e50c-11ee-9817-3f0d09cf653c + + + INCIDENT_LINK + 1710755143 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49fcda20-e50c-11ee-9817-3f0d09cf653c + + + INCIDENT_LINK + 1710755143 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49fcda20-e50c-11ee-9817-3f0d09cf653c + + + INCIDENT_LINK + 1710755143 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 49fcda20-e50c-11ee-9817-3f0d09cf653c + + + diff --git a/graph/incidents_graphml/4/49ff8630-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/49ff8630-08cf-11ef-81ac-a7f609e446b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0bdc81f0b2b40a2e0cbe1ff13fd2ee80a45b50e5 --- /dev/null +++ b/graph/incidents_graphml/4/49ff8630-08cf-11ef-81ac-a7f609e446b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.61.193 + 100.64.61.193 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714687186 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 49ff8630-08cf-11ef-81ac-a7f609e446b5 + + + diff --git a/graph/incidents_graphml/4/4a016370-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4a016370-32d2-11ee-a4d6-4bc10938c808.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c0c10a2667e0a5e2d218619ef920440eecb762c --- /dev/null +++ b/graph/incidents_graphml/4/4a016370-32d2-11ee-a4d6-4bc10938c808.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.24 + 100.64.65.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691158926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4a016370-32d2-11ee-a4d6-4bc10938c808 + + + diff --git a/graph/incidents_graphml/4/4a0b57a0-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4a0b57a0-b6d5-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4702824bfdf9fd9b09fb19d5d9dd7cb8bad37d09 --- /dev/null +++ b/graph/incidents_graphml/4/4a0b57a0-b6d5-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.237 + 100.64.83.237 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1677526270 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a0b57a0-b6d5-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/4/4a1060b0-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4a1060b0-b6d5-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e4fee80d63f5aea109e76967d446fe4a9a44380 --- /dev/null +++ b/graph/incidents_graphml/4/4a1060b0-b6d5-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.83.237 + 100.64.83.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677526270 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a1060b0-b6d5-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/4/4a1db0a0-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/4a1db0a0-0836-11ee-b8d0-013dce35746a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..695aa3dc5156ac7d038a5b7d7f0f06f0f747f5f4 --- /dev/null +++ b/graph/incidents_graphml/4/4a1db0a0-0836-11ee-b8d0-013dce35746a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.165 + 100.64.65.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473976 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a1db0a0-0836-11ee-b8d0-013dce35746a + + + diff --git a/graph/incidents_graphml/4/4a247e90-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/4a247e90-f5ee-11ec-ae2b-8fa08eaee108.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abc07a5b7693f245028261bf73f40557fa080c59 --- /dev/null +++ b/graph/incidents_graphml/4/4a247e90-f5ee-11ec-ae2b-8fa08eaee108.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.43 + USER-0015-1914.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.232 + USER-0015-1915.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656316433 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a247e90-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316433 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a247e90-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316433 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a247e90-f5ee-11ec-ae2b-8fa08eaee108 + + + INCIDENT_LINK + 1656316433 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a247e90-f5ee-11ec-ae2b-8fa08eaee108 + + + diff --git a/graph/incidents_graphml/4/4a2d0110-05a9-11ef-8a49-f14dcee941df.graphml b/graph/incidents_graphml/4/4a2d0110-05a9-11ef-8a49-f14dcee941df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a05622204da0d63a4dec842026f6594967f06696 --- /dev/null +++ b/graph/incidents_graphml/4/4a2d0110-05a9-11ef-8a49-f14dcee941df.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.183.105 + 172.24.183.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.89.31 + 100.64.89.31 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.102 + 100.64.92.102 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714341012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a2d0110-05a9-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714341012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a2d0110-05a9-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714341012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a2d0110-05a9-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714341012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a2d0110-05a9-11ef-8a49-f14dcee941df + + + diff --git a/graph/incidents_graphml/4/4a2dda40-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4a2dda40-9fb5-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b73157121109acd153dad805b6ca963fa9a5c754 --- /dev/null +++ b/graph/incidents_graphml/4/4a2dda40-9fb5-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.124 + 100.64.24.124 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703131147 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4a2dda40-9fb5-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/4a357300-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/4a357300-2f75-11ee-b11e-87149c94e410.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65a1ce7ac79fc5dd86269a4f6cfb50e21f9d32d3 --- /dev/null +++ b/graph/incidents_graphml/4/4a357300-2f75-11ee-b11e-87149c94e410.graphml @@ -0,0 +1,617 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.42 + 100.64.42.42 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.43 + 100.64.42.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.190 + 100.64.27.190 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.44 + 100.64.42.44 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.45 + 100.64.42.45 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.46 + 100.64.42.46 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.47 + 100.64.42.47 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.48 + 100.64.42.48 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.49 + 100.64.42.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.50 + 100.64.42.50 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.51 + 100.64.42.51 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.52 + 100.64.42.52 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.53 + 100.64.42.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.54 + 100.64.42.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789129 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a357300-2f75-11ee-b11e-87149c94e410 + + + diff --git a/graph/incidents_graphml/4/4a409ef0-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4a409ef0-9fb5-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4e4c05b7bece70c5d85691f7b72fe9fec2aab42 --- /dev/null +++ b/graph/incidents_graphml/4/4a409ef0-9fb5-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.124 + 100.64.24.124 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703131147 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a409ef0-9fb5-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/4a412820-866f-11ee-8f03-878f88d78f03.graphml b/graph/incidents_graphml/4/4a412820-866f-11ee-8f03-878f88d78f03.graphml new file mode 100644 index 0000000000000000000000000000000000000000..afe798f088794754fb96c090e847d36dcd7430ae --- /dev/null +++ b/graph/incidents_graphml/4/4a412820-866f-11ee-8f03-878f88d78f03.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.152 + 100.64.10.152 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.33.70 + 100.64.33.70 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1700352304 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a412820-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352304 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a412820-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352304 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a412820-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352304 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a412820-866f-11ee-8f03-878f88d78f03 + + + diff --git a/graph/incidents_graphml/4/4a4dcf30-7437-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/4/4a4dcf30-7437-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6dcb56429643349cf3e6041b5cfe764af846a6fc --- /dev/null +++ b/graph/incidents_graphml/4/4a4dcf30-7437-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,429 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.146 + 100.64.71.146 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.147 + 100.64.71.147 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.148 + 100.64.71.148 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.87 + 100.64.71.87 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.149 + 100.64.71.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.70.245 + 100.64.70.245 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.150 + 100.64.71.150 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.151 + 100.64.71.151 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.152 + 100.64.71.152 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.153 + 100.64.71.153 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.154 + 100.64.71.154 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201633 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a4dcf30-7437-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/4/4a5ebd70-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/4a5ebd70-e873-11ee-9a77-df185ba75d8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..693a5ae1b0dd8f9f1e6de16c67f0d5d52a69976c --- /dev/null +++ b/graph/incidents_graphml/4/4a5ebd70-e873-11ee-9a77-df185ba75d8e.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.169.88.157 + 10.169.88.157 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","PAN NGFW","Windows Active Directory"] + + + HOST + 100.64.70.203 + 100.64.70.203 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.124 + 100.64.70.124 + ["Exploiting Target"] + 0.68359375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.204 + USER-0015-1605.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 10.88.97.186 + 10.88.97.186 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","Windows Active Directory","Vulnerability Management"] + + + HOST + 10.114.42.3 + 10.114.42.3 + ["Exploiting Host"] + 0.4375 + ["Precinct","PAN NGFW","Windows Active Directory"] + + + INCIDENT_LINK + 1711129236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a5ebd70-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a5ebd70-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a5ebd70-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a5ebd70-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a5ebd70-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a5ebd70-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a5ebd70-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a5ebd70-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a5ebd70-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a5ebd70-e873-11ee-9a77-df185ba75d8e + + + diff --git a/graph/incidents_graphml/4/4a6c0530-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4a6c0530-5489-11ee-aade-a558f2065e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30fd2f260661b3193706c9e77db16c3e37bb6797 --- /dev/null +++ b/graph/incidents_graphml/4/4a6c0530-5489-11ee-aade-a558f2065e36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.221 + 100.64.30.221 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694865913 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a6c0530-5489-11ee-aade-a558f2065e36 + + + diff --git a/graph/incidents_graphml/4/4a6e9580-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4a6e9580-5442-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..119726b51d063ef35434e182c2d4e282bbce56ab --- /dev/null +++ b/graph/incidents_graphml/4/4a6e9580-5442-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.165 + 100.64.23.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694835418 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a6e9580-5442-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/4/4a70a5f0-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4a70a5f0-0068-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3d1e59ce14ad34ad2d4538ad241e26674ea4ed2 --- /dev/null +++ b/graph/incidents_graphml/4/4a70a5f0-0068-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.122 + 100.64.64.122 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713763339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a70a5f0-0068-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713763339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a70a5f0-0068-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/4/4a7ec220-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4a7ec220-5442-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d825fa4c272826808359c38f76691eef5b0aa83d --- /dev/null +++ b/graph/incidents_graphml/4/4a7ec220-5442-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.64 + 100.64.15.64 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694835419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4a7ec220-5442-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/4/4a7f8d30-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4a7f8d30-5489-11ee-aade-a558f2065e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69d939acd2502a51bb2831741f75c54af27ad9e2 --- /dev/null +++ b/graph/incidents_graphml/4/4a7f8d30-5489-11ee-aade-a558f2065e36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.221 + 100.64.30.221 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694865913 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a7f8d30-5489-11ee-aade-a558f2065e36 + + + diff --git a/graph/incidents_graphml/4/4a87b060-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4a87b060-0068-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ffc2d9540946c1bae5ef58a1e054fe42cc069910 --- /dev/null +++ b/graph/incidents_graphml/4/4a87b060-0068-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.122 + 100.64.64.122 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713763339 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a87b060-0068-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/4/4a8d6820-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4a8d6820-5442-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1db14dd61502a93d23e41091b0126a93ca3e2840 --- /dev/null +++ b/graph/incidents_graphml/4/4a8d6820-5442-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.64 + 100.64.15.64 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694835419 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4a8d6820-5442-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/4/4a8f44a0-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4a8f44a0-5489-11ee-aade-a558f2065e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ffa90cd207f6f7cc70fb7952cbdb592613fe06ab --- /dev/null +++ b/graph/incidents_graphml/4/4a8f44a0-5489-11ee-aade-a558f2065e36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.93 + 100.64.47.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694865913 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a8f44a0-5489-11ee-aade-a558f2065e36 + + + diff --git a/graph/incidents_graphml/4/4a9d94d0-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/4a9d94d0-6e59-11ee-bd33-e97c9a557859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9437055df481fb9dda99107673565ac606efe8a1 --- /dev/null +++ b/graph/incidents_graphml/4/4a9d94d0-6e59-11ee-bd33-e97c9a557859.graphml @@ -0,0 +1,653 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.81 + 100.64.40.81 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.65 + 100.64.15.65 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.82 + 100.64.40.82 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.83 + 100.64.40.83 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.250 + 100.64.7.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.84 + 100.64.40.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.85 + 100.64.40.85 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.86 + 100.64.40.86 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.87 + 100.64.40.87 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.122 + 100.64.36.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.88 + USER-0015-1327.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.89 + 100.64.40.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.90 + 100.64.40.90 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.151 + 100.64.39.151 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.91 + 100.64.40.91 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704027 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4a9d94d0-6e59-11ee-bd33-e97c9a557859 + + + diff --git a/graph/incidents_graphml/4/4a9dd150-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4a9dd150-7e0f-11ee-8917-8796f098c594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d16f497290ca06ff4a2e2709a246f7c260a9ae1b --- /dev/null +++ b/graph/incidents_graphml/4/4a9dd150-7e0f-11ee-8917-8796f098c594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.137 + 100.64.58.137 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699431463 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4a9dd150-7e0f-11ee-8917-8796f098c594 + + + diff --git a/graph/incidents_graphml/4/4aa005c0-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4aa005c0-5442-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3b064cb9b6298242568da1b87cc8c45e7eaa648 --- /dev/null +++ b/graph/incidents_graphml/4/4aa005c0-5442-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.167 + 100.64.23.167 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694835419 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4aa005c0-5442-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/4/4aa11ef0-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4aa11ef0-5489-11ee-aade-a558f2065e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe7b9a60c87144beca607c75b22c817fe4b38c3c --- /dev/null +++ b/graph/incidents_graphml/4/4aa11ef0-5489-11ee-aade-a558f2065e36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.93 + 100.64.47.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694865913 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4aa11ef0-5489-11ee-aade-a558f2065e36 + + + diff --git a/graph/incidents_graphml/4/4aa22ed0-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/4aa22ed0-08cf-11ef-81ac-a7f609e446b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09cf7075c39cdc6efb12c5456cce035b7db80132 --- /dev/null +++ b/graph/incidents_graphml/4/4aa22ed0-08cf-11ef-81ac-a7f609e446b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.217 + 100.64.12.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1714687187 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4aa22ed0-08cf-11ef-81ac-a7f609e446b5 + + + diff --git a/graph/incidents_graphml/4/4aa298d0-3c0f-11ee-96ec-5323ee82cf36.graphml b/graph/incidents_graphml/4/4aa298d0-3c0f-11ee-96ec-5323ee82cf36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..387af0d4eb850eda854124ea85e20b749a528a9c --- /dev/null +++ b/graph/incidents_graphml/4/4aa298d0-3c0f-11ee-96ec-5323ee82cf36.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.198 + 100.64.68.198 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.29.73 + 100.64.29.73 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692174686 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4aa298d0-3c0f-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692174686 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4aa298d0-3c0f-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692174686 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4aa298d0-3c0f-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692174686 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4aa298d0-3c0f-11ee-96ec-5323ee82cf36 + + + diff --git a/graph/incidents_graphml/4/4aa83eb0-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4aa83eb0-e011-11ee-b0f4-11c43f83f21a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09c4cbae9675ccce1bb75b86936d3644a2e851bb --- /dev/null +++ b/graph/incidents_graphml/4/4aa83eb0-e011-11ee-b0f4-11c43f83f21a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.15.210.169 + 10.15.210.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.5.140 + USER-0015-1952.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1710207536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4aa83eb0-e011-11ee-b0f4-11c43f83f21a + + + diff --git a/graph/incidents_graphml/4/4aab8cf0-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4aab8cf0-7e0f-11ee-8917-8796f098c594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07e2d022ee3ae634b71aefa8b63ab914fa9ca7b0 --- /dev/null +++ b/graph/incidents_graphml/4/4aab8cf0-7e0f-11ee-8917-8796f098c594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.137 + 100.64.58.137 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699431463 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4aab8cf0-7e0f-11ee-8917-8796f098c594 + + + diff --git a/graph/incidents_graphml/4/4aaeabc0-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4aaeabc0-5442-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93188a8fd018a29be2f60c61efc282e35ce1fd6a --- /dev/null +++ b/graph/incidents_graphml/4/4aaeabc0-5442-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.169 + 100.64.23.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694835419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4aaeabc0-5442-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/4/4ab172a0-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4ab172a0-5489-11ee-aade-a558f2065e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9edc6e09dd6d5411393548719ab42c7795acf2ce --- /dev/null +++ b/graph/incidents_graphml/4/4ab172a0-5489-11ee-aade-a558f2065e36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.112 + 100.64.31.112 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694865913 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ab172a0-5489-11ee-aade-a558f2065e36 + + + diff --git a/graph/incidents_graphml/4/4ab47e50-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/4ab47e50-08cf-11ef-81ac-a7f609e446b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..541a69365daeb838d13af89c5c88cb0ef3172e60 --- /dev/null +++ b/graph/incidents_graphml/4/4ab47e50-08cf-11ef-81ac-a7f609e446b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.12.217 + 100.64.12.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1714687187 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ab47e50-08cf-11ef-81ac-a7f609e446b5 + + + diff --git a/graph/incidents_graphml/4/4ab4e8e0-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4ab4e8e0-e011-11ee-b0f4-11c43f83f21a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51742f92fabc19780305594b594b821b5822c2be --- /dev/null +++ b/graph/incidents_graphml/4/4ab4e8e0-e011-11ee-b0f4-11c43f83f21a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.203 + 100.64.83.203 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.15.210.169 + 10.15.210.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1710207536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ab4e8e0-e011-11ee-b0f4-11c43f83f21a + + + diff --git a/graph/incidents_graphml/4/4ab5d8c0-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/4/4ab5d8c0-033b-11ef-835b-a3623a295d8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38f7ae172260967fb3203cb19059323ea0b91ebd --- /dev/null +++ b/graph/incidents_graphml/4/4ab5d8c0-033b-11ef-835b-a3623a295d8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.57 + 100.64.13.57 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1714073866 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ab5d8c0-033b-11ef-835b-a3623a295d8b + + + diff --git a/graph/incidents_graphml/4/4ab63a70-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4ab63a70-0068-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ff4fbb856f18ebdc021621bab34958ca92263ab --- /dev/null +++ b/graph/incidents_graphml/4/4ab63a70-0068-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.124 + 100.64.64.124 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713763340 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ab63a70-0068-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/4/4ab73fb0-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4ab73fb0-5fa5-11ee-8f29-f592a54d646c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ebcca6be2cb37296df384eadf4e2f04b289d401a --- /dev/null +++ b/graph/incidents_graphml/4/4ab73fb0-5fa5-11ee-8f29-f592a54d646c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.255 + 100.64.32.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696087402 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ab73fb0-5fa5-11ee-8f29-f592a54d646c + + + diff --git a/graph/incidents_graphml/4/4ab81010-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4ab81010-7e0f-11ee-8917-8796f098c594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1eb42ccc30183b4a2af46a455576b3edf2588db2 --- /dev/null +++ b/graph/incidents_graphml/4/4ab81010-7e0f-11ee-8917-8796f098c594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.171 + 100.64.19.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699431463 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ab81010-7e0f-11ee-8917-8796f098c594 + + + diff --git a/graph/incidents_graphml/4/4abb9ff0-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4abb9ff0-034d-11ef-8489-99c106ef6fee.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8231f29387cb121b0c1928ba8051a0ee107e18c --- /dev/null +++ b/graph/incidents_graphml/4/4abb9ff0-034d-11ef-8489-99c106ef6fee.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.39 + 100.64.11.39 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714081597 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4abb9ff0-034d-11ef-8489-99c106ef6fee + + + diff --git a/graph/incidents_graphml/4/4abd1250-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4abd1250-32d2-11ee-a4d6-4bc10938c808.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4b73bace15fa46d9b52f1e1cd6ab3c3a4208254 --- /dev/null +++ b/graph/incidents_graphml/4/4abd1250-32d2-11ee-a4d6-4bc10938c808.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.152 + 100.64.22.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691158927 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4abd1250-32d2-11ee-a4d6-4bc10938c808 + + + diff --git a/graph/incidents_graphml/4/4abdee00-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4abdee00-5442-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ecfc2791a21e5b97d8a0867648055e55c8642ac5 --- /dev/null +++ b/graph/incidents_graphml/4/4abdee00-5442-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.169 + 100.64.23.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694835419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4abdee00-5442-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/4/4ac319b0-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4ac319b0-e011-11ee-b0f4-11c43f83f21a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c00d6a6fc7a8bbd6a6db0b0477c7b9442b7b8adb --- /dev/null +++ b/graph/incidents_graphml/4/4ac319b0-e011-11ee-b0f4-11c43f83f21a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.15.210.169 + 10.15.210.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.203 + 100.64.83.203 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1710207536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ac319b0-e011-11ee-b0f4-11c43f83f21a + + + diff --git a/graph/incidents_graphml/4/4ac640e0-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4ac640e0-7e0f-11ee-8917-8796f098c594.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d1728ceaec99eef76a4f6be0bd188b4c6c3740e --- /dev/null +++ b/graph/incidents_graphml/4/4ac640e0-7e0f-11ee-8917-8796f098c594.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.171 + 100.64.19.171 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699431463 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ac640e0-7e0f-11ee-8917-8796f098c594 + + + diff --git a/graph/incidents_graphml/4/4ac74490-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4ac74490-5489-11ee-aade-a558f2065e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7e223aea8b0b69c65abe8a1206d87ee744aaef5 --- /dev/null +++ b/graph/incidents_graphml/4/4ac74490-5489-11ee-aade-a558f2065e36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.112 + 100.64.31.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694865913 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ac74490-5489-11ee-aade-a558f2065e36 + + + diff --git a/graph/incidents_graphml/4/4ac83c50-56b5-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/4/4ac83c50-56b5-11ee-be44-f1fe26834d88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fe2e1d8d9d1ca3b98d2cf3791ee4f817a9d53df --- /dev/null +++ b/graph/incidents_graphml/4/4ac83c50-56b5-11ee-be44-f1fe26834d88.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"] + + + INCIDENT_LINK + 1695104713 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ac83c50-56b5-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695104713 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ac83c50-56b5-11ee-be44-f1fe26834d88 + + + diff --git a/graph/incidents_graphml/4/4ac8d810-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4ac8d810-0068-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8dd81d7d0ac6d41f5b3997feb972382d1bbd6e81 --- /dev/null +++ b/graph/incidents_graphml/4/4ac8d810-0068-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.124 + 100.64.64.124 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713763340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ac8d810-0068-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/4/4aca7120-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4aca7120-5442-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33a9f87ae5f273a8cba3cac9364b2250501ab2e6 --- /dev/null +++ b/graph/incidents_graphml/4/4aca7120-5442-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.171 + 100.64.23.171 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694835419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4aca7120-5442-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/4/4acf27a0-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4acf27a0-e011-11ee-b0f4-11c43f83f21a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb84eb514f806a4c4b5e6987ee671b93c3986ac3 --- /dev/null +++ b/graph/incidents_graphml/4/4acf27a0-e011-11ee-b0f4-11c43f83f21a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.15.210.169 + 10.15.210.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.62.72 + USER-0015-1953.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1710207536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4acf27a0-e011-11ee-b0f4-11c43f83f21a + + + diff --git a/graph/incidents_graphml/4/4ad464a0-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4ad464a0-5fa5-11ee-8f29-f592a54d646c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0699d21e48b69eaded93be341ccd5b328ea2e06b --- /dev/null +++ b/graph/incidents_graphml/4/4ad464a0-5fa5-11ee-8f29-f592a54d646c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.1 + 100.64.33.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696087402 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ad464a0-5fa5-11ee-8f29-f592a54d646c + + + diff --git a/graph/incidents_graphml/4/4ad4f450-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4ad4f450-034d-11ef-8489-99c106ef6fee.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1d7060f84adb11f06f59646a2d8633d13b8aa61 --- /dev/null +++ b/graph/incidents_graphml/4/4ad4f450-034d-11ef-8489-99c106ef6fee.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.39 + 100.64.11.39 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714081597 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ad4f450-034d-11ef-8489-99c106ef6fee + + + diff --git a/graph/incidents_graphml/4/4ad4fea0-08cf-11ef-81ac-a7f609e446b5.graphml b/graph/incidents_graphml/4/4ad4fea0-08cf-11ef-81ac-a7f609e446b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e535036aa51987dc0467593910209300ef2e2e7b --- /dev/null +++ b/graph/incidents_graphml/4/4ad4fea0-08cf-11ef-81ac-a7f609e446b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.163 + 100.64.88.163 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1714687187 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ad4fea0-08cf-11ef-81ac-a7f609e446b5 + + + diff --git a/graph/incidents_graphml/4/4ad75200-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/4/4ad75200-3655-11ef-872b-bfba974a2ef0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d5254f8d2da28e4b11ccedaa7895377bc041aec --- /dev/null +++ b/graph/incidents_graphml/4/4ad75200-3655-11ef-872b-bfba974a2ef0.graphml @@ -0,0 +1,135 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.20 + 100.64.2.20 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.92 + 100.64.49.92 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719692542 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ad75200-3655-11ef-872b-bfba974a2ef0 + + + INCIDENT_LINK + 1719692542 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ad75200-3655-11ef-872b-bfba974a2ef0 + + + INCIDENT_LINK + 1719692542 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ad75200-3655-11ef-872b-bfba974a2ef0 + + + INCIDENT_LINK + 1719692542 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ad75200-3655-11ef-872b-bfba974a2ef0 + + + INCIDENT_LINK + 1719692542 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ad75200-3655-11ef-872b-bfba974a2ef0 + + + diff --git a/graph/incidents_graphml/4/4ada9dc0-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4ada9dc0-5442-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c34b57684d3c75e30c30193d77b84496c69362aa --- /dev/null +++ b/graph/incidents_graphml/4/4ada9dc0-5442-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.171 + 100.64.23.171 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694835419 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ada9dc0-5442-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/4/4add2360-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4add2360-0068-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e533cfe8d548140cd6609abd6277fce6c2a0f7c --- /dev/null +++ b/graph/incidents_graphml/4/4add2360-0068-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.170 + 100.64.43.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713763340 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4add2360-0068-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/4/4ae73900-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4ae73900-62c9-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..02cc650ef9b8d32608d1be74f61a627c39380870 --- /dev/null +++ b/graph/incidents_graphml/4/4ae73900-62c9-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.167 + 100.64.57.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696432718 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ae73900-62c9-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/4/4aeaf840-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4aeaf840-2cc0-11ee-9ea2-17c9a8b72baa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e28d8dc1cbdcc22124cfebba9dae38ba8c45cb33 --- /dev/null +++ b/graph/incidents_graphml/4/4aeaf840-2cc0-11ee-9ea2-17c9a8b72baa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.229 + 100.64.42.229 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690491489 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4aeaf840-2cc0-11ee-9ea2-17c9a8b72baa + + + diff --git a/graph/incidents_graphml/4/4aeebb20-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4aeebb20-f859-11ec-94e5-2949377000d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8bd7b571ad7e71d941f3d73f5c7bafadd24a992f --- /dev/null +++ b/graph/incidents_graphml/4/4aeebb20-f859-11ec-94e5-2949377000d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.237 + 100.64.72.237 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656582293 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4aeebb20-f859-11ec-94e5-2949377000d8 + + + diff --git a/graph/incidents_graphml/4/4aef0bb0-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4aef0bb0-e011-11ee-b0f4-11c43f83f21a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..133836659a69f338f6943a04123448efc795c59a --- /dev/null +++ b/graph/incidents_graphml/4/4aef0bb0-e011-11ee-b0f4-11c43f83f21a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.116 + 100.64.51.116 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.15.210.169 + 10.15.210.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1710207537 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4aef0bb0-e011-11ee-b0f4-11c43f83f21a + + + diff --git a/graph/incidents_graphml/4/4af06a90-ad8c-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/4/4af06a90-ad8c-11ed-a9cd-bdbbd3b810c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbcf3740ef2eb72d001e1360551586f3e6b9df56 --- /dev/null +++ b/graph/incidents_graphml/4/4af06a90-ad8c-11ed-a9cd-bdbbd3b810c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.46.208.212 + 10.46.208.212 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.121 + 100.64.83.121 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1676505358 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4af06a90-ad8c-11ed-a9cd-bdbbd3b810c7 + + + diff --git a/graph/incidents_graphml/4/4af25e70-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/4/4af25e70-0c57-11ee-a19d-25527a25a69c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5e8abe4f9d55d1fe7acd0143a749ee0e5f73dd1 --- /dev/null +++ b/graph/incidents_graphml/4/4af25e70-0c57-11ee-a19d-25527a25a69c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.116 + 100.64.5.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686927955 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4af25e70-0c57-11ee-a19d-25527a25a69c + + + INCIDENT_LINK + 1686927955 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4af25e70-0c57-11ee-a19d-25527a25a69c + + + diff --git a/graph/incidents_graphml/4/4af403e0-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/4af403e0-62c1-11ee-b24d-ffed8a6ae3b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e74bce58729ede41fce113da395ae79dbd1fb2a3 --- /dev/null +++ b/graph/incidents_graphml/4/4af403e0-62c1-11ee-b24d-ffed8a6ae3b7.graphml @@ -0,0 +1,287 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.215 + 100.64.23.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.216 + 100.64.23.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.217 + 100.64.23.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.218 + 100.64.23.218 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.219 + 100.64.23.219 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4af403e0-62c1-11ee-b24d-ffed8a6ae3b7 + + + diff --git a/graph/incidents_graphml/4/4af406c0-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4af406c0-0068-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbf7901122efb91add7ad714959e8e1346e439bc --- /dev/null +++ b/graph/incidents_graphml/4/4af406c0-0068-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.170 + 100.64.43.170 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713763340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4af406c0-0068-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/4/4af85810-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4af85810-f859-11ec-94e5-2949377000d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38302d2f1257cc505e2eb2a29cdd805b6d94b3af --- /dev/null +++ b/graph/incidents_graphml/4/4af85810-f859-11ec-94e5-2949377000d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.237 + 100.64.72.237 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656582293 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4af85810-f859-11ec-94e5-2949377000d8 + + + diff --git a/graph/incidents_graphml/4/4afcc750-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4afcc750-e011-11ee-b0f4-11c43f83f21a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..214fd02ee34ff4200f4c53532383558fa47e4999 --- /dev/null +++ b/graph/incidents_graphml/4/4afcc750-e011-11ee-b0f4-11c43f83f21a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.15.210.169 + 10.15.210.169 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.51.116 + 100.64.51.116 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1710207537 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4afcc750-e011-11ee-b0f4-11c43f83f21a + + + diff --git a/graph/incidents_graphml/4/4b037010-0068-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/4/4b037010-0068-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..beb64c6d0d852137f09695fba690ff1ef5033fc4 --- /dev/null +++ b/graph/incidents_graphml/4/4b037010-0068-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.152 + 100.64.22.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713763340 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4b037010-0068-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/4/4b043080-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/4b043080-62c1-11ee-b24d-ffed8a6ae3b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71f4b3885da97b2cb1416f6627de61b2efa03702 --- /dev/null +++ b/graph/incidents_graphml/4/4b043080-62c1-11ee-b24d-ffed8a6ae3b7.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.215 + 100.64.23.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4b043080-62c1-11ee-b24d-ffed8a6ae3b7 + + + INCIDENT_LINK + 1696429282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4b043080-62c1-11ee-b24d-ffed8a6ae3b7 + + + diff --git a/graph/incidents_graphml/4/4b06e4b0-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4b06e4b0-2cc0-11ee-9ea2-17c9a8b72baa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c6da72a165e13ee397ae1e452eb05863efac6bab --- /dev/null +++ b/graph/incidents_graphml/4/4b06e4b0-2cc0-11ee-9ea2-17c9a8b72baa.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.235 + 100.64.10.235 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690491490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4b06e4b0-2cc0-11ee-9ea2-17c9a8b72baa + + + INCIDENT_LINK + 1690491490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4b06e4b0-2cc0-11ee-9ea2-17c9a8b72baa + + + diff --git a/graph/incidents_graphml/4/4b092360-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4b092360-e011-11ee-b0f4-11c43f83f21a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8feec4f3a79f3475f228059802840c07b56cba4 --- /dev/null +++ b/graph/incidents_graphml/4/4b092360-e011-11ee-b0f4-11c43f83f21a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.113 + USER-0015-1954.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.15.210.169 + 10.15.210.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1710207537 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4b092360-e011-11ee-b0f4-11c43f83f21a + + + diff --git a/graph/incidents_graphml/4/4b16fbb0-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4b16fbb0-6fe7-11ee-bec7-efacac475e54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ac88cd0fbe934f1d7a018085a0b637c72fded49 --- /dev/null +++ b/graph/incidents_graphml/4/4b16fbb0-6fe7-11ee-bec7-efacac475e54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.213 + 100.64.20.213 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697874968 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4b16fbb0-6fe7-11ee-bec7-efacac475e54 + + + diff --git a/graph/incidents_graphml/4/4b174160-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4b174160-4c1a-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f671940f3e3215df51c7573209a7d12943600cab --- /dev/null +++ b/graph/incidents_graphml/4/4b174160-4c1a-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.161 + 100.64.14.161 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693938630 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4b174160-4c1a-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/4/4b17c960-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4b17c960-e011-11ee-b0f4-11c43f83f21a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12740ba0076abfb05063d6c3f14ad63ccbb371a5 --- /dev/null +++ b/graph/incidents_graphml/4/4b17c960-e011-11ee-b0f4-11c43f83f21a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.15.210.169 + 10.15.210.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.63.113 + USER-0015-1954.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1710207537 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4b17c960-e011-11ee-b0f4-11c43f83f21a + + + diff --git a/graph/incidents_graphml/4/4b1d6060-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/4b1d6060-2611-11ee-a11d-5dcee9a57544.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca302988745508793bf072f2f12f431a70a7b4ac --- /dev/null +++ b/graph/incidents_graphml/4/4b1d6060-2611-11ee-a11d-5dcee9a57544.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.117 + 100.64.57.117 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689756621 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4b1d6060-2611-11ee-a11d-5dcee9a57544 + + + diff --git a/graph/incidents_graphml/4/4b217190-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4b217190-2cc0-11ee-9ea2-17c9a8b72baa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e0b9abdbfd602991b0e3ce7e6d0e59ff21806e8 --- /dev/null +++ b/graph/incidents_graphml/4/4b217190-2cc0-11ee-9ea2-17c9a8b72baa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.229 + 100.64.42.229 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690491490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4b217190-2cc0-11ee-9ea2-17c9a8b72baa + + + diff --git a/graph/incidents_graphml/4/4b244c80-e011-11ee-b0f4-11c43f83f21a.graphml b/graph/incidents_graphml/4/4b244c80-e011-11ee-b0f4-11c43f83f21a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c152e9af93e0c606516f790340a322015f9eef21 --- /dev/null +++ b/graph/incidents_graphml/4/4b244c80-e011-11ee-b0f4-11c43f83f21a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.3 + USER-0015-1955.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.15.210.169 + 10.15.210.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1710207537 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4b244c80-e011-11ee-b0f4-11c43f83f21a + + + diff --git a/graph/incidents_graphml/4/4b28d600-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4b28d600-6fe7-11ee-bec7-efacac475e54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7492fe31584bfc377d8a22a28dde7a496d2861a --- /dev/null +++ b/graph/incidents_graphml/4/4b28d600-6fe7-11ee-bec7-efacac475e54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.213 + 100.64.20.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697874968 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4b28d600-6fe7-11ee-bec7-efacac475e54 + + + diff --git a/graph/incidents_graphml/4/4b4297c0-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4b4297c0-2244-11ee-a208-019103756a24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..294b83f154ae2247d15fad4934130fe96fd03d09 --- /dev/null +++ b/graph/incidents_graphml/4/4b4297c0-2244-11ee-a208-019103756a24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.14 + 100.64.6.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689338721 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4b4297c0-2244-11ee-a208-019103756a24 + + + diff --git a/graph/incidents_graphml/4/4b435170-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4b435170-2cc0-11ee-9ea2-17c9a8b72baa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..631efe3854e8ae7455d58fe74d834381bf42989c --- /dev/null +++ b/graph/incidents_graphml/4/4b435170-2cc0-11ee-9ea2-17c9a8b72baa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.231 + 100.64.42.231 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690491490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4b435170-2cc0-11ee-9ea2-17c9a8b72baa + + + diff --git a/graph/incidents_graphml/4/4b4581d0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/4b4581d0-2611-11ee-a11d-5dcee9a57544.graphml new file mode 100644 index 0000000000000000000000000000000000000000..75b418f2821d14c36968af5a35aeced9057fd65f --- /dev/null +++ b/graph/incidents_graphml/4/4b4581d0-2611-11ee-a11d-5dcee9a57544.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.119 + 100.64.57.119 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689756621 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4b4581d0-2611-11ee-a11d-5dcee9a57544 + + + diff --git a/graph/incidents_graphml/4/4b53cec0-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4b53cec0-394e-11ee-a463-c9469bb75709.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e6b04757e1c25f813a29a7f22954411fc9957f5 --- /dev/null +++ b/graph/incidents_graphml/4/4b53cec0-394e-11ee-a463-c9469bb75709.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.129 + 100.64.11.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691871893 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4b53cec0-394e-11ee-a463-c9469bb75709 + + + diff --git a/graph/incidents_graphml/4/4b5b0450-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4b5b0450-f91c-11ed-8f07-3d261ba980ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93d4c591ceb1c22e7403211cf1f66046dcb248d3 --- /dev/null +++ b/graph/incidents_graphml/4/4b5b0450-f91c-11ed-8f07-3d261ba980ce.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.249 + 100.64.10.249 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + INCIDENT_LINK + 1684813543 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4b5b0450-f91c-11ed-8f07-3d261ba980ce + + + INCIDENT_LINK + 1684813543 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4b5b0450-f91c-11ed-8f07-3d261ba980ce + + + diff --git a/graph/incidents_graphml/4/4b5cf3f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4b5cf3f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e3484e9eb6b1c5805ea191a71b51276ab426dac --- /dev/null +++ b/graph/incidents_graphml/4/4b5cf3f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.231 + 100.64.42.231 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690491490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4b5cf3f0-2cc0-11ee-9ea2-17c9a8b72baa + + + diff --git a/graph/incidents_graphml/4/4b648a20-002a-11ed-bb11-93744d705888.graphml b/graph/incidents_graphml/4/4b648a20-002a-11ed-bb11-93744d705888.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6dbbf055aa17ad84eff2de4b9adf570fb3652236 --- /dev/null +++ b/graph/incidents_graphml/4/4b648a20-002a-11ed-bb11-93744d705888.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.197 + USER-0015-1848.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657441717 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4b648a20-002a-11ed-bb11-93744d705888 + + + diff --git a/graph/incidents_graphml/4/4b649ac0-17e8-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/4/4b649ac0-17e8-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..720763dff567f6da8eef753b0b0e8efe50fa15b4 --- /dev/null +++ b/graph/incidents_graphml/4/4b649ac0-17e8-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.161 + 100.64.88.161 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1688199696 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4b649ac0-17e8-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/4/4b658910-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4b658910-2244-11ee-a208-019103756a24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdf755b1df8949ce7277f52316963d3c92f87b61 --- /dev/null +++ b/graph/incidents_graphml/4/4b658910-2244-11ee-a208-019103756a24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.14 + 100.64.6.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689338721 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4b658910-2244-11ee-a208-019103756a24 + + + diff --git a/graph/incidents_graphml/4/4b6756c0-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4b6756c0-394e-11ee-a463-c9469bb75709.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5fda43808e0bf0c9734a2ee3424129305843db5 --- /dev/null +++ b/graph/incidents_graphml/4/4b6756c0-394e-11ee-a463-c9469bb75709.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.129 + 100.64.11.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691871893 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4b6756c0-394e-11ee-a463-c9469bb75709 + + + diff --git a/graph/incidents_graphml/4/4b6d8ad0-002a-11ed-bb11-93744d705888.graphml b/graph/incidents_graphml/4/4b6d8ad0-002a-11ed-bb11-93744d705888.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e88b7d4e0b251832229d9a27c01081bb110b842 --- /dev/null +++ b/graph/incidents_graphml/4/4b6d8ad0-002a-11ed-bb11-93744d705888.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.197 + USER-0015-1848.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657441717 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4b6d8ad0-002a-11ed-bb11-93744d705888 + + + diff --git a/graph/incidents_graphml/4/4b74a050-17e8-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/4/4b74a050-17e8-11ee-9bb9-61e0b388f5c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07228f71407ef68f03cdc64f64b45d4c73e9aba5 --- /dev/null +++ b/graph/incidents_graphml/4/4b74a050-17e8-11ee-9bb9-61e0b388f5c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.88.161 + 100.64.88.161 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688199696 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4b74a050-17e8-11ee-9bb9-61e0b388f5c0 + + + diff --git a/graph/incidents_graphml/4/4b75ac70-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4b75ac70-efa8-11ec-88e9-cd157aceabd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7085e0974ee8db4e135f2ab71cac435982d84f92 --- /dev/null +++ b/graph/incidents_graphml/4/4b75ac70-efa8-11ec-88e9-cd157aceabd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.1 + USER-0015-1905.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655626664 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4b75ac70-efa8-11ec-88e9-cd157aceabd3 + + + diff --git a/graph/incidents_graphml/4/4b7bd870-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4b7bd870-8084-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a17e71739c22f3f9fb292bda69d9cec7df6cda8d --- /dev/null +++ b/graph/incidents_graphml/4/4b7bd870-8084-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.213 + 100.64.37.213 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699701618 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4b7bd870-8084-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/4/4b7c15a0-5489-11ee-aade-a558f2065e36.graphml b/graph/incidents_graphml/4/4b7c15a0-5489-11ee-aade-a558f2065e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..968e6795aed2240f00dc36cda3e303ed3a169b24 --- /dev/null +++ b/graph/incidents_graphml/4/4b7c15a0-5489-11ee-aade-a558f2065e36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.162 + 100.64.7.162 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694865914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4b7c15a0-5489-11ee-aade-a558f2065e36 + + + diff --git a/graph/incidents_graphml/4/4b827260-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4b827260-034d-11ef-8489-99c106ef6fee.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a4bc373fd7ea5db6d37fbac433010e102756ce9 --- /dev/null +++ b/graph/incidents_graphml/4/4b827260-034d-11ef-8489-99c106ef6fee.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.226 + USER-0015-1196.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714081598 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4b827260-034d-11ef-8489-99c106ef6fee + + + diff --git a/graph/incidents_graphml/4/4b8a5760-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4b8a5760-8084-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..019e558d5dc36d35c09558f50cfcb62a65160b3a --- /dev/null +++ b/graph/incidents_graphml/4/4b8a5760-8084-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699701618 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4b8a5760-8084-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/4/4b939e30-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4b939e30-dda2-11ee-8562-1ffce003597e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e91fef24dce49461754d08abd44d1c644c918bf5 --- /dev/null +++ b/graph/incidents_graphml/4/4b939e30-dda2-11ee-8562-1ffce003597e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.46.178 + 100.64.46.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709939961 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4b939e30-dda2-11ee-8562-1ffce003597e + + + diff --git a/graph/incidents_graphml/4/4b94eb50-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4b94eb50-becc-11ed-93f3-fff421178c5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a4e0af94b1c9ed548afc5e074440d11b5b8aace --- /dev/null +++ b/graph/incidents_graphml/4/4b94eb50-becc-11ed-93f3-fff421178c5e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.11 + 100.64.2.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678402016 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4b94eb50-becc-11ed-93f3-fff421178c5e + + + diff --git a/graph/incidents_graphml/4/4b97f890-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4b97f890-becc-11ed-93f3-fff421178c5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e8c11d36cfcc4fa3c38b8f75f630ef90b16f4d7 --- /dev/null +++ b/graph/incidents_graphml/4/4b97f890-becc-11ed-93f3-fff421178c5e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.2.11 + 100.64.2.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678402016 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4b97f890-becc-11ed-93f3-fff421178c5e + + + diff --git a/graph/incidents_graphml/4/4b9da6d0-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4b9da6d0-efa8-11ec-88e9-cd157aceabd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fc0ce21ba217025b6afae4ba7eba7120ce63e34 --- /dev/null +++ b/graph/incidents_graphml/4/4b9da6d0-efa8-11ec-88e9-cd157aceabd3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.224 + 100.64.81.224 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.59 + 100.64.73.59 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655626664 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4b9da6d0-efa8-11ec-88e9-cd157aceabd3 + + + INCIDENT_LINK + 1655626664 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4b9da6d0-efa8-11ec-88e9-cd157aceabd3 + + + diff --git a/graph/incidents_graphml/4/4b9e2540-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4b9e2540-2244-11ee-a208-019103756a24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..782c25d24643278c139d3bd3e4fe1e1b2140f455 --- /dev/null +++ b/graph/incidents_graphml/4/4b9e2540-2244-11ee-a208-019103756a24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689338721 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4b9e2540-2244-11ee-a208-019103756a24 + + + diff --git a/graph/incidents_graphml/4/4ba13ac0-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4ba13ac0-8084-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..676935fba715027065dff3a55303776eb9259f41 --- /dev/null +++ b/graph/incidents_graphml/4/4ba13ac0-8084-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699701618 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ba13ac0-8084-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/4/4ba1a7f0-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4ba1a7f0-dda2-11ee-8562-1ffce003597e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7b6172ee5956ac1a0105dd4f5ac0bd771ac1ed7 --- /dev/null +++ b/graph/incidents_graphml/4/4ba1a7f0-dda2-11ee-8562-1ffce003597e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.47 + 100.64.87.47 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1709939961 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ba1a7f0-dda2-11ee-8562-1ffce003597e + + + diff --git a/graph/incidents_graphml/4/4bae9ae0-9e15-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/4/4bae9ae0-9e15-11ee-a5ab-8550688be6fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c07b757fb2bafb438db677d3523f5d45b37dc378 --- /dev/null +++ b/graph/incidents_graphml/4/4bae9ae0-9e15-11ee-a5ab-8550688be6fd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.155 + 100.64.70.155 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1702952479 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bae9ae0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952479 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bae9ae0-9e15-11ee-a5ab-8550688be6fd + + + diff --git a/graph/incidents_graphml/4/4baf6390-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4baf6390-dda2-11ee-8562-1ffce003597e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c5f67d618a7193ca86f6e886dc978194659b7b3 --- /dev/null +++ b/graph/incidents_graphml/4/4baf6390-dda2-11ee-8562-1ffce003597e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.87.47 + 100.64.87.47 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709939962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4baf6390-dda2-11ee-8562-1ffce003597e + + + diff --git a/graph/incidents_graphml/4/4bb16760-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4bb16760-8084-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdd86f1856c613eeefd83a0f67519c765f12f0da --- /dev/null +++ b/graph/incidents_graphml/4/4bb16760-8084-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.215 + 100.64.37.215 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699701618 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4bb16760-8084-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/4/4bbf4a10-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4bbf4a10-8084-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b619a8301850d04f94b6a2ea6c7cadd9f00d408 --- /dev/null +++ b/graph/incidents_graphml/4/4bbf4a10-8084-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.215 + 100.64.37.215 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699701619 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4bbf4a10-8084-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/4/4bc56ed0-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4bc56ed0-034d-11ef-8489-99c106ef6fee.graphml new file mode 100644 index 0000000000000000000000000000000000000000..917c6ccec24e25ec9839af29d1e4646616c1698b --- /dev/null +++ b/graph/incidents_graphml/4/4bc56ed0-034d-11ef-8489-99c106ef6fee.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.228 + 100.64.11.228 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714081599 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4bc56ed0-034d-11ef-8489-99c106ef6fee + + + diff --git a/graph/incidents_graphml/4/4bcac770-3825-11ee-b5a7-eb9164a8ca63.graphml b/graph/incidents_graphml/4/4bcac770-3825-11ee-b5a7-eb9164a8ca63.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c11e635463cabbfc0e7dda5c57d465c5e744147c --- /dev/null +++ b/graph/incidents_graphml/4/4bcac770-3825-11ee-b5a7-eb9164a8ca63.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.130 + 100.64.70.130 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect"] + + + HOST + 100.64.18.167 + 100.64.18.167 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1691744333 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bcac770-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744333 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bcac770-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744333 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bcac770-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744333 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bcac770-3825-11ee-b5a7-eb9164a8ca63 + + + diff --git a/graph/incidents_graphml/4/4bd1af20-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4bd1af20-efa8-11ec-88e9-cd157aceabd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2f09767c2c0af03926578678d2b2f2012bcb50d --- /dev/null +++ b/graph/incidents_graphml/4/4bd1af20-efa8-11ec-88e9-cd157aceabd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.244 + USER-0015-1906.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655626664 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4bd1af20-efa8-11ec-88e9-cd157aceabd3 + + + diff --git a/graph/incidents_graphml/4/4bd784c0-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4bd784c0-2244-11ee-a208-019103756a24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..272c4900a6aa4c2ffe99de36db2ee9875dde35eb --- /dev/null +++ b/graph/incidents_graphml/4/4bd784c0-2244-11ee-a208-019103756a24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689338722 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4bd784c0-2244-11ee-a208-019103756a24 + + + diff --git a/graph/incidents_graphml/4/4bd910e0-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/4bd910e0-2f75-11ee-b11e-87149c94e410.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce4f92f47bec34ce5cdc2d683e83d3b756201331 --- /dev/null +++ b/graph/incidents_graphml/4/4bd910e0-2f75-11ee-b11e-87149c94e410.graphml @@ -0,0 +1,531 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.66 + 100.64.42.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.67 + 100.64.42.67 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.68 + 100.64.42.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.69 + 100.64.42.69 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.70 + 100.64.42.70 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.71 + 100.64.42.71 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.72 + 100.64.42.72 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.73 + 100.64.42.73 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.74 + 100.64.42.74 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.75 + 100.64.42.75 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.217 + 100.64.12.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.76 + 100.64.42.76 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789132 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bd910e0-2f75-11ee-b11e-87149c94e410 + + + diff --git a/graph/incidents_graphml/4/4bdc6e20-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4bdc6e20-b6d5-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8cf6fa4f2ccfafa8fb4ba77adb313176c8156b63 --- /dev/null +++ b/graph/incidents_graphml/4/4bdc6e20-b6d5-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.183 + 100.64.94.183 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677526273 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4bdc6e20-b6d5-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/4/4be12910-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4be12910-b6d5-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..761f269e37137f94985d1d48088b433e397e5594 --- /dev/null +++ b/graph/incidents_graphml/4/4be12910-b6d5-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.183 + 100.64.94.183 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677526273 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4be12910-b6d5-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/4/4be40f40-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4be40f40-b6d5-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..421726ad3f6f05596ed69142013c4ef29eaf1ea5 --- /dev/null +++ b/graph/incidents_graphml/4/4be40f40-b6d5-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.187 + USER-0015-2124.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677526273 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4be40f40-b6d5-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/4/4be6e4d0-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4be6e4d0-efa8-11ec-88e9-cd157aceabd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85cc1e75e52cd07c721899e87f14d42ceb5ea71a --- /dev/null +++ b/graph/incidents_graphml/4/4be6e4d0-efa8-11ec-88e9-cd157aceabd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.182 + 100.64.80.182 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655626664 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4be6e4d0-efa8-11ec-88e9-cd157aceabd3 + + + diff --git a/graph/incidents_graphml/4/4be87c10-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4be87c10-b6d5-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b1e9437c6aca03063f28d840ed7c096e18e31cf --- /dev/null +++ b/graph/incidents_graphml/4/4be87c10-b6d5-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.187 + USER-0015-2124.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677526273 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4be87c10-b6d5-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/4/4bece9c0-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4bece9c0-8084-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4528a0d2a0ac4f79a55bbfeaad15b68bc0e4a357 --- /dev/null +++ b/graph/incidents_graphml/4/4bece9c0-8084-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.1 + 100.64.34.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699701619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4bece9c0-8084-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/4/4bef0bc0-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4bef0bc0-b6d5-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f05cd7d12b3eb1aad44130c84cd6990f1cfb923 --- /dev/null +++ b/graph/incidents_graphml/4/4bef0bc0-b6d5-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.188 + 100.64.94.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677526273 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4bef0bc0-b6d5-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/4/4bf01610-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4bf01610-dda2-11ee-8562-1ffce003597e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3847d6f0df6e9fedcb02c2f412e3863fcae3f1fb --- /dev/null +++ b/graph/incidents_graphml/4/4bf01610-dda2-11ee-8562-1ffce003597e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.224 + 100.64.41.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1709939962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4bf01610-dda2-11ee-8562-1ffce003597e + + + diff --git a/graph/incidents_graphml/4/4bfec410-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4bfec410-8084-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35399ce7c4dc3d3273747b4c65773d6073701953 --- /dev/null +++ b/graph/incidents_graphml/4/4bfec410-8084-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.217 + 100.64.37.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699701619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4bfec410-8084-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/4/4bfff490-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4bfff490-dda2-11ee-8562-1ffce003597e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68f062c3502ccdcd8e124adcf0c2bb0e534545f0 --- /dev/null +++ b/graph/incidents_graphml/4/4bfff490-dda2-11ee-8562-1ffce003597e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.41.224 + 100.64.41.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1709939962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4bfff490-dda2-11ee-8562-1ffce003597e + + + diff --git a/graph/incidents_graphml/4/4c0db830-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4c0db830-8084-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..200ba31c4080780f2f1d7a23168fc5b2a84ebcd7 --- /dev/null +++ b/graph/incidents_graphml/4/4c0db830-8084-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.217 + 100.64.37.217 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699701619 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c0db830-8084-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/4/4c0e9a90-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4c0e9a90-dda2-11ee-8562-1ffce003597e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..285ff908fc3672a380c540019f4599d00dfd38d3 --- /dev/null +++ b/graph/incidents_graphml/4/4c0e9a90-dda2-11ee-8562-1ffce003597e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.27 + 100.64.51.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1709939962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c0e9a90-dda2-11ee-8562-1ffce003597e + + + diff --git a/graph/incidents_graphml/4/4c1a6260-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4c1a6260-8084-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..104a5e38e0dd3be80f5501d9312d58396496b77d --- /dev/null +++ b/graph/incidents_graphml/4/4c1a6260-8084-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.251 + 100.64.13.251 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699701619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c1a6260-8084-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/4/4c1e03e0-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4c1e03e0-dda2-11ee-8562-1ffce003597e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b39f04b0a7d05ee36395c25f5cbf249cddf7e31c --- /dev/null +++ b/graph/incidents_graphml/4/4c1e03e0-dda2-11ee-8562-1ffce003597e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.51.27 + 100.64.51.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709939962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4c1e03e0-dda2-11ee-8562-1ffce003597e + + + diff --git a/graph/incidents_graphml/4/4c1e84e0-7b51-11ee-a1fb-a12255f73d88.graphml b/graph/incidents_graphml/4/4c1e84e0-7b51-11ee-a1fb-a12255f73d88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7b3f7f86e79218a36aceb30ccc15aef543bc3dc --- /dev/null +++ b/graph/incidents_graphml/4/4c1e84e0-7b51-11ee-a1fb-a12255f73d88.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.224 + 100.64.17.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699129959 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4c1e84e0-7b51-11ee-a1fb-a12255f73d88 + + + diff --git a/graph/incidents_graphml/4/4c275ab0-8084-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/4/4c275ab0-8084-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3df7eda5987fa7960a29e6d3bd2aa790c35eb2b3 --- /dev/null +++ b/graph/incidents_graphml/4/4c275ab0-8084-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.251 + 100.64.13.251 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699701619 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c275ab0-8084-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/4/4c2e5270-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/4/4c2e5270-08e2-11ef-ae93-51753793321f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96f481a5638617249b014d5f4fe301032073f549 --- /dev/null +++ b/graph/incidents_graphml/4/4c2e5270-08e2-11ef-ae93-51753793321f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1999.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.58.162 + USER-0015-2036.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1714695350 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c2e5270-08e2-11ef-ae93-51753793321f + + + diff --git a/graph/incidents_graphml/4/4c3f8070-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/4c3f8070-6ba5-11ee-adf9-937001d43276.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2e40cc7377179cdec1e2421cfcd280894825c0c --- /dev/null +++ b/graph/incidents_graphml/4/4c3f8070-6ba5-11ee-adf9-937001d43276.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.160 + 100.64.38.160 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697406818 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c3f8070-6ba5-11ee-adf9-937001d43276 + + + diff --git a/graph/incidents_graphml/4/4c4b1db0-5442-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/4/4c4b1db0-5442-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10289885276f57ccb548a1c225c70d70e37a404f --- /dev/null +++ b/graph/incidents_graphml/4/4c4b1db0-5442-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.173 + 100.64.23.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694835422 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c4b1db0-5442-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/4/4c524910-0342-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/4/4c524910-0342-11ee-8785-53111c12ea35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..161bda072288a39136dc9dd337330de4ba502ad6 --- /dev/null +++ b/graph/incidents_graphml/4/4c524910-0342-11ee-8785-53111c12ea35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.117 + 100.64.80.117 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.252 + 100.64.71.252 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685929377 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c524910-0342-11ee-8785-53111c12ea35 + + + diff --git a/graph/incidents_graphml/4/4c589130-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4c589130-47cb-11ee-be8c-ef3f416b8a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e53a0f9698887907b3d7d1d6ad2faaa959fe8ee --- /dev/null +++ b/graph/incidents_graphml/4/4c589130-47cb-11ee-be8c-ef3f416b8a04.graphml @@ -0,0 +1,381 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.9 + 100.64.3.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.170 + 100.64.40.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.171 + 100.64.40.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.83 + 100.64.33.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.81 + 100.64.33.81 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.178 + 100.64.11.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.172 + 100.64.40.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.10 + 100.64.37.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c589130-47cb-11ee-be8c-ef3f416b8a04 + + + diff --git a/graph/incidents_graphml/4/4c60eb20-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/4c60eb20-6ba5-11ee-adf9-937001d43276.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03150cb06bfcb15a67325879ad63ef775f6bc8b2 --- /dev/null +++ b/graph/incidents_graphml/4/4c60eb20-6ba5-11ee-adf9-937001d43276.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.162 + 100.64.38.162 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697406819 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c60eb20-6ba5-11ee-adf9-937001d43276 + + + diff --git a/graph/incidents_graphml/4/4c698120-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4c698120-47cb-11ee-be8c-ef3f416b8a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..623fb305635390ec10107c73c46b92f0eeab7055 --- /dev/null +++ b/graph/incidents_graphml/4/4c698120-47cb-11ee-be8c-ef3f416b8a04.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.9 + 100.64.3.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693464898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4c698120-47cb-11ee-be8c-ef3f416b8a04 + + + diff --git a/graph/incidents_graphml/4/4c6b4f50-0342-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/4/4c6b4f50-0342-11ee-8785-53111c12ea35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..789e783083eca709e030adcadbef96f2b7c821e7 --- /dev/null +++ b/graph/incidents_graphml/4/4c6b4f50-0342-11ee-8785-53111c12ea35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.252 + 100.64.71.252 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.80.117 + 100.64.80.117 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1685929378 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c6b4f50-0342-11ee-8785-53111c12ea35 + + + diff --git a/graph/incidents_graphml/4/4c705470-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/4c705470-6ba5-11ee-adf9-937001d43276.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e3f4c2a4a3f7c0d3e40510f61002a140b1ea79e --- /dev/null +++ b/graph/incidents_graphml/4/4c705470-6ba5-11ee-adf9-937001d43276.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.162 + 100.64.38.162 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697406819 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c705470-6ba5-11ee-adf9-937001d43276 + + + diff --git a/graph/incidents_graphml/4/4c76bab0-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4c76bab0-f859-11ec-94e5-2949377000d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e08c8ce360d5d08a702443d71701a262f2d3a07b --- /dev/null +++ b/graph/incidents_graphml/4/4c76bab0-f859-11ec-94e5-2949377000d8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.247 + 100.64.72.247 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.245 + 100.64.70.245 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656582296 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c76bab0-f859-11ec-94e5-2949377000d8 + + + INCIDENT_LINK + 1656582296 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c76bab0-f859-11ec-94e5-2949377000d8 + + + diff --git a/graph/incidents_graphml/4/4c7ba300-0342-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/4/4c7ba300-0342-11ee-8785-53111c12ea35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4ccef725eb85baf9d7a9340dcbab9d20fb04fef --- /dev/null +++ b/graph/incidents_graphml/4/4c7ba300-0342-11ee-8785-53111c12ea35.graphml @@ -0,0 +1,135 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.118 + 100.64.80.118 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.71.224 + 100.64.71.224 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.29.4 + 100.64.29.4 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.68.143 + 100.64.68.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685929378 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4c7ba300-0342-11ee-8785-53111c12ea35 + + + INCIDENT_LINK + 1685929378 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4c7ba300-0342-11ee-8785-53111c12ea35 + + + INCIDENT_LINK + 1685929378 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4c7ba300-0342-11ee-8785-53111c12ea35 + + + INCIDENT_LINK + 1685929378 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4c7ba300-0342-11ee-8785-53111c12ea35 + + + INCIDENT_LINK + 1685929378 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4c7ba300-0342-11ee-8785-53111c12ea35 + + + diff --git a/graph/incidents_graphml/4/4c870a20-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/4/4c870a20-2f33-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e090ae003cbe3f844a2200a3195c186b288d715 --- /dev/null +++ b/graph/incidents_graphml/4/4c870a20-2f33-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.51 + 100.64.82.51 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.37.239 + 100.64.37.239 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690760787 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4c870a20-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760787 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4c870a20-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760787 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4c870a20-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760787 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4c870a20-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760787 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4c870a20-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760787 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4c870a20-2f33-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/4/4c8975a0-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4c8975a0-0727-11ee-9050-71ab19a2f61d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..490f35c8cd288e654e34fb7a944e08fabd80bee9 --- /dev/null +++ b/graph/incidents_graphml/4/4c8975a0-0727-11ee-9050-71ab19a2f61d.graphml @@ -0,0 +1,481 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.180 + 100.64.71.180 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.238 + 100.64.73.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.14.48 + 100.64.14.48 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.239 + 100.64.73.239 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.240 + 100.64.73.240 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.241 + 100.64.73.241 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.242 + 100.64.73.242 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.53 + 100.64.73.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.243 + 100.64.73.243 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.244 + 100.64.73.244 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.245 + 100.64.73.245 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.18.40 + 100.64.18.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.246 + 100.64.73.246 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357586 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4c8975a0-0727-11ee-9050-71ab19a2f61d + + + diff --git a/graph/incidents_graphml/4/4c926940-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4c926940-394e-11ee-a463-c9469bb75709.graphml new file mode 100644 index 0000000000000000000000000000000000000000..925e91073d809166801c9cd1f20a216c5c0987f2 --- /dev/null +++ b/graph/incidents_graphml/4/4c926940-394e-11ee-a463-c9469bb75709.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.243 + 100.64.20.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691871895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4c926940-394e-11ee-a463-c9469bb75709 + + + diff --git a/graph/incidents_graphml/4/4ca0e540-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/4ca0e540-e873-11ee-9a77-df185ba75d8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bfaf954601f5daca1bcdd85601dce0c09bdbd86 --- /dev/null +++ b/graph/incidents_graphml/4/4ca0e540-e873-11ee-9a77-df185ba75d8e.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.23 + 100.64.25.23 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.70.205 + 100.64.70.205 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.206 + 100.64.70.206 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711129239 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ca0e540-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129239 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ca0e540-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129239 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ca0e540-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129239 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ca0e540-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129239 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ca0e540-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129239 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ca0e540-e873-11ee-9a77-df185ba75d8e + + + diff --git a/graph/incidents_graphml/4/4ca16520-d09a-11ed-8538-d1df98b5b935.graphml b/graph/incidents_graphml/4/4ca16520-d09a-11ed-8538-d1df98b5b935.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4f10be4f80cb552253a964a69ba8303f8adb08b --- /dev/null +++ b/graph/incidents_graphml/4/4ca16520-d09a-11ed-8538-d1df98b5b935.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.11 + 100.64.68.11 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + INCIDENT_LINK + 1680359664 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Unprocessed + 4ca16520-d09a-11ed-8538-d1df98b5b935 + + + diff --git a/graph/incidents_graphml/4/4ca99b30-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/4/4ca99b30-f9b3-11ee-9419-336c262dcd55.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08a28dc8dc04831c25a1b65125bb6917be67a3ba --- /dev/null +++ b/graph/incidents_graphml/4/4ca99b30-f9b3-11ee-9419-336c262dcd55.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.190 + 100.64.41.190 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713025897 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ca99b30-f9b3-11ee-9419-336c262dcd55 + + + diff --git a/graph/incidents_graphml/4/4cae8090-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/4/4cae8090-fe0c-11ec-809b-91d71d0233d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b7bce29dc1f4d95ef6db29b25676cad25679009 --- /dev/null +++ b/graph/incidents_graphml/4/4cae8090-fe0c-11ec-809b-91d71d0233d6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.13 + 100.64.79.13 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.72 + 100.64.73.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657208932 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4cae8090-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208932 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4cae8090-fe0c-11ec-809b-91d71d0233d6 + + + diff --git a/graph/incidents_graphml/4/4cb6c2b0-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/4/4cb6c2b0-20a2-11ed-ab44-599bbcff3eda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a269dc085656dab2849d066959f72ba6bd11636 --- /dev/null +++ b/graph/incidents_graphml/4/4cb6c2b0-20a2-11ed-ab44-599bbcff3eda.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.196 + 100.64.72.196 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.76 + 100.64.79.76 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.79.77 + 100.64.79.77 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661011696 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4cb6c2b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011696 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4cb6c2b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011696 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4cb6c2b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011696 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4cb6c2b0-20a2-11ed-ab44-599bbcff3eda + + + diff --git a/graph/incidents_graphml/4/4cb7e290-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/4cb7e290-33c8-11ef-bc42-75e180de3d4b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0ddd14a9de144bd2b9fc943c31a7cf20b2880a7 --- /dev/null +++ b/graph/incidents_graphml/4/4cb7e290-33c8-11ef-bc42-75e180de3d4b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.212 + 100.64.66.212 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719412084 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cb7e290-33c8-11ef-bc42-75e180de3d4b + + + diff --git a/graph/incidents_graphml/4/4cb87060-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/4/4cb87060-20a2-11ed-ab44-599bbcff3eda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d3df9dd85ac8b9d15ca1e792e42bc7248f234ba --- /dev/null +++ b/graph/incidents_graphml/4/4cb87060-20a2-11ed-ab44-599bbcff3eda.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.53 + 100.64.1.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.78 + 100.64.79.78 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.39 + 100.64.1.39 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.73 + 100.64.72.73 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.44.87 + 100.64.44.87 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661011696 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cb87060-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011696 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cb87060-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011696 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cb87060-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011696 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cb87060-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011696 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cb87060-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011696 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cb87060-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011696 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cb87060-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011696 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cb87060-20a2-11ed-ab44-599bbcff3eda + + + diff --git a/graph/incidents_graphml/4/4cbc8dd0-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4cbc8dd0-dda2-11ee-8562-1ffce003597e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00d6ca5bc9730bc5095ba99cd90530a5aff3863c --- /dev/null +++ b/graph/incidents_graphml/4/4cbc8dd0-dda2-11ee-8562-1ffce003597e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.9.150 + 100.64.9.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1709939963 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4cbc8dd0-dda2-11ee-8562-1ffce003597e + + + diff --git a/graph/incidents_graphml/4/4cc41110-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4cc41110-f83f-11ee-a565-4974183b9eb9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b09d071e81dca2079592e04da9155feb7aba96b --- /dev/null +++ b/graph/incidents_graphml/4/4cc41110-f83f-11ee-a565-4974183b9eb9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.84 + 100.64.22.84 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712866125 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4cc41110-f83f-11ee-a565-4974183b9eb9 + + + diff --git a/graph/incidents_graphml/4/4cc434e0-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/4/4cc434e0-2227-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4c16ef69dfa4e750000414551ae74b4ecf8b54b --- /dev/null +++ b/graph/incidents_graphml/4/4cc434e0-2227-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.96.216.116 + 10.96.216.116 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689326268 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4cc434e0-2227-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/4/4ccc2d10-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/4/4ccc2d10-81bf-11ee-967b-47c68907a0bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e56abdb4504b2e8eb8b41ec2ac09c4ba7f8199dd --- /dev/null +++ b/graph/incidents_graphml/4/4ccc2d10-81bf-11ee-967b-47c68907a0bd.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.73 + 100.64.68.73 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.159 + 100.64.68.159 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1699836912 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ccc2d10-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836912 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ccc2d10-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836912 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ccc2d10-81bf-11ee-967b-47c68907a0bd + + + INCIDENT_LINK + 1699836912 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ccc2d10-81bf-11ee-967b-47c68907a0bd + + + diff --git a/graph/incidents_graphml/4/4cd2bcc0-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/4/4cd2bcc0-535c-11ee-aeed-cffe9ef9c7cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..732ad286920ca3db0b999e614a15cac9e737c3ac --- /dev/null +++ b/graph/incidents_graphml/4/4cd2bcc0-535c-11ee-aeed-cffe9ef9c7cb.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.12.134 + 100.64.12.134 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1694736638 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4cd2bcc0-535c-11ee-aeed-cffe9ef9c7cb + + + INCIDENT_LINK + 1694736638 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4cd2bcc0-535c-11ee-aeed-cffe9ef9c7cb + + + diff --git a/graph/incidents_graphml/4/4cd48bd0-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4cd48bd0-f83f-11ee-a565-4974183b9eb9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d79c9a898a7a3da3aeec088e97e173b1bc682e2 --- /dev/null +++ b/graph/incidents_graphml/4/4cd48bd0-f83f-11ee-a565-4974183b9eb9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.84 + 100.64.22.84 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712866125 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4cd48bd0-f83f-11ee-a565-4974183b9eb9 + + + diff --git a/graph/incidents_graphml/4/4cdb6b50-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/4/4cdb6b50-140e-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24c8c01f4344aff7d2b413adbec973b9055a79b0 --- /dev/null +++ b/graph/incidents_graphml/4/4cdb6b50-140e-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.86 + 100.64.52.86 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687776214 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4cdb6b50-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776214 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4cdb6b50-140e-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/4/4cdb9300-331d-11ed-b7a7-43dc40721942.graphml b/graph/incidents_graphml/4/4cdb9300-331d-11ed-b7a7-43dc40721942.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4edc2512eacf179b32e64ec07909d8c3106ffc2e --- /dev/null +++ b/graph/incidents_graphml/4/4cdb9300-331d-11ed-b7a7-43dc40721942.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.45.70 + 192.168.45.70 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Windows Active Directory"] + + + HOST + 100.64.1.171 + USER-0015-1635.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1663043645 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4cdb9300-331d-11ed-b7a7-43dc40721942 + + + diff --git a/graph/incidents_graphml/4/4cdc98f0-dda2-11ee-8562-1ffce003597e.graphml b/graph/incidents_graphml/4/4cdc98f0-dda2-11ee-8562-1ffce003597e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..301b9b5822d10476713b4b975c81e8c9dcd03aaf --- /dev/null +++ b/graph/incidents_graphml/4/4cdc98f0-dda2-11ee-8562-1ffce003597e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.151 + 100.64.8.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1709939963 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cdc98f0-dda2-11ee-8562-1ffce003597e + + + diff --git a/graph/incidents_graphml/4/4ce46a50-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4ce46a50-f83f-11ee-a565-4974183b9eb9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c6e50ec27cd36678e1bfaea2343f67d7c142929f --- /dev/null +++ b/graph/incidents_graphml/4/4ce46a50-f83f-11ee-a565-4974183b9eb9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.205 + 100.64.22.205 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712866125 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ce46a50-f83f-11ee-a565-4974183b9eb9 + + + diff --git a/graph/incidents_graphml/4/4ceeade0-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4ceeade0-1ed2-11ee-b536-839ca7748106.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a67a9b915966a345aeb89af8c87c8bbf5e1452b --- /dev/null +++ b/graph/incidents_graphml/4/4ceeade0-1ed2-11ee-b536-839ca7748106.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.39 + 100.64.44.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688959907 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ceeade0-1ed2-11ee-b536-839ca7748106 + + + diff --git a/graph/incidents_graphml/4/4cf17cb0-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4cf17cb0-5c8e-11ee-b468-75a223656fa7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3880859b61edf556bff0719b6b0d243a19c25ef3 --- /dev/null +++ b/graph/incidents_graphml/4/4cf17cb0-5c8e-11ee-b468-75a223656fa7.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.84 + 100.64.19.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695747674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cf17cb0-5c8e-11ee-b468-75a223656fa7 + + + INCIDENT_LINK + 1695747674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cf17cb0-5c8e-11ee-b468-75a223656fa7 + + + diff --git a/graph/incidents_graphml/4/4cf4e510-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4cf4e510-f83f-11ee-a565-4974183b9eb9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..acf4144c8bf95eb528407f8e855b7c426957b6c3 --- /dev/null +++ b/graph/incidents_graphml/4/4cf4e510-f83f-11ee-a565-4974183b9eb9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.205 + 100.64.22.205 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712866125 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4cf4e510-f83f-11ee-a565-4974183b9eb9 + + + diff --git a/graph/incidents_graphml/4/4cf980b0-91fc-11ee-8ab2-89488b5d7963.graphml b/graph/incidents_graphml/4/4cf980b0-91fc-11ee-8ab2-89488b5d7963.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eeb94d52f5526e5c7353821f59abb45841402742 --- /dev/null +++ b/graph/incidents_graphml/4/4cf980b0-91fc-11ee-8ab2-89488b5d7963.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.192 + 100.64.14.192 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701622330 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4cf980b0-91fc-11ee-8ab2-89488b5d7963 + + + diff --git a/graph/incidents_graphml/4/4cf9bea0-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/4cf9bea0-f5ee-11ec-ae2b-8fa08eaee108.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99ec2ac01557b08e4394d6b2ba718577152fde35 --- /dev/null +++ b/graph/incidents_graphml/4/4cf9bea0-f5ee-11ec-ae2b-8fa08eaee108.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.93 + USER-0015-1916.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656316438 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4cf9bea0-f5ee-11ec-ae2b-8fa08eaee108 + + + diff --git a/graph/incidents_graphml/4/4d0097e0-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4d0097e0-5c8e-11ee-b468-75a223656fa7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c018f28df8565caf79f3cc15c25ac20a7cad73cc --- /dev/null +++ b/graph/incidents_graphml/4/4d0097e0-5c8e-11ee-b468-75a223656fa7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.84 + 100.64.19.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695747674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d0097e0-5c8e-11ee-b468-75a223656fa7 + + + diff --git a/graph/incidents_graphml/4/4d021820-30ed-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/4/4d021820-30ed-11ef-bae8-75e6361c756f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfc5f5beeae46585d00c941ea6a25d85a810864c --- /dev/null +++ b/graph/incidents_graphml/4/4d021820-30ed-11ef-bae8-75e6361c756f.graphml @@ -0,0 +1,725 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.237 + 100.64.38.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.131 + 100.64.27.131 + ["Exploiting Host"] + 0.8875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.224 + 100.64.36.224 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.67 + 100.64.53.67 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.51 + 100.64.49.51 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.192 + 100.64.21.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.2 + 100.64.51.2 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.68 + 100.64.53.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.24 + 100.64.45.24 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.69 + 100.64.53.69 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.111 + 100.64.5.111 + ["Exploiting Host"] + 0.8875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.66 + 100.64.23.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.79 + 100.64.5.79 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.66 + 100.64.6.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.39 + 100.64.17.39 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.70 + 100.64.53.70 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098123 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d021820-30ed-11ef-bae8-75e6361c756f + + + diff --git a/graph/incidents_graphml/4/4d055370-9e24-11ee-9ce0-3dd61bd6a247.graphml b/graph/incidents_graphml/4/4d055370-9e24-11ee-9ce0-3dd61bd6a247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1769510fa44afd6a842cae5f1ad683c03af84c9f --- /dev/null +++ b/graph/incidents_graphml/4/4d055370-9e24-11ee-9ce0-3dd61bd6a247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.84 + 100.64.14.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702958924 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d055370-9e24-11ee-9ce0-3dd61bd6a247 + + + diff --git a/graph/incidents_graphml/4/4d099580-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/4/4d099580-f9b3-11ee-9419-336c262dcd55.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d87f8d271aed61c7552d28a752a87f6a17004559 --- /dev/null +++ b/graph/incidents_graphml/4/4d099580-f9b3-11ee-9419-336c262dcd55.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.192 + 100.64.41.192 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713025898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d099580-f9b3-11ee-9419-336c262dcd55 + + + diff --git a/graph/incidents_graphml/4/4d0a7450-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4d0a7450-becc-11ed-93f3-fff421178c5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20efbf76a5066c4ffe5b187a987af9c555f7a292 --- /dev/null +++ b/graph/incidents_graphml/4/4d0a7450-becc-11ed-93f3-fff421178c5e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.17.250 + 100.64.17.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678402019 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d0a7450-becc-11ed-93f3-fff421178c5e + + + diff --git a/graph/incidents_graphml/4/4d0ca960-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4d0ca960-2244-11ee-a208-019103756a24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..632d950d022879cea5f4084f0a1b1a102b3cfc64 --- /dev/null +++ b/graph/incidents_graphml/4/4d0ca960-2244-11ee-a208-019103756a24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689338724 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d0ca960-2244-11ee-a208-019103756a24 + + + diff --git a/graph/incidents_graphml/4/4d1399b0-002a-11ed-bb11-93744d705888.graphml b/graph/incidents_graphml/4/4d1399b0-002a-11ed-bb11-93744d705888.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c24ea595f4520eaf5c1c5dcdf58b725b43096d18 --- /dev/null +++ b/graph/incidents_graphml/4/4d1399b0-002a-11ed-bb11-93744d705888.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.183 + 100.64.80.183 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657441720 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d1399b0-002a-11ed-bb11-93744d705888 + + + diff --git a/graph/incidents_graphml/4/4d13f970-9e24-11ee-9ce0-3dd61bd6a247.graphml b/graph/incidents_graphml/4/4d13f970-9e24-11ee-9ce0-3dd61bd6a247.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2c18255f6ac48d918239fcae4c6b4c1f3e6214c --- /dev/null +++ b/graph/incidents_graphml/4/4d13f970-9e24-11ee-9ce0-3dd61bd6a247.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.84 + 100.64.14.84 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702958924 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4d13f970-9e24-11ee-9ce0-3dd61bd6a247 + + + diff --git a/graph/incidents_graphml/4/4d1449e0-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4d1449e0-4c1a-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91b7a927f00427491f75e8fb5d4c6427f919fd77 --- /dev/null +++ b/graph/incidents_graphml/4/4d1449e0-4c1a-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.32 + 100.64.12.32 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693938634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d1449e0-4c1a-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/4/4d16e1e0-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4d16e1e0-d325-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45ccdd799098e6a6925e60e25a431a5205911393 --- /dev/null +++ b/graph/incidents_graphml/4/4d16e1e0-d325-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.170 + 100.64.42.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708786765 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d16e1e0-d325-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/4d194cf0-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/4/4d194cf0-f9b3-11ee-9419-336c262dcd55.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f1c4778331e87bd635871c46b3695deabde2c7c --- /dev/null +++ b/graph/incidents_graphml/4/4d194cf0-f9b3-11ee-9419-336c262dcd55.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.192 + 100.64.41.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713025898 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4d194cf0-f9b3-11ee-9419-336c262dcd55 + + + diff --git a/graph/incidents_graphml/4/4d196760-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4d196760-1ed2-11ee-b536-839ca7748106.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cecd7bfb9da13906563b56b5140fa0bf9a936428 --- /dev/null +++ b/graph/incidents_graphml/4/4d196760-1ed2-11ee-b536-839ca7748106.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.39 + 100.64.44.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688959908 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4d196760-1ed2-11ee-b536-839ca7748106 + + + diff --git a/graph/incidents_graphml/4/4d228150-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4d228150-0727-11ee-9050-71ab19a2f61d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..708631ae883e746796e2964280ea874948f10f3b --- /dev/null +++ b/graph/incidents_graphml/4/4d228150-0727-11ee-9050-71ab19a2f61d.graphml @@ -0,0 +1,767 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.247 + 100.64.73.247 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.58 + 100.64.1.58 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.55 + 100.64.1.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.7.67 + 100.64.7.67 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.231 + 100.64.10.231 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.248 + 100.64.73.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.249 + 100.64.73.249 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.14.105 + 100.64.14.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.105 + 100.64.11.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.14.41 + 100.64.14.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.130 + 100.64.71.130 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.250 + 100.64.73.250 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.23.203 + 100.64.23.203 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.126 + 100.64.71.126 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.251 + 100.64.73.251 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.21 + 100.64.71.21 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.114 + 100.64.11.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.199 + 100.64.72.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d228150-0727-11ee-9050-71ab19a2f61d + + + diff --git a/graph/incidents_graphml/4/4d23ed60-002a-11ed-bb11-93744d705888.graphml b/graph/incidents_graphml/4/4d23ed60-002a-11ed-bb11-93744d705888.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e27786300c4ee27e49443a2e5ad4a886c1d117af --- /dev/null +++ b/graph/incidents_graphml/4/4d23ed60-002a-11ed-bb11-93744d705888.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.183 + 100.64.80.183 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657441720 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4d23ed60-002a-11ed-bb11-93744d705888 + + + diff --git a/graph/incidents_graphml/4/4d2e6180-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4d2e6180-d325-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7968bd32d215379e796cbade10cd36de064f8578 --- /dev/null +++ b/graph/incidents_graphml/4/4d2e6180-d325-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.170 + 100.64.42.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708786765 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d2e6180-d325-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/4d2e8a40-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/4d2e8a40-f5ee-11ec-ae2b-8fa08eaee108.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f8ad71b6ab1e98390f550dd7d885f8a40790e80 --- /dev/null +++ b/graph/incidents_graphml/4/4d2e8a40-f5ee-11ec-ae2b-8fa08eaee108.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.38 + USER-0015-1917.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656316438 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d2e8a40-f5ee-11ec-ae2b-8fa08eaee108 + + + diff --git a/graph/incidents_graphml/4/4d2f3a60-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4d2f3a60-becc-11ed-93f3-fff421178c5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..caa6b9ea0890157725bd97c4b0fe524b81d4d110 --- /dev/null +++ b/graph/incidents_graphml/4/4d2f3a60-becc-11ed-93f3-fff421178c5e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.17.250 + 100.64.17.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678402019 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d2f3a60-becc-11ed-93f3-fff421178c5e + + + diff --git a/graph/incidents_graphml/4/4d3221e0-3558-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/4/4d3221e0-3558-11ef-bea6-a94fc9e3b8ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e84cf8c166568ebce25e6198d952e3bd02425f8d --- /dev/null +++ b/graph/incidents_graphml/4/4d3221e0-3558-11ef-bea6-a94fc9e3b8ec.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.37.13 + USER-0015-2042.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.90.77 + USER-0015-2043.example.internal + ["Exploiting Target"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719583884 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d3221e0-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.7 + 0.68359375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d3221e0-3558-11ef-bea6-a94fc9e3b8ec + + + diff --git a/graph/incidents_graphml/4/4d33a620-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4d33a620-1ed2-11ee-b536-839ca7748106.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1542b5d84d7209037bbddac58490edcf04829094 --- /dev/null +++ b/graph/incidents_graphml/4/4d33a620-1ed2-11ee-b536-839ca7748106.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.134 + 100.64.19.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688959908 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d33a620-1ed2-11ee-b536-839ca7748106 + + + diff --git a/graph/incidents_graphml/4/4d33b8c0-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4d33b8c0-4c1a-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1a1295254ef04beea38914e377e8d228a013627 --- /dev/null +++ b/graph/incidents_graphml/4/4d33b8c0-4c1a-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.205 + 100.64.23.205 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693938634 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d33b8c0-4c1a-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/4/4d36cca0-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4d36cca0-0727-11ee-9050-71ab19a2f61d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85bf8d36e35ffdf8e4b6051b65810b7e2a94a750 --- /dev/null +++ b/graph/incidents_graphml/4/4d36cca0-0727-11ee-9050-71ab19a2f61d.graphml @@ -0,0 +1,301 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.252 + 100.64.73.252 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.225 + 100.64.71.225 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.21.56 + 100.64.21.56 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.21.65 + 100.64.21.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.185 + 100.64.73.185 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.253 + 100.64.73.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.158 + HOST-13435 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.254 + 100.64.73.254 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.13.59 + 100.64.13.59 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d36cca0-0727-11ee-9050-71ab19a2f61d + + + diff --git a/graph/incidents_graphml/4/4d38ad80-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/4d38ad80-6ba5-11ee-adf9-937001d43276.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d64e4561b9d811e2de2d654ba6545f1c91c2db9 --- /dev/null +++ b/graph/incidents_graphml/4/4d38ad80-6ba5-11ee-adf9-937001d43276.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697406820 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d38ad80-6ba5-11ee-adf9-937001d43276 + + + diff --git a/graph/incidents_graphml/4/4d422770-3558-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/4/4d422770-3558-11ef-bea6-a94fc9e3b8ec.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd91dbe4bd3b1dd58dcde3d759d32e821dae2daf --- /dev/null +++ b/graph/incidents_graphml/4/4d422770-3558-11ef-bea6-a94fc9e3b8ec.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.79 + USER-0015-2044.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.21.150 + 100.64.21.150 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.80 + 100.64.90.80 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.130 + 100.64.39.130 + ["Exploiting Host","Exploiting Target"] + 0.983125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.234 + 100.64.59.234 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 192.0.2.182 + 192.0.2.182 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + INCIDENT_LINK + 1719583884 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d422770-3558-11ef-bea6-a94fc9e3b8ec + + + diff --git a/graph/incidents_graphml/4/4d437030-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4d437030-4c1a-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66dd07288558494af3191e6a9ea7c11d67a52bfc --- /dev/null +++ b/graph/incidents_graphml/4/4d437030-4c1a-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.205 + 100.64.23.205 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693938634 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4d437030-4c1a-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/4/4d491e30-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4d491e30-2aec-11ee-9870-89912039a0d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71100d5a7b0596d969af4990d30f33653480e392 --- /dev/null +++ b/graph/incidents_graphml/4/4d491e30-2aec-11ee-9870-89912039a0d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.200 + 100.64.20.200 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690290489 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4d491e30-2aec-11ee-9870-89912039a0d0 + + + diff --git a/graph/incidents_graphml/4/4d499150-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4d499150-0727-11ee-9050-71ab19a2f61d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc00f7989b9822bea8ca0ffa2d00beea2b8570c9 --- /dev/null +++ b/graph/incidents_graphml/4/4d499150-0727-11ee-9050-71ab19a2f61d.graphml @@ -0,0 +1,373 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.85 + 100.64.73.85 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.255 + 100.64.73.255 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.187 + 100.64.10.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.12.59 + 100.64.12.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.195 + 100.64.73.195 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.50.138 + USER-0015-1641.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.86 + 100.64.73.86 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.1 + 100.64.74.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.68.225 + 100.64.68.225 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d499150-0727-11ee-9050-71ab19a2f61d + + + diff --git a/graph/incidents_graphml/4/4d4e8470-06fc-11ed-b0df-8957a66f2fd5.graphml b/graph/incidents_graphml/4/4d4e8470-06fc-11ed-b0df-8957a66f2fd5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eeb99b7d8bb99a8b342e1e062b572827b64963a6 --- /dev/null +++ b/graph/incidents_graphml/4/4d4e8470-06fc-11ed-b0df-8957a66f2fd5.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.5 + 100.64.72.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 192.168.31.246 + 192.168.31.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658191621 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d4e8470-06fc-11ed-b0df-8957a66f2fd5 + + + INCIDENT_LINK + 1658191621 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d4e8470-06fc-11ed-b0df-8957a66f2fd5 + + + diff --git a/graph/incidents_graphml/4/4d5007c0-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4d5007c0-1ed2-11ee-b536-839ca7748106.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e671718d4b7f4051247d7d669f250eefd7454578 --- /dev/null +++ b/graph/incidents_graphml/4/4d5007c0-1ed2-11ee-b536-839ca7748106.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.134 + 100.64.19.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688959908 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4d5007c0-1ed2-11ee-b536-839ca7748106 + + + diff --git a/graph/incidents_graphml/4/4d54faa0-3f5c-11ee-a7a8-a9c952ce7042.graphml b/graph/incidents_graphml/4/4d54faa0-3f5c-11ee-a7a8-a9c952ce7042.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f6b5ac594389e101f90879d9337774e63ce282c --- /dev/null +++ b/graph/incidents_graphml/4/4d54faa0-3f5c-11ee-a7a8-a9c952ce7042.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.244 + 100.64.69.244 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1692537616 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d54faa0-3f5c-11ee-a7a8-a9c952ce7042 + + + INCIDENT_LINK + 1692537616 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d54faa0-3f5c-11ee-a7a8-a9c952ce7042 + + + diff --git a/graph/incidents_graphml/4/4d572160-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/4/4d572160-20a2-11ed-ab44-599bbcff3eda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8cac91081e0f247aca1fb61c2cdb36397f4bb834 --- /dev/null +++ b/graph/incidents_graphml/4/4d572160-20a2-11ed-ab44-599bbcff3eda.graphml @@ -0,0 +1,277 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.56 + 100.64.76.56 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.79 + 100.64.79.79 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.25 + 100.64.1.25 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.80 + 100.64.79.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.81 + 100.64.79.81 + ["Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.79.82 + 100.64.79.82 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + ACTOR + [] + 0.25 + [] + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011697 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d572160-20a2-11ed-ab44-599bbcff3eda + + + diff --git a/graph/incidents_graphml/4/4d5991e0-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/4d5991e0-f5ee-11ec-ae2b-8fa08eaee108.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a52700590316de2d83c7e96f882f0d91efe9a099 --- /dev/null +++ b/graph/incidents_graphml/4/4d5991e0-f5ee-11ec-ae2b-8fa08eaee108.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.38 + USER-0015-1917.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656316439 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4d5991e0-f5ee-11ec-ae2b-8fa08eaee108 + + + diff --git a/graph/incidents_graphml/4/4d5a5400-ea51-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/4/4d5a5400-ea51-11ee-a5b0-ebb549372bba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..624d391db3d9aa3ac6181d53a8b390aec1438f5b --- /dev/null +++ b/graph/incidents_graphml/4/4d5a5400-ea51-11ee-a5b0-ebb549372bba.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.6.202 + 100.64.6.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711334540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d5a5400-ea51-11ee-a5b0-ebb549372bba + + + INCIDENT_LINK + 1711334540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d5a5400-ea51-11ee-a5b0-ebb549372bba + + + diff --git a/graph/incidents_graphml/4/4d5c6280-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4d5c6280-034d-11ef-8489-99c106ef6fee.graphml new file mode 100644 index 0000000000000000000000000000000000000000..409164b08b7d9cf62df90ad378823ed8526936e0 --- /dev/null +++ b/graph/incidents_graphml/4/4d5c6280-034d-11ef-8489-99c106ef6fee.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.230 + 100.64.11.230 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714081601 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d5c6280-034d-11ef-8489-99c106ef6fee + + + diff --git a/graph/incidents_graphml/4/4d600e00-4522-11ef-b505-f5f313488713.graphml b/graph/incidents_graphml/4/4d600e00-4522-11ef-b505-f5f313488713.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a88392fc6e33aae7a36c293e7608a6b890e94752 --- /dev/null +++ b/graph/incidents_graphml/4/4d600e00-4522-11ef-b505-f5f313488713.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.106.52 + 172.29.106.52 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.0.148 + 100.64.0.148 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1721319910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d600e00-4522-11ef-b505-f5f313488713 + + + INCIDENT_LINK + 1721319910 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d600e00-4522-11ef-b505-f5f313488713 + + + diff --git a/graph/incidents_graphml/4/4d66cce0-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4d66cce0-47cb-11ee-be8c-ef3f416b8a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04f5a2fac36f2c8b428ff675f59f20a14105f2e8 --- /dev/null +++ b/graph/incidents_graphml/4/4d66cce0-47cb-11ee-be8c-ef3f416b8a04.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.155 + 100.64.7.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693464899 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d66cce0-47cb-11ee-be8c-ef3f416b8a04 + + + diff --git a/graph/incidents_graphml/4/4d67e700-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4d67e700-32d2-11ee-a4d6-4bc10938c808.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00064f2611ab3fa5ed29322bc17d6a5c26ba5a0a --- /dev/null +++ b/graph/incidents_graphml/4/4d67e700-32d2-11ee-a4d6-4bc10938c808.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.49 + 100.64.25.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691158931 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d67e700-32d2-11ee-a4d6-4bc10938c808 + + + INCIDENT_LINK + 1691158931 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d67e700-32d2-11ee-a4d6-4bc10938c808 + + + diff --git a/graph/incidents_graphml/4/4d6f9140-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/4d6f9140-b6d5-11ed-b037-89e5a8e9b2b8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b443f524e9a6adc54a23b63765f575ab446aeb9 --- /dev/null +++ b/graph/incidents_graphml/4/4d6f9140-b6d5-11ed-b037-89e5a8e9b2b8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.30.177 + 172.22.30.177 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.191 + 100.64.94.191 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677526276 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4d6f9140-b6d5-11ed-b037-89e5a8e9b2b8 + + + INCIDENT_LINK + 1677526276 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4d6f9140-b6d5-11ed-b037-89e5a8e9b2b8 + + + diff --git a/graph/incidents_graphml/4/4d6fea80-034d-11ef-8489-99c106ef6fee.graphml b/graph/incidents_graphml/4/4d6fea80-034d-11ef-8489-99c106ef6fee.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3558dedbd585410e2a712a59e769c92c7dca33fa --- /dev/null +++ b/graph/incidents_graphml/4/4d6fea80-034d-11ef-8489-99c106ef6fee.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.230 + 100.64.11.230 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714081601 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d6fea80-034d-11ef-8489-99c106ef6fee + + + diff --git a/graph/incidents_graphml/4/4d77c1a0-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4d77c1a0-699d-11ee-b92f-dba1102b39ba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e03d359d7dfc5eb14f5218cc2db8d9bc08f0f400 --- /dev/null +++ b/graph/incidents_graphml/4/4d77c1a0-699d-11ee-b92f-dba1102b39ba.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.103 + 100.64.56.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697183482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d77c1a0-699d-11ee-b92f-dba1102b39ba + + + diff --git a/graph/incidents_graphml/4/4d7f8f70-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/4d7f8f70-2244-11ee-a208-019103756a24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7ebd68b40d492155d7be18b0754e25c3734e1b8 --- /dev/null +++ b/graph/incidents_graphml/4/4d7f8f70-2244-11ee-a208-019103756a24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.31 + 100.64.15.31 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689338725 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d7f8f70-2244-11ee-a208-019103756a24 + + + diff --git a/graph/incidents_graphml/4/4d7fe020-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4d7fe020-f91c-11ed-8f07-3d261ba980ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c58d4ce91bdbf11c4c9d58c9536f62f68fdb41c --- /dev/null +++ b/graph/incidents_graphml/4/4d7fe020-f91c-11ed-8f07-3d261ba980ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.246 + 100.64.72.246 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684813547 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4d7fe020-f91c-11ed-8f07-3d261ba980ce + + + diff --git a/graph/incidents_graphml/4/4d813b60-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4d813b60-32d2-11ee-a4d6-4bc10938c808.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b886f99db35ab58083244232d99d97afd712fd90 --- /dev/null +++ b/graph/incidents_graphml/4/4d813b60-32d2-11ee-a4d6-4bc10938c808.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.49 + 100.64.25.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691158932 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d813b60-32d2-11ee-a4d6-4bc10938c808 + + + diff --git a/graph/incidents_graphml/4/4d830770-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4d830770-47cb-11ee-be8c-ef3f416b8a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..069f6a1550f83186b3e2fc9d9204b5c329daefd0 --- /dev/null +++ b/graph/incidents_graphml/4/4d830770-47cb-11ee-be8c-ef3f416b8a04.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.178 + 100.64.40.178 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693464900 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d830770-47cb-11ee-be8c-ef3f416b8a04 + + + diff --git a/graph/incidents_graphml/4/4d852f20-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4d852f20-699d-11ee-b92f-dba1102b39ba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fad8cdb8270da26ea80c8711a3d1915e9fbd3416 --- /dev/null +++ b/graph/incidents_graphml/4/4d852f20-699d-11ee-b92f-dba1102b39ba.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.103 + 100.64.56.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697183482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d852f20-699d-11ee-b92f-dba1102b39ba + + + diff --git a/graph/incidents_graphml/4/4d91b240-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4d91b240-699d-11ee-b92f-dba1102b39ba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d2b55568cc078c05d7eb2adedcc51bc4513acb5 --- /dev/null +++ b/graph/incidents_graphml/4/4d91b240-699d-11ee-b92f-dba1102b39ba.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.246 + 100.64.48.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697183482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d91b240-699d-11ee-b92f-dba1102b39ba + + + INCIDENT_LINK + 1697183482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d91b240-699d-11ee-b92f-dba1102b39ba + + + diff --git a/graph/incidents_graphml/4/4d91e180-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4d91e180-f91c-11ed-8f07-3d261ba980ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6aafbc8dfbf972002560372f9798f5e70c18f7b5 --- /dev/null +++ b/graph/incidents_graphml/4/4d91e180-f91c-11ed-8f07-3d261ba980ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.246 + 100.64.72.246 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1684813547 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d91e180-f91c-11ed-8f07-3d261ba980ce + + + diff --git a/graph/incidents_graphml/4/4d9e4470-f83f-11ee-a565-4974183b9eb9.graphml b/graph/incidents_graphml/4/4d9e4470-f83f-11ee-a565-4974183b9eb9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c84bc4e3c290167da386e3bbecc7d5e9c048724 --- /dev/null +++ b/graph/incidents_graphml/4/4d9e4470-f83f-11ee-a565-4974183b9eb9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.207 + 100.64.22.207 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712866126 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4d9e4470-f83f-11ee-a565-4974183b9eb9 + + + diff --git a/graph/incidents_graphml/4/4d9ed1a0-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4d9ed1a0-699d-11ee-b92f-dba1102b39ba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd525f5f76ad744689ef78f6d85e6cff90875d9f --- /dev/null +++ b/graph/incidents_graphml/4/4d9ed1a0-699d-11ee-b92f-dba1102b39ba.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.246 + 100.64.48.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697183482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4d9ed1a0-699d-11ee-b92f-dba1102b39ba + + + diff --git a/graph/incidents_graphml/4/4da30560-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/4/4da30560-43ac-11ef-a622-2be670a61274.graphml new file mode 100644 index 0000000000000000000000000000000000000000..471b5b81766457cecf113e6cadb253e500d9e6e8 --- /dev/null +++ b/graph/incidents_graphml/4/4da30560-43ac-11ef-a622-2be670a61274.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.241 + 100.64.37.241 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.16 + 100.64.2.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.242 + USER-0015-1314.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.243 + 100.64.37.243 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.244 + 100.64.37.244 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.245 + 100.64.37.245 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.246 + 100.64.37.246 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.247 + 100.64.37.247 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159278 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4da30560-43ac-11ef-a622-2be670a61274 + + + diff --git a/graph/incidents_graphml/4/4da4f450-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4da4f450-f91c-11ed-8f07-3d261ba980ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b1e22f7ab6784932782e96c31874beac52fffbe --- /dev/null +++ b/graph/incidents_graphml/4/4da4f450-f91c-11ed-8f07-3d261ba980ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.202 + 100.64.71.202 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684813547 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4da4f450-f91c-11ed-8f07-3d261ba980ce + + + diff --git a/graph/incidents_graphml/4/4db0e0b0-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4db0e0b0-2aec-11ee-9870-89912039a0d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50de9b26fd47ab19a7e509d2f872720fc84fe89d --- /dev/null +++ b/graph/incidents_graphml/4/4db0e0b0-2aec-11ee-9870-89912039a0d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.202 + 100.64.20.202 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690290490 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4db0e0b0-2aec-11ee-9870-89912039a0d0 + + + diff --git a/graph/incidents_graphml/4/4db5a3b0-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4db5a3b0-4e6f-11ee-a8e2-c1e2e4930822.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ca5d97f1a0aba801c219b8919d713a43ae74c53 --- /dev/null +++ b/graph/incidents_graphml/4/4db5a3b0-4e6f-11ee-a8e2-c1e2e4930822.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.62 + 100.64.46.62 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694195044 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4db5a3b0-4e6f-11ee-a8e2-c1e2e4930822 + + + diff --git a/graph/incidents_graphml/4/4db76ae0-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4db76ae0-f91c-11ed-8f07-3d261ba980ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb9fc057f0145c45282885ed8811b1bf55796320 --- /dev/null +++ b/graph/incidents_graphml/4/4db76ae0-f91c-11ed-8f07-3d261ba980ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.71.202 + 100.64.71.202 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684813547 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4db76ae0-f91c-11ed-8f07-3d261ba980ce + + + diff --git a/graph/incidents_graphml/4/4dc998d0-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4dc998d0-2aec-11ee-9870-89912039a0d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf95d937c7c4db0ece5e7b830b30fda9cf4182ba --- /dev/null +++ b/graph/incidents_graphml/4/4dc998d0-2aec-11ee-9870-89912039a0d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.204 + 100.64.20.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690290490 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4dc998d0-2aec-11ee-9870-89912039a0d0 + + + diff --git a/graph/incidents_graphml/4/4dcbdd40-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4dcbdd40-f91c-11ed-8f07-3d261ba980ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb07c61b8941e1bce41c1c5e0604434b16899dc6 --- /dev/null +++ b/graph/incidents_graphml/4/4dcbdd40-f91c-11ed-8f07-3d261ba980ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.92 + 100.64.78.92 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684813547 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4dcbdd40-f91c-11ed-8f07-3d261ba980ce + + + diff --git a/graph/incidents_graphml/4/4ddb94b0-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4ddb94b0-f91c-11ed-8f07-3d261ba980ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7c5401e99b355639b82192e4c16d1cc82d730de --- /dev/null +++ b/graph/incidents_graphml/4/4ddb94b0-f91c-11ed-8f07-3d261ba980ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.78.92 + 100.64.78.92 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1684813548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ddb94b0-f91c-11ed-8f07-3d261ba980ce + + + diff --git a/graph/incidents_graphml/4/4ddbacf0-2f9c-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/4/4ddbacf0-2f9c-11ee-812f-67af952e62fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79e7320980763696214624222411efd32e76d82a --- /dev/null +++ b/graph/incidents_graphml/4/4ddbacf0-2f9c-11ee-812f-67af952e62fd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.141 + 100.64.68.141 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect"] + + + INCIDENT_LINK + 1690805886 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ddbacf0-2f9c-11ee-812f-67af952e62fd + + + INCIDENT_LINK + 1690805886 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ddbacf0-2f9c-11ee-812f-67af952e62fd + + + diff --git a/graph/incidents_graphml/4/4ddbb890-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4ddbb890-4c1a-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3685138e4c4a577d7e877169e5bab3b471299c44 --- /dev/null +++ b/graph/incidents_graphml/4/4ddbb890-4c1a-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.207 + 100.64.23.207 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693938635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ddbb890-4c1a-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/4/4de202d0-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4de202d0-2aec-11ee-9870-89912039a0d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2460b114a5075407bdc0e77d675d582181e3f2b2 --- /dev/null +++ b/graph/incidents_graphml/4/4de202d0-2aec-11ee-9870-89912039a0d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.204 + 100.64.20.204 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690290490 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4de202d0-2aec-11ee-9870-89912039a0d0 + + + diff --git a/graph/incidents_graphml/4/4de862b0-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4de862b0-d325-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17745d02388f8802d077eae4b00109c87956a60a --- /dev/null +++ b/graph/incidents_graphml/4/4de862b0-d325-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.100 + 100.64.22.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708786767 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4de862b0-d325-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/4deca880-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4deca880-4c1a-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39acf2e5754eefc31fe970d9ea4f5b54e7416fad --- /dev/null +++ b/graph/incidents_graphml/4/4deca880-4c1a-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.207 + 100.64.23.207 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693938635 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4deca880-4c1a-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/4/4dfd2330-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4dfd2330-d325-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe9bedbe917639622f40f16e312bbf1862293124 --- /dev/null +++ b/graph/incidents_graphml/4/4dfd2330-d325-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.100 + 100.64.22.100 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708786767 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4dfd2330-d325-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/4e016820-eb0d-11ec-bcf3-e1f20fd7057a.graphml b/graph/incidents_graphml/4/4e016820-eb0d-11ec-bcf3-e1f20fd7057a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..693147a1b1dd8b1b125fa61505441531ff312e90 --- /dev/null +++ b/graph/incidents_graphml/4/4e016820-eb0d-11ec-bcf3-e1f20fd7057a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.191 + USER-0015-1308.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.93 + USER-0015-1616.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655120291 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e016820-eb0d-11ec-bcf3-e1f20fd7057a + + + diff --git a/graph/incidents_graphml/4/4e04deb0-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e04deb0-535d-11ee-9d47-d7b7ec818502.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be7fd89ed7711a0d59ede3ef4ad482f833b79985 --- /dev/null +++ b/graph/incidents_graphml/4/4e04deb0-535d-11ee-9d47-d7b7ec818502.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.147 + 100.64.58.147 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694737070 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4e04deb0-535d-11ee-9d47-d7b7ec818502 + + + diff --git a/graph/incidents_graphml/4/4e08bf30-f91c-11ed-8f07-3d261ba980ce.graphml b/graph/incidents_graphml/4/4e08bf30-f91c-11ed-8f07-3d261ba980ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d716fd867d4028b6bf79ca4645b607602c9afd14 --- /dev/null +++ b/graph/incidents_graphml/4/4e08bf30-f91c-11ed-8f07-3d261ba980ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.95 + 100.64.78.95 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1684813548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e08bf30-f91c-11ed-8f07-3d261ba980ce + + + diff --git a/graph/incidents_graphml/4/4e0a0130-7b51-11ee-a1fb-a12255f73d88.graphml b/graph/incidents_graphml/4/4e0a0130-7b51-11ee-a1fb-a12255f73d88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8fef886f116c17cedcb4358fd697a679b7c9ff01 --- /dev/null +++ b/graph/incidents_graphml/4/4e0a0130-7b51-11ee-a1fb-a12255f73d88.graphml @@ -0,0 +1,805 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.98 + 100.64.48.98 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.99 + 100.64.48.99 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.100 + 100.64.48.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.22 + 100.64.21.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.59 + 100.64.5.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.239 + 100.64.45.239 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.139 + 100.64.26.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.255 + 100.64.23.255 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.20 + 100.64.8.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.204 + 100.64.20.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.20 + 100.64.31.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.6 + 100.64.4.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.83 + 100.64.10.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.103 + 100.64.43.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.32 + 100.64.30.32 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.169 + 100.64.19.169 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.101 + 100.64.48.101 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.232 + 100.64.26.232 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + INCIDENT_LINK + 1699129962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e0a0130-7b51-11ee-a1fb-a12255f73d88 + + + diff --git a/graph/incidents_graphml/4/4e144800-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e144800-535d-11ee-9d47-d7b7ec818502.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d14583c14b6b2af9bb00c9353314fd20e2c66aae --- /dev/null +++ b/graph/incidents_graphml/4/4e144800-535d-11ee-9d47-d7b7ec818502.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694737070 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e144800-535d-11ee-9d47-d7b7ec818502 + + + diff --git a/graph/incidents_graphml/4/4e183a50-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/4/4e183a50-0948-11ee-899e-3d5be197ab3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b243518ba37720a3d7d97e9972f9243bb6bf6704 --- /dev/null +++ b/graph/incidents_graphml/4/4e183a50-0948-11ee-899e-3d5be197ab3b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.231 + 100.64.35.231 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.17 + 100.64.77.17 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686591664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e183a50-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e183a50-0948-11ee-899e-3d5be197ab3b + + + diff --git a/graph/incidents_graphml/4/4e197240-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4e197240-1ed2-11ee-b536-839ca7748106.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16cc17aeb4509650f99ce5f46ff3846f80df0bc2 --- /dev/null +++ b/graph/incidents_graphml/4/4e197240-1ed2-11ee-b536-839ca7748106.graphml @@ -0,0 +1,459 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.159 + 100.64.9.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.218 + 100.64.41.218 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.41 + 100.64.44.41 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.42 + 100.64.44.42 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.66 + 100.64.18.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.10 + 100.64.9.10 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.24 + 100.64.13.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.43 + 100.64.44.43 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.44 + 100.64.44.44 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.45 + 100.64.44.45 + [] + 0.578125 + ["Precinct"] + + + HOST + 100.64.44.46 + 100.64.44.46 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + INCIDENT_LINK + 1688959909 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e197240-1ed2-11ee-b536-839ca7748106 + + + diff --git a/graph/incidents_graphml/4/4e221700-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4e221700-0727-11ee-9050-71ab19a2f61d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4fc67814750b0f716a634cfa2aac03529dea40f1 --- /dev/null +++ b/graph/incidents_graphml/4/4e221700-0727-11ee-9050-71ab19a2f61d.graphml @@ -0,0 +1,569 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.1 + 100.64.74.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.123 + 100.64.72.123 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.2 + 100.64.74.2 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.30.5 + 100.64.30.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.40.208 + 100.64.40.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.3 + 100.64.74.3 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.34.10 + 100.64.34.10 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.4 + 100.64.74.4 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.5 + 100.64.74.5 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.45.252 + 100.64.45.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.25.153 + 100.64.25.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.16.102 + 100.64.16.102 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.158 + HOST-13435 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.41.224 + 100.64.41.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.25 + HOST-13452 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.15.227 + 100.64.15.227 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.6 + 100.64.74.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.55.36 + 100.64.55.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e221700-0727-11ee-9050-71ab19a2f61d + + + diff --git a/graph/incidents_graphml/4/4e23ff70-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e23ff70-535d-11ee-9d47-d7b7ec818502.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5dfac2617873e0a54e88791d0e5b7586aa71f32 --- /dev/null +++ b/graph/incidents_graphml/4/4e23ff70-535d-11ee-9d47-d7b7ec818502.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694737070 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4e23ff70-535d-11ee-9d47-d7b7ec818502 + + + diff --git a/graph/incidents_graphml/4/4e25e790-3d36-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/4/4e25e790-3d36-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eafed0161c867685a4e01a61980be19644cd1741 --- /dev/null +++ b/graph/incidents_graphml/4/4e25e790-3d36-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,357 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.37 + USER-0015-2059.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + USER-0015-1984.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.38 + 100.64.91.38 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.39 + USER-0015-2060.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.35.217 + 100.64.35.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.40 + 100.64.91.40 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.41 + 100.64.91.41 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448892 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e25e790-3d36-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/4/4e2a1ce0-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4e2a1ce0-47cb-11ee-be8c-ef3f416b8a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c533ffd41cf6850e0943d11ccfebf67e49abc1ac --- /dev/null +++ b/graph/incidents_graphml/4/4e2a1ce0-47cb-11ee-be8c-ef3f416b8a04.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.180 + 100.64.40.180 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693464901 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e2a1ce0-47cb-11ee-be8c-ef3f416b8a04 + + + diff --git a/graph/incidents_graphml/4/4e319400-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e319400-535d-11ee-9d47-d7b7ec818502.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a136607a4f8e39a04bf8a1bd9bff7067cc1f764 --- /dev/null +++ b/graph/incidents_graphml/4/4e319400-535d-11ee-9d47-d7b7ec818502.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.11 + 100.64.11.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694737070 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e319400-535d-11ee-9d47-d7b7ec818502 + + + diff --git a/graph/incidents_graphml/4/4e3df300-47cb-11ee-be8c-ef3f416b8a04.graphml b/graph/incidents_graphml/4/4e3df300-47cb-11ee-be8c-ef3f416b8a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe47acb17172334fdb25f6ddbd55a9075ffa157c --- /dev/null +++ b/graph/incidents_graphml/4/4e3df300-47cb-11ee-be8c-ef3f416b8a04.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.180 + 100.64.40.180 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693464901 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e3df300-47cb-11ee-be8c-ef3f416b8a04 + + + diff --git a/graph/incidents_graphml/4/4e40d640-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e40d640-535d-11ee-9d47-d7b7ec818502.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e69c95cf074a0f740442fcd81eefd968c426ae66 --- /dev/null +++ b/graph/incidents_graphml/4/4e40d640-535d-11ee-9d47-d7b7ec818502.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.11 + 100.64.11.11 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694737070 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e40d640-535d-11ee-9d47-d7b7ec818502 + + + diff --git a/graph/incidents_graphml/4/4e514b20-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4e514b20-1ed2-11ee-b536-839ca7748106.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b1f6bf3be9c6c4c7e5410b34095851498a58a0d --- /dev/null +++ b/graph/incidents_graphml/4/4e514b20-1ed2-11ee-b536-839ca7748106.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.159 + 100.64.9.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688959910 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4e514b20-1ed2-11ee-b536-839ca7748106 + + + diff --git a/graph/incidents_graphml/4/4e521aa0-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4e521aa0-394e-11ee-a463-c9469bb75709.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f8485a8a8e70230544fe975a27bf48169d21086 --- /dev/null +++ b/graph/incidents_graphml/4/4e521aa0-394e-11ee-a463-c9469bb75709.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.61 + 100.64.28.61 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691871898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e521aa0-394e-11ee-a463-c9469bb75709 + + + diff --git a/graph/incidents_graphml/4/4e53a7a0-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4e53a7a0-d325-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64860930a687497b7f4a9b5b05396cb1457da927 --- /dev/null +++ b/graph/incidents_graphml/4/4e53a7a0-d325-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.172 + 100.64.42.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708786767 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e53a7a0-d325-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/4e56d700-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4e56d700-699d-11ee-b92f-dba1102b39ba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6dd3825987438ab26ccbbeb1a0fd7efca9dba50c --- /dev/null +++ b/graph/incidents_graphml/4/4e56d700-699d-11ee-b92f-dba1102b39ba.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.34 + 100.64.18.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697183484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e56d700-699d-11ee-b92f-dba1102b39ba + + + diff --git a/graph/incidents_graphml/4/4e5aeaf0-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/4/4e5aeaf0-be91-11ed-9416-c54055a72e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11661c2150c0d89540c094e48ccbabb26842698e --- /dev/null +++ b/graph/incidents_graphml/4/4e5aeaf0-be91-11ed-9416-c54055a72e53.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.187 + 100.64.79.187 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.245 + 100.64.76.245 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1678376681 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e5aeaf0-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376681 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e5aeaf0-be91-11ed-9416-c54055a72e53 + + + diff --git a/graph/incidents_graphml/4/4e5c8fd0-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4e5c8fd0-9fb5-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..630a0fb964c3802d8b197d0607ef38954699eecb --- /dev/null +++ b/graph/incidents_graphml/4/4e5c8fd0-9fb5-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.126 + 100.64.24.126 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703131154 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e5c8fd0-9fb5-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/4e60cfc0-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4e60cfc0-2aec-11ee-9870-89912039a0d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..430eb4a8b8f0a271d09acfb63c70797dd677f2f5 --- /dev/null +++ b/graph/incidents_graphml/4/4e60cfc0-2aec-11ee-9870-89912039a0d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.206 + 100.64.20.206 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690290491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e60cfc0-2aec-11ee-9870-89912039a0d0 + + + diff --git a/graph/incidents_graphml/4/4e65cb20-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4e65cb20-699d-11ee-b92f-dba1102b39ba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..189be7df7407578f16369883ff42b1579986f882 --- /dev/null +++ b/graph/incidents_graphml/4/4e65cb20-699d-11ee-b92f-dba1102b39ba.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.34 + 100.64.18.34 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697183484 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4e65cb20-699d-11ee-b92f-dba1102b39ba + + + diff --git a/graph/incidents_graphml/4/4e68a610-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/4/4e68a610-3cab-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6aa213df443fd446cb927617bb6288b842abdd02 --- /dev/null +++ b/graph/incidents_graphml/4/4e68a610-3cab-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + USER-0015-1979.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.184 + USER-0015-2049.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.46.208 + USER-0015-1982.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1720389192 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e68a610-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389192 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e68a610-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389192 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e68a610-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389192 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e68a610-3cab-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/4/4e695280-d325-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4e695280-d325-11ee-8aee-79d3d013c637.graphml new file mode 100644 index 0000000000000000000000000000000000000000..699304e5cf0f784546b3725623fb5f6ee4fb743e --- /dev/null +++ b/graph/incidents_graphml/4/4e695280-d325-11ee-8aee-79d3d013c637.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.172 + 100.64.42.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708786767 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e695280-d325-11ee-8aee-79d3d013c637 + + + diff --git a/graph/incidents_graphml/4/4e69d640-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4e69d640-9fb5-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3518140de20312eafd5998dab777ab075b1403f2 --- /dev/null +++ b/graph/incidents_graphml/4/4e69d640-9fb5-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.126 + 100.64.24.126 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703131154 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4e69d640-9fb5-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/4e73d370-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4e73d370-394e-11ee-a463-c9469bb75709.graphml new file mode 100644 index 0000000000000000000000000000000000000000..73614422c67403c14b0472ce37ac09269e010ccb --- /dev/null +++ b/graph/incidents_graphml/4/4e73d370-394e-11ee-a463-c9469bb75709.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.61 + 100.64.28.61 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691871898 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4e73d370-394e-11ee-a463-c9469bb75709 + + + diff --git a/graph/incidents_graphml/4/4e74f3a0-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4e74f3a0-62c9-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..618558e617017adac18a793ca6cda1ad4f9fce89 --- /dev/null +++ b/graph/incidents_graphml/4/4e74f3a0-62c9-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.169 + 100.64.57.169 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696432724 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e74f3a0-62c9-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/4/4e76a7d0-0483-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/4/4e76a7d0-0483-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..74b08a9883d5b2fee3c5b53d6493f42bf339bdc4 --- /dev/null +++ b/graph/incidents_graphml/4/4e76a7d0-0483-11ee-9300-094b5588de47.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.123 + 100.64.60.123 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.23.211 + 100.64.23.211 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.83 + 100.64.30.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.124 + 100.64.60.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.7.119 + 100.64.7.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.75 + 100.64.21.75 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.19.5 + 100.64.19.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.125 + 100.64.60.125 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.126 + 100.64.60.126 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.127 + 100.64.60.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.128 + 100.64.60.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.73 + 100.64.29.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.216 + USER-0015-1439.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067249 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e76a7d0-0483-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/4/4e7a7240-2aec-11ee-9870-89912039a0d0.graphml b/graph/incidents_graphml/4/4e7a7240-2aec-11ee-9870-89912039a0d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87255393d927b013ee7659da8f679c94ad01565e --- /dev/null +++ b/graph/incidents_graphml/4/4e7a7240-2aec-11ee-9870-89912039a0d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.206 + 100.64.20.206 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690290491 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4e7a7240-2aec-11ee-9870-89912039a0d0 + + + diff --git a/graph/incidents_graphml/4/4e7c4eb0-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4e7c4eb0-f859-11ec-94e5-2949377000d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..501b8d3ba40234af2e183e38e0b534c87d575e3f --- /dev/null +++ b/graph/incidents_graphml/4/4e7c4eb0-f859-11ec-94e5-2949377000d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.248 + 100.64.72.248 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.73 + USER-0015-1646.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656582299 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7c4eb0-f859-11ec-94e5-2949377000d8 + + + diff --git a/graph/incidents_graphml/4/4e7ce300-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4e7ce300-6fe7-11ee-bec7-efacac475e54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ff6827b8ff3533bc883e495bb8051bd6b43cce2 --- /dev/null +++ b/graph/incidents_graphml/4/4e7ce300-6fe7-11ee-bec7-efacac475e54.graphml @@ -0,0 +1,505 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.29 + 100.64.63.29 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.23 + 100.64.17.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.30 + 100.64.63.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.31 + 100.64.63.31 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.32 + 100.64.63.32 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.33 + 100.64.63.33 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.154 + 100.64.29.154 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.138 + 100.64.38.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.34 + 100.64.63.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.214 + 100.64.48.214 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.35 + 100.64.63.35 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7ce300-6fe7-11ee-bec7-efacac475e54 + + + diff --git a/graph/incidents_graphml/4/4e7e6fb0-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4e7e6fb0-9fb5-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53a1e0fc99fdd6f84c22a896088cfb04f6956c46 --- /dev/null +++ b/graph/incidents_graphml/4/4e7e6fb0-9fb5-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.13 + 100.64.11.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703131155 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e7e6fb0-9fb5-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/4e7e8720-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4e7e8720-32d2-11ee-a4d6-4bc10938c808.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5d3d67fdbd17aef4fccf19b06f747a05bba53e0 --- /dev/null +++ b/graph/incidents_graphml/4/4e7e8720-32d2-11ee-a4d6-4bc10938c808.graphml @@ -0,0 +1,259 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.26 + 100.64.65.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.249 + 100.64.18.249 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.108 + 100.64.53.108 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.106 + 100.64.34.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.221 + 100.64.13.221 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.33 + 100.64.17.33 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.27 + 100.64.65.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691158933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7e8720-32d2-11ee-a4d6-4bc10938c808 + + + INCIDENT_LINK + 1691158933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7e8720-32d2-11ee-a4d6-4bc10938c808 + + + INCIDENT_LINK + 1691158933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7e8720-32d2-11ee-a4d6-4bc10938c808 + + + INCIDENT_LINK + 1691158933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7e8720-32d2-11ee-a4d6-4bc10938c808 + + + INCIDENT_LINK + 1691158933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7e8720-32d2-11ee-a4d6-4bc10938c808 + + + INCIDENT_LINK + 1691158933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7e8720-32d2-11ee-a4d6-4bc10938c808 + + + INCIDENT_LINK + 1691158933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7e8720-32d2-11ee-a4d6-4bc10938c808 + + + INCIDENT_LINK + 1691158933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7e8720-32d2-11ee-a4d6-4bc10938c808 + + + INCIDENT_LINK + 1691158933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7e8720-32d2-11ee-a4d6-4bc10938c808 + + + INCIDENT_LINK + 1691158933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7e8720-32d2-11ee-a4d6-4bc10938c808 + + + INCIDENT_LINK + 1691158933 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e7e8720-32d2-11ee-a4d6-4bc10938c808 + + + diff --git a/graph/incidents_graphml/4/4e81a5e0-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4e81a5e0-f859-11ec-94e5-2949377000d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90de0550a3523cc73eb0623592991029576a7e26 --- /dev/null +++ b/graph/incidents_graphml/4/4e81a5e0-f859-11ec-94e5-2949377000d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.73 + USER-0015-1646.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.248 + 100.64.72.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656582299 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4e81a5e0-f859-11ec-94e5-2949377000d8 + + + diff --git a/graph/incidents_graphml/4/4e837290-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4e837290-62c9-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abe596ae304565b98533565b07c7e80e924c0125 --- /dev/null +++ b/graph/incidents_graphml/4/4e837290-62c9-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.169 + 100.64.57.169 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696432724 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4e837290-62c9-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/4/4e84da30-f859-11ec-94e5-2949377000d8.graphml b/graph/incidents_graphml/4/4e84da30-f859-11ec-94e5-2949377000d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc912a5e00c3653a39b28671a190508348c77587 --- /dev/null +++ b/graph/incidents_graphml/4/4e84da30-f859-11ec-94e5-2949377000d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.249 + 100.64.72.249 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.158 + USER-0015-1647.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656582299 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e84da30-f859-11ec-94e5-2949377000d8 + + + diff --git a/graph/incidents_graphml/4/4e897c20-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4e897c20-efa8-11ec-88e9-cd157aceabd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..332779ac250469543be5def7b862a212a962c8c1 --- /dev/null +++ b/graph/incidents_graphml/4/4e897c20-efa8-11ec-88e9-cd157aceabd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.227 + 100.64.81.227 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655626669 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e897c20-efa8-11ec-88e9-cd157aceabd3 + + + diff --git a/graph/incidents_graphml/4/4e8b8f60-0483-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/4/4e8b8f60-0483-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16170e1ad887b21df686b40e1728e8680ecb54db --- /dev/null +++ b/graph/incidents_graphml/4/4e8b8f60-0483-11ee-9300-094b5588de47.graphml @@ -0,0 +1,847 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.149 + 100.64.3.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.18.143 + 100.64.18.143 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.135 + 100.64.60.135 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.60.127 + 100.64.60.127 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.60.136 + 100.64.60.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.68 + 100.64.21.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.79 + 100.64.14.79 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.91 + 100.64.30.91 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.41 + 100.64.14.41 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.23.211 + 100.64.23.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.167 + 100.64.23.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + INCIDENT_LINK + 1686067250 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e8b8f60-0483-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/4/4e8cc180-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4e8cc180-6fe7-11ee-bec7-efacac475e54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01601cbde04dcdf8eb699fa9d8dc005e5ad0ac58 --- /dev/null +++ b/graph/incidents_graphml/4/4e8cc180-6fe7-11ee-bec7-efacac475e54.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.29 + 100.64.63.29 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e8cc180-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e8cc180-6fe7-11ee-bec7-efacac475e54 + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4e8cc180-6fe7-11ee-bec7-efacac475e54 + + + diff --git a/graph/incidents_graphml/4/4e94f770-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4e94f770-70ae-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..02550326b9eeb68aa645c37f0bdef891b89e1243 --- /dev/null +++ b/graph/incidents_graphml/4/4e94f770-70ae-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.198 + 100.64.57.198 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697960444 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e94f770-70ae-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/4e964f90-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4e964f90-394e-11ee-a463-c9469bb75709.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6286e1d447ca763d7bf4aec0302e8746de1850db --- /dev/null +++ b/graph/incidents_graphml/4/4e964f90-394e-11ee-a463-c9469bb75709.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.187 + USER-0015-1268.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691871898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e964f90-394e-11ee-a463-c9469bb75709 + + + diff --git a/graph/incidents_graphml/4/4e994cf0-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4e994cf0-4e6f-11ee-a8e2-c1e2e4930822.graphml new file mode 100644 index 0000000000000000000000000000000000000000..563bba560134d9382d401e3a0c89a7b634ccad44 --- /dev/null +++ b/graph/incidents_graphml/4/4e994cf0-4e6f-11ee-a8e2-c1e2e4930822.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.64 + 100.64.46.64 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694195046 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e994cf0-4e6f-11ee-a8e2-c1e2e4930822 + + + diff --git a/graph/incidents_graphml/4/4e9a8c00-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/4e9a8c00-6e59-11ee-bd33-e97c9a557859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a6a71b2935e2727bf755576a16238d983f01af4 --- /dev/null +++ b/graph/incidents_graphml/4/4e9a8c00-6e59-11ee-bd33-e97c9a557859.graphml @@ -0,0 +1,437 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.247 + 100.64.19.247 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.105 + 100.64.40.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.106 + 100.64.40.106 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.178 + 100.64.26.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.243 + 100.64.24.243 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.35 + 100.64.25.35 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.107 + 100.64.40.107 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.232 + 100.64.3.232 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.191 + 100.64.9.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.28 + 100.64.30.28 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.108 + USER-0015-1328.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + INCIDENT_LINK + 1697704034 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4e9a8c00-6e59-11ee-bd33-e97c9a557859 + + + diff --git a/graph/incidents_graphml/4/4e9b1960-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4e9b1960-6fe7-11ee-bec7-efacac475e54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b9baf380ea09dacedd3825d64ce13efa0532142 --- /dev/null +++ b/graph/incidents_graphml/4/4e9b1960-6fe7-11ee-bec7-efacac475e54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.170 + 100.64.24.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697874974 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e9b1960-6fe7-11ee-bec7-efacac475e54 + + + diff --git a/graph/incidents_graphml/4/4e9dc350-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4e9dc350-535d-11ee-9d47-d7b7ec818502.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db5ed6b0fe4295e43972d8445962f245cc31220e --- /dev/null +++ b/graph/incidents_graphml/4/4e9dc350-535d-11ee-9d47-d7b7ec818502.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.149 + 100.64.58.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694737071 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4e9dc350-535d-11ee-9d47-d7b7ec818502 + + + diff --git a/graph/incidents_graphml/4/4ea03ff0-32d2-11ee-a4d6-4bc10938c808.graphml b/graph/incidents_graphml/4/4ea03ff0-32d2-11ee-a4d6-4bc10938c808.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f8f77974ce7a5c291a1443baa38e7675b4c3985 --- /dev/null +++ b/graph/incidents_graphml/4/4ea03ff0-32d2-11ee-a4d6-4bc10938c808.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.26 + 100.64.65.26 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691158933 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ea03ff0-32d2-11ee-a4d6-4bc10938c808 + + + diff --git a/graph/incidents_graphml/4/4ea5adc0-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4ea5adc0-becc-11ed-93f3-fff421178c5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25e264085228e1ed4f2773b3351e8820b3462397 --- /dev/null +++ b/graph/incidents_graphml/4/4ea5adc0-becc-11ed-93f3-fff421178c5e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.17.250 + 100.64.17.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678402022 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ea5adc0-becc-11ed-93f3-fff421178c5e + + + diff --git a/graph/incidents_graphml/4/4ea60e70-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4ea60e70-70ae-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec06e59510fd9cbaf27f215528b876a0be8f15bf --- /dev/null +++ b/graph/incidents_graphml/4/4ea60e70-70ae-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.198 + 100.64.57.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697960444 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ea60e70-70ae-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/4ea76460-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4ea76460-efa8-11ec-88e9-cd157aceabd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4ce3c49f7cfade52ad2d4e72709714a4b74d2f9 --- /dev/null +++ b/graph/incidents_graphml/4/4ea76460-efa8-11ec-88e9-cd157aceabd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.228 + 100.64.81.228 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655626669 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ea76460-efa8-11ec-88e9-cd157aceabd3 + + + diff --git a/graph/incidents_graphml/4/4ea78280-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4ea78280-becc-11ed-93f3-fff421178c5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3278803bfb9e516a700bdad83e487d128e029b68 --- /dev/null +++ b/graph/incidents_graphml/4/4ea78280-becc-11ed-93f3-fff421178c5e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.138 + 100.64.94.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678402022 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ea78280-becc-11ed-93f3-fff421178c5e + + + diff --git a/graph/incidents_graphml/4/4eaa1a90-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4eaa1a90-becc-11ed-93f3-fff421178c5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aad86bbf8ccc8f662111c6f1ac7b615d1c10be79 --- /dev/null +++ b/graph/incidents_graphml/4/4eaa1a90-becc-11ed-93f3-fff421178c5e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.94.138 + 100.64.94.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678402022 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4eaa1a90-becc-11ed-93f3-fff421178c5e + + + diff --git a/graph/incidents_graphml/4/4eae3e10-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4eae3e10-535d-11ee-9d47-d7b7ec818502.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ddddc5d881f54fe642c9e6f0483e1faa0ec30cb8 --- /dev/null +++ b/graph/incidents_graphml/4/4eae3e10-535d-11ee-9d47-d7b7ec818502.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.149 + 100.64.58.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694737071 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4eae3e10-535d-11ee-9d47-d7b7ec818502 + + + diff --git a/graph/incidents_graphml/4/4eb11ab0-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4eb11ab0-4e6f-11ee-a8e2-c1e2e4930822.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29f0660607ea94d56d451a953bfeac2d13ab862f --- /dev/null +++ b/graph/incidents_graphml/4/4eb11ab0-4e6f-11ee-a8e2-c1e2e4930822.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.64 + 100.64.46.64 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694195046 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4eb11ab0-4e6f-11ee-a8e2-c1e2e4930822 + + + diff --git a/graph/incidents_graphml/4/4eb77930-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4eb77930-0727-11ee-9050-71ab19a2f61d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cae5ad8144416a731bb5da8d53112470cf6239ae --- /dev/null +++ b/graph/incidents_graphml/4/4eb77930-0727-11ee-9050-71ab19a2f61d.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.183 + 100.64.9.183 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.29 + 100.64.1.29 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.20.211 + 100.64.20.211 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.7 + 100.64.74.7 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.77 + 100.64.72.77 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.29.127 + 100.64.29.127 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.70.255 + 100.64.70.255 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.89 + 100.64.73.89 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.8 + 100.64.74.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.9 + 100.64.74.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.10 + 100.64.74.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.58.79 + 100.64.58.79 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.118 + 100.64.72.118 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.13.250 + 100.64.13.250 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.123 + 100.64.71.123 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.11 + USER-0015-1664.example.internal + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.66.236 + 100.64.66.236 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.12 + 100.64.74.12 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.39.21 + 100.64.39.21 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.190 + 100.64.72.190 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.17.248 + 100.64.17.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eb77930-0727-11ee-9050-71ab19a2f61d + + + diff --git a/graph/incidents_graphml/4/4eb85a00-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4eb85a00-5c8e-11ee-b468-75a223656fa7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82d1c8c6e0fad1b0f9aca65e5147310503c74242 --- /dev/null +++ b/graph/incidents_graphml/4/4eb85a00-5c8e-11ee-b468-75a223656fa7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695747677 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4eb85a00-5c8e-11ee-b468-75a223656fa7 + + + diff --git a/graph/incidents_graphml/4/4ebac130-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4ebac130-535d-11ee-9d47-d7b7ec818502.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ae3022b803d1bb2b9edb06bb07b303b8d6d9f53 --- /dev/null +++ b/graph/incidents_graphml/4/4ebac130-535d-11ee-9d47-d7b7ec818502.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.58 + 100.64.57.58 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694737071 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ebac130-535d-11ee-9d47-d7b7ec818502 + + + diff --git a/graph/incidents_graphml/4/4ebba4b0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/4/4ebba4b0-2ff4-11ee-881d-9b9601b76edb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..368c192f19ff92d41905f997bec2f8e0ff9c23b0 --- /dev/null +++ b/graph/incidents_graphml/4/4ebba4b0-2ff4-11ee-881d-9b9601b76edb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.46 + 100.64.28.46 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690843683 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ebba4b0-2ff4-11ee-881d-9b9601b76edb + + + diff --git a/graph/incidents_graphml/4/4ec0d220-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4ec0d220-4e6f-11ee-a8e2-c1e2e4930822.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ba862f0e96e73e1a078ac0432625081d40b901c --- /dev/null +++ b/graph/incidents_graphml/4/4ec0d220-4e6f-11ee-a8e2-c1e2e4930822.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.9 + 100.64.42.9 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694195046 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ec0d220-4e6f-11ee-a8e2-c1e2e4930822 + + + diff --git a/graph/incidents_graphml/4/4ec33450-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/4ec33450-62c1-11ee-b24d-ffed8a6ae3b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad7b308bd552c5ec3eb75a239003cfb80bfddb1c --- /dev/null +++ b/graph/incidents_graphml/4/4ec33450-62c1-11ee-b24d-ffed8a6ae3b7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.134 + 100.64.19.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696429288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ec33450-62c1-11ee-b24d-ffed8a6ae3b7 + + + diff --git a/graph/incidents_graphml/4/4ec71de0-15ff-11ee-b6c1-6f3fa2e3bf20.graphml b/graph/incidents_graphml/4/4ec71de0-15ff-11ee-b6c1-6f3fa2e3bf20.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b49a1566603b7af5ef54c28b7d7d414e81077674 --- /dev/null +++ b/graph/incidents_graphml/4/4ec71de0-15ff-11ee-b6c1-6f3fa2e3bf20.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.106 + 100.64.69.106 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1687989677 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ec71de0-15ff-11ee-b6c1-6f3fa2e3bf20 + + + INCIDENT_LINK + 1687989677 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ec71de0-15ff-11ee-b6c1-6f3fa2e3bf20 + + + diff --git a/graph/incidents_graphml/4/4eca16d0-0727-11ee-9050-71ab19a2f61d.graphml b/graph/incidents_graphml/4/4eca16d0-0727-11ee-9050-71ab19a2f61d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5421166328d278f93313fe0f6c4425927974021 --- /dev/null +++ b/graph/incidents_graphml/4/4eca16d0-0727-11ee-9050-71ab19a2f61d.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.104 + 100.64.15.104 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.36 + 100.64.1.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.104 + HOST-13483 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686357590 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eca16d0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eca16d0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eca16d0-0727-11ee-9050-71ab19a2f61d + + + INCIDENT_LINK + 1686357590 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4eca16d0-0727-11ee-9050-71ab19a2f61d + + + diff --git a/graph/incidents_graphml/4/4ecac6c0-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4ecac6c0-535d-11ee-9d47-d7b7ec818502.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1de3808102dd65052c957a5c54b3c25cd40f45ac --- /dev/null +++ b/graph/incidents_graphml/4/4ecac6c0-535d-11ee-9d47-d7b7ec818502.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.58 + 100.64.57.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694737071 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ecac6c0-535d-11ee-9d47-d7b7ec818502 + + + diff --git a/graph/incidents_graphml/4/4ecb1900-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4ecb1900-efa8-11ec-88e9-cd157aceabd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a36b0e89e87933ed5c96bc34fbbbc67082bd66c4 --- /dev/null +++ b/graph/incidents_graphml/4/4ecb1900-efa8-11ec-88e9-cd157aceabd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.229 + 100.64.81.229 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655626669 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ecb1900-efa8-11ec-88e9-cd157aceabd3 + + + diff --git a/graph/incidents_graphml/4/4ecec0a0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/4ecec0a0-249e-11ef-8629-fb371c38e19d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1962b183a8ecf85dd284510f230331ad4f06ffe2 --- /dev/null +++ b/graph/incidents_graphml/4/4ecec0a0-249e-11ef-8629-fb371c38e19d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.126 + 100.64.56.126 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717744781 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ecec0a0-249e-11ef-8629-fb371c38e19d + + + diff --git a/graph/incidents_graphml/4/4ed47ef0-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4ed47ef0-9fb5-11ee-b57e-09f55271957e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c0eb7e8c82907106cdb86d615f390a40d3fc7b0 --- /dev/null +++ b/graph/incidents_graphml/4/4ed47ef0-9fb5-11ee-b57e-09f55271957e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.128 + 100.64.24.128 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703131155 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ed47ef0-9fb5-11ee-b57e-09f55271957e + + + diff --git a/graph/incidents_graphml/4/4ed50ea0-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/4ed50ea0-62c1-11ee-b24d-ffed8a6ae3b7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb9607dc1419c71b487b22271d426fd0fdccec46 --- /dev/null +++ b/graph/incidents_graphml/4/4ed50ea0-62c1-11ee-b24d-ffed8a6ae3b7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.134 + 100.64.19.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696429288 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ed50ea0-62c1-11ee-b24d-ffed8a6ae3b7 + + + diff --git a/graph/incidents_graphml/4/4edacc50-535d-11ee-9d47-d7b7ec818502.graphml b/graph/incidents_graphml/4/4edacc50-535d-11ee-9d47-d7b7ec818502.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06a2f17753a9c1630e489733f526bfeabb55daa0 --- /dev/null +++ b/graph/incidents_graphml/4/4edacc50-535d-11ee-9d47-d7b7ec818502.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.123 + 100.64.9.123 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694737071 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4edacc50-535d-11ee-9d47-d7b7ec818502 + + + diff --git a/graph/incidents_graphml/4/4ee13f00-98f8-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/4/4ee13f00-98f8-11ee-8096-1db1b3bdcb7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fc1cf7c2ba7297b66652a703b4c6e64a95d51e9 --- /dev/null +++ b/graph/incidents_graphml/4/4ee13f00-98f8-11ee-8096-1db1b3bdcb7c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.220 + 100.64.69.220 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1702390273 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ee13f00-98f8-11ee-8096-1db1b3bdcb7c + + + INCIDENT_LINK + 1702390273 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ee13f00-98f8-11ee-8096-1db1b3bdcb7c + + + diff --git a/graph/incidents_graphml/4/4ee296c0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/4ee296c0-249e-11ef-8629-fb371c38e19d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c240315a5ba5bc44172adf700742862012ef5646 --- /dev/null +++ b/graph/incidents_graphml/4/4ee296c0-249e-11ef-8629-fb371c38e19d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.114 + 100.64.37.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717744781 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ee296c0-249e-11ef-8629-fb371c38e19d + + + diff --git a/graph/incidents_graphml/4/4ef50f30-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4ef50f30-efa8-11ec-88e9-cd157aceabd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..215bc62ac9f33c48bc9113a5a25395353a9527b9 --- /dev/null +++ b/graph/incidents_graphml/4/4ef50f30-efa8-11ec-88e9-cd157aceabd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.41 + USER-0015-1863.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655626670 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ef50f30-efa8-11ec-88e9-cd157aceabd3 + + + diff --git a/graph/incidents_graphml/4/4ef5d0a0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/4ef5d0a0-249e-11ef-8629-fb371c38e19d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f72271f3868d3c20c7b432509f6f890d7a5d3df1 --- /dev/null +++ b/graph/incidents_graphml/4/4ef5d0a0-249e-11ef-8629-fb371c38e19d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.114 + 100.64.37.114 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1717744782 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4ef5d0a0-249e-11ef-8629-fb371c38e19d + + + diff --git a/graph/incidents_graphml/4/4ef79620-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/4/4ef79620-ed09-11ec-8ab6-b3d858f740e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..daba765bca8d437a5010cbe0c2677a7bff4567fc --- /dev/null +++ b/graph/incidents_graphml/4/4ef79620-ed09-11ec-8ab6-b3d858f740e7.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.192 + 100.64.28.192 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.253 + 100.64.70.253 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655338477 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ef79620-ed09-11ec-8ab6-b3d858f740e7 + + + INCIDENT_LINK + 1655338477 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4ef79620-ed09-11ec-8ab6-b3d858f740e7 + + + diff --git a/graph/incidents_graphml/4/4eff2700-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4eff2700-5c8e-11ee-b468-75a223656fa7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed7e36dc8c499449565b6dfbe449e7e08f4a04b0 --- /dev/null +++ b/graph/incidents_graphml/4/4eff2700-5c8e-11ee-b468-75a223656fa7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.199 + 100.64.56.199 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695747677 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4eff2700-5c8e-11ee-b468-75a223656fa7 + + + diff --git a/graph/incidents_graphml/4/4f05dd50-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/4f05dd50-2270-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..378c0974a333c2f1f87ba9f25e1223e32555ac5b --- /dev/null +++ b/graph/incidents_graphml/4/4f05dd50-2270-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.231 + 100.64.62.231 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1689357625 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f05dd50-2270-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/4/4f07d100-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/4/4f07d100-68ac-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48f93ec5e0ffd525c087e98f56bb67fa76eeb0ef --- /dev/null +++ b/graph/incidents_graphml/4/4f07d100-68ac-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.82 + 100.64.18.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697079976 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f07d100-68ac-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/4/4f0c67c0-efa8-11ec-88e9-cd157aceabd3.graphml b/graph/incidents_graphml/4/4f0c67c0-efa8-11ec-88e9-cd157aceabd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c19a36e8035ceb61e280b5ceca6c91c85296623e --- /dev/null +++ b/graph/incidents_graphml/4/4f0c67c0-efa8-11ec-88e9-cd157aceabd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.231 + USER-0015-1907.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655626670 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f0c67c0-efa8-11ec-88e9-cd157aceabd3 + + + diff --git a/graph/incidents_graphml/4/4f0ede70-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4f0ede70-5c8e-11ee-b468-75a223656fa7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7cf9c5dbb5f8972207a1af120375e7f653c3ccfc --- /dev/null +++ b/graph/incidents_graphml/4/4f0ede70-5c8e-11ee-b468-75a223656fa7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.199 + 100.64.56.199 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695747677 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f0ede70-5c8e-11ee-b468-75a223656fa7 + + + diff --git a/graph/incidents_graphml/4/4f1481b0-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4f1481b0-699d-11ee-b92f-dba1102b39ba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0e510086d53de50aacfa6b8761b673d34dda363 --- /dev/null +++ b/graph/incidents_graphml/4/4f1481b0-699d-11ee-b92f-dba1102b39ba.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.101 + 100.64.18.101 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697183485 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f1481b0-699d-11ee-b92f-dba1102b39ba + + + diff --git a/graph/incidents_graphml/4/4f191a90-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4f191a90-4c1a-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..835f88db10970597a6fc3536dd266c499a56ea8e --- /dev/null +++ b/graph/incidents_graphml/4/4f191a90-4c1a-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.209 + 100.64.23.209 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693938637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f191a90-4c1a-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/4/4f19bcf0-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/4f19bcf0-2f75-11ee-b11e-87149c94e410.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79864a5aac452ef18cfaed9acd5c8ff2590c791c --- /dev/null +++ b/graph/incidents_graphml/4/4f19bcf0-2f75-11ee-b11e-87149c94e410.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.88 + 100.64.42.88 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.189 + 100.64.23.189 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.87 + 100.64.41.87 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.89 + 100.64.42.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.90 + USER-0015-1336.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + INCIDENT_LINK + 1690789138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f19bcf0-2f75-11ee-b11e-87149c94e410 + + + diff --git a/graph/incidents_graphml/4/4f22b280-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4f22b280-699d-11ee-b92f-dba1102b39ba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0026d5796b93a5c6413657682ad0d4cf69a13b4f --- /dev/null +++ b/graph/incidents_graphml/4/4f22b280-699d-11ee-b92f-dba1102b39ba.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.101 + 100.64.18.101 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697183485 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4f22b280-699d-11ee-b92f-dba1102b39ba + + + diff --git a/graph/incidents_graphml/4/4f23e8a0-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4f23e8a0-5fa5-11ee-8f29-f592a54d646c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5164129df921add9536773e12670ae926aedbd50 --- /dev/null +++ b/graph/incidents_graphml/4/4f23e8a0-5fa5-11ee-8f29-f592a54d646c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.3 + 100.64.33.3 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696087409 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f23e8a0-5fa5-11ee-8f29-f592a54d646c + + + diff --git a/graph/incidents_graphml/4/4f279620-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/4f279620-2270-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a59feddeff3fa8c52f7793af42b1012923ef31ac --- /dev/null +++ b/graph/incidents_graphml/4/4f279620-2270-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1967.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.62.231 + 100.64.62.231 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689357625 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f279620-2270-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/4/4f282a40-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/4/4f282a40-68ac-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..944c2665e6771ed148e9d3c5ee87506d70e8ee6c --- /dev/null +++ b/graph/incidents_graphml/4/4f282a40-68ac-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.84 + 100.64.18.84 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697079976 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f282a40-68ac-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/4/4f2ec570-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4f2ec570-4c1a-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dbb6567080ba29197926060194468e6dac6ea66f --- /dev/null +++ b/graph/incidents_graphml/4/4f2ec570-4c1a-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.209 + 100.64.23.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693938637 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f2ec570-4c1a-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/4/4f302000-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4f302000-699d-11ee-b92f-dba1102b39ba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e41a637d68cfc1c442d73c515f211921fd770af --- /dev/null +++ b/graph/incidents_graphml/4/4f302000-699d-11ee-b92f-dba1102b39ba.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697183485 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f302000-699d-11ee-b92f-dba1102b39ba + + + diff --git a/graph/incidents_graphml/4/4f33c720-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4f33c720-5fa5-11ee-8f29-f592a54d646c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce954c9d81604c87119267bb7c1382b7b180de72 --- /dev/null +++ b/graph/incidents_graphml/4/4f33c720-5fa5-11ee-8f29-f592a54d646c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.3 + 100.64.33.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696087409 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f33c720-5fa5-11ee-8f29-f592a54d646c + + + diff --git a/graph/incidents_graphml/4/4f371e60-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/4/4f371e60-68ac-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..463fca9b6f7b097a306aba53ed4615a4f86475f3 --- /dev/null +++ b/graph/incidents_graphml/4/4f371e60-68ac-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.84 + 100.64.18.84 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697079976 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f371e60-68ac-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/4/4f3d09e0-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/4/4f3d09e0-2ade-11ed-961c-99a30b1a3145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4e92d650c8fae9242c129f634cbb131f41001d0 --- /dev/null +++ b/graph/incidents_graphml/4/4f3d09e0-2ade-11ed-961c-99a30b1a3145.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.3 + 100.64.83.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.152 + 100.64.72.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.112 + 100.64.76.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662136981 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4f3d09e0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136981 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4f3d09e0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136981 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4f3d09e0-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662136981 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4f3d09e0-2ade-11ed-961c-99a30b1a3145 + + + diff --git a/graph/incidents_graphml/4/4f3dcf70-ed79-11ed-a662-a9c0e7c292a4.graphml b/graph/incidents_graphml/4/4f3dcf70-ed79-11ed-a662-a9c0e7c292a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..580fe0ea06deadd8399da995874c851ba02eb5c9 --- /dev/null +++ b/graph/incidents_graphml/4/4f3dcf70-ed79-11ed-a662-a9c0e7c292a4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.188 + 100.64.68.188 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1683534079 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4f3dcf70-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534079 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4f3dcf70-ed79-11ed-a662-a9c0e7c292a4 + + + diff --git a/graph/incidents_graphml/4/4f3e29c0-699d-11ee-b92f-dba1102b39ba.graphml b/graph/incidents_graphml/4/4f3e29c0-699d-11ee-b92f-dba1102b39ba.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b08925490f7b470b2aad775d1d089255abc17db3 --- /dev/null +++ b/graph/incidents_graphml/4/4f3e29c0-699d-11ee-b92f-dba1102b39ba.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697183485 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f3e29c0-699d-11ee-b92f-dba1102b39ba + + + diff --git a/graph/incidents_graphml/4/4f40bf70-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4f40bf70-5fa5-11ee-8f29-f592a54d646c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ff6165e9c2ab572deec46c650638be39afcf0d1 --- /dev/null +++ b/graph/incidents_graphml/4/4f40bf70-5fa5-11ee-8f29-f592a54d646c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.5 + 100.64.33.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696087409 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f40bf70-5fa5-11ee-8f29-f592a54d646c + + + diff --git a/graph/incidents_graphml/4/4f43e650-dfa2-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/4/4f43e650-dfa2-11ee-9120-ff7b7094ac3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c25ab6b0895e5ac4a6a3b1a508958754c5b0d879 --- /dev/null +++ b/graph/incidents_graphml/4/4f43e650-dfa2-11ee-9120-ff7b7094ac3d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.41.129 + 100.64.41.129 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710159870 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f43e650-dfa2-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159870 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f43e650-dfa2-11ee-9120-ff7b7094ac3d + + + diff --git a/graph/incidents_graphml/4/4f4e7b10-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/4f4e7b10-5fa5-11ee-8f29-f592a54d646c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91ef8edebc67a10041ce9c9a9800873e1b978410 --- /dev/null +++ b/graph/incidents_graphml/4/4f4e7b10-5fa5-11ee-8f29-f592a54d646c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.5 + 100.64.33.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696087410 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f4e7b10-5fa5-11ee-8f29-f592a54d646c + + + diff --git a/graph/incidents_graphml/4/4f63e030-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4f63e030-70ae-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a79832d9bfa14e4dcd422b3585a34fff01377e4 --- /dev/null +++ b/graph/incidents_graphml/4/4f63e030-70ae-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.189 + 100.64.17.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697960445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f63e030-70ae-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/4f6742e0-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4f6742e0-62c9-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f0eb6e9a1c5269719b6a4752671c2af7b2f198d --- /dev/null +++ b/graph/incidents_graphml/4/4f6742e0-62c9-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696432725 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f6742e0-62c9-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/4/4f69fc20-6183-11ee-a390-cde4d9cd4c71.graphml b/graph/incidents_graphml/4/4f69fc20-6183-11ee-a390-cde4d9cd4c71.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3346a15be2dcee140e2488998cded99006313517 --- /dev/null +++ b/graph/incidents_graphml/4/4f69fc20-6183-11ee-a390-cde4d9cd4c71.graphml @@ -0,0 +1,141 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.134 + 100.64.54.134 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.11.42 + 100.64.11.42 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1696292709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 4f69fc20-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 4f69fc20-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 4f69fc20-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 4f69fc20-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 4f69fc20-6183-11ee-a390-cde4d9cd4c71 + + + diff --git a/graph/incidents_graphml/4/4f6f2720-98f8-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/4/4f6f2720-98f8-11ee-8096-1db1b3bdcb7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4627c8533dd90be27054fa5502beed5d0ef863b --- /dev/null +++ b/graph/incidents_graphml/4/4f6f2720-98f8-11ee-8096-1db1b3bdcb7c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.15 + 100.64.55.15 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1702390274 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f6f2720-98f8-11ee-8096-1db1b3bdcb7c + + + INCIDENT_LINK + 1702390274 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f6f2720-98f8-11ee-8096-1db1b3bdcb7c + + + diff --git a/graph/incidents_graphml/4/4f7406d0-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/4/4f7406d0-5133-11ee-b458-8f76bdd93836.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78625a7d63cfa3496205830d2fb30a9d0de0a0fd --- /dev/null +++ b/graph/incidents_graphml/4/4f7406d0-5133-11ee-b458-8f76bdd93836.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.156 + 100.64.49.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694499131 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f7406d0-5133-11ee-b458-8f76bdd93836 + + + diff --git a/graph/incidents_graphml/4/4f7a2750-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4f7a2750-70ae-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13b45dbad71ff1a200f86ac1bedfa0922e5ae8bc --- /dev/null +++ b/graph/incidents_graphml/4/4f7a2750-70ae-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.189 + 100.64.17.189 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697960445 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f7a2750-70ae-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/4f7ab270-10f0-11ed-9f22-2fed65d2efbb.graphml b/graph/incidents_graphml/4/4f7ab270-10f0-11ed-9f22-2fed65d2efbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01e8324774a125e10049570f140e6144909b7f54 --- /dev/null +++ b/graph/incidents_graphml/4/4f7ab270-10f0-11ed-9f22-2fed65d2efbb.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.175 + 100.64.81.175 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.172 + 100.64.1.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.176 + 100.64.81.176 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659285983 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4f7ab270-10f0-11ed-9f22-2fed65d2efbb + + + INCIDENT_LINK + 1659285983 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4f7ab270-10f0-11ed-9f22-2fed65d2efbb + + + INCIDENT_LINK + 1659285983 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4f7ab270-10f0-11ed-9f22-2fed65d2efbb + + + INCIDENT_LINK + 1659285983 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4f7ab270-10f0-11ed-9f22-2fed65d2efbb + + + diff --git a/graph/incidents_graphml/4/4f860830-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/4/4f860830-5133-11ee-b458-8f76bdd93836.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30a36d9a2256864417db280439bd52c728a8ba8a --- /dev/null +++ b/graph/incidents_graphml/4/4f860830-5133-11ee-b458-8f76bdd93836.graphml @@ -0,0 +1,561 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.91 + 100.64.66.91 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.92 + 100.64.66.92 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.93 + 100.64.66.93 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.94 + 100.64.66.94 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.158 + 100.64.11.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.106 + 100.64.34.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.95 + 100.64.66.95 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.9 + 100.64.53.9 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.114 + USER-0015-1204.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.202 + 100.64.8.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.131 + 100.64.7.131 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.96 + 100.64.66.96 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f860830-5133-11ee-b458-8f76bdd93836 + + + diff --git a/graph/incidents_graphml/4/4f885820-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4f885820-70ae-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae325915a852e24e1aa637a7e4d1a9d3deb50ab1 --- /dev/null +++ b/graph/incidents_graphml/4/4f885820-70ae-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.200 + 100.64.57.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697960445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f885820-70ae-11ee-89bb-13047ce19953 + + + INCIDENT_LINK + 1697960445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f885820-70ae-11ee-89bb-13047ce19953 + + + INCIDENT_LINK + 1697960445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f885820-70ae-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/4f8ab580-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4f8ab580-1ed2-11ee-b536-839ca7748106.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d984a6d0ff7c085e98463195d69d6fb5cb05321b --- /dev/null +++ b/graph/incidents_graphml/4/4f8ab580-1ed2-11ee-b536-839ca7748106.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.140 + 100.64.26.140 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688959912 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4f8ab580-1ed2-11ee-b536-839ca7748106 + + + diff --git a/graph/incidents_graphml/4/4f94bd10-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/4f94bd10-40ff-11ee-b8c2-77c1ecbb2825.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0d1cc47eacfd1e39ac19a0063a8b7690a63a685 --- /dev/null +++ b/graph/incidents_graphml/4/4f94bd10-40ff-11ee-b8c2-77c1ecbb2825.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.203 + 100.64.7.203 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692717579 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f94bd10-40ff-11ee-b8c2-77c1ecbb2825 + + + diff --git a/graph/incidents_graphml/4/4f954a70-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/4/4f954a70-5133-11ee-b458-8f76bdd93836.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ab414be9e4021b8476a27ae7cfdfa3641832640 --- /dev/null +++ b/graph/incidents_graphml/4/4f954a70-5133-11ee-b458-8f76bdd93836.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.230 + 100.64.9.230 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694499131 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f954a70-5133-11ee-b458-8f76bdd93836 + + + diff --git a/graph/incidents_graphml/4/4f9613c0-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4f9613c0-70ae-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8834d87d308e462cbb959ba8276eb3062a835852 --- /dev/null +++ b/graph/incidents_graphml/4/4f9613c0-70ae-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.200 + 100.64.57.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697960445 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4f9613c0-70ae-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/4f9708e0-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/4/4f9708e0-140e-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf65987a8b3e8d16d517518ee678d6c89df398c5 --- /dev/null +++ b/graph/incidents_graphml/4/4f9708e0-140e-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.19 + 100.64.29.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.82 + 100.64.71.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.250 + 100.64.73.250 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687776219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f9708e0-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f9708e0-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f9708e0-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f9708e0-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f9708e0-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4f9708e0-140e-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/4/4f9ecf30-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/4f9ecf30-40ff-11ee-b8c2-77c1ecbb2825.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d253be2c04bdabf29c3215f7828f1afe29d60f03 --- /dev/null +++ b/graph/incidents_graphml/4/4f9ecf30-40ff-11ee-b8c2-77c1ecbb2825.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.7.203 + 100.64.7.203 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692717579 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4f9ecf30-40ff-11ee-b8c2-77c1ecbb2825 + + + diff --git a/graph/incidents_graphml/4/4fa28340-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4fa28340-1ed2-11ee-b536-839ca7748106.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d883867db9ad192571efcdaa03b903f48338e80 --- /dev/null +++ b/graph/incidents_graphml/4/4fa28340-1ed2-11ee-b536-839ca7748106.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.140 + 100.64.26.140 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688959912 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4fa28340-1ed2-11ee-b536-839ca7748106 + + + diff --git a/graph/incidents_graphml/4/4fa3f070-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/4/4fa3f070-5133-11ee-b458-8f76bdd93836.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11914c3faaba81c3fcb28493a6f87750e943c52e --- /dev/null +++ b/graph/incidents_graphml/4/4fa3f070-5133-11ee-b458-8f76bdd93836.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.230 + 100.64.9.230 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694499131 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4fa3f070-5133-11ee-b458-8f76bdd93836 + + + diff --git a/graph/incidents_graphml/4/4fa507e0-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4fa507e0-70ae-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8679bcf3c78313ba78ae0258c161034a0ce00d6b --- /dev/null +++ b/graph/incidents_graphml/4/4fa507e0-70ae-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.189 + 100.64.16.189 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697960445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4fa507e0-70ae-11ee-89bb-13047ce19953 + + + INCIDENT_LINK + 1697960445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4fa507e0-70ae-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/4fa66e30-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/4/4fa66e30-0fb1-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb0ab9f3feacb8d885d2645c4abe133a5a59a072 --- /dev/null +++ b/graph/incidents_graphml/4/4fa66e30-0fb1-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.162 + 100.64.42.162 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715443969 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4fa66e30-0fb1-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/4/4fa8f810-394e-11ee-a463-c9469bb75709.graphml b/graph/incidents_graphml/4/4fa8f810-394e-11ee-a463-c9469bb75709.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06fba4809f706ff24539485dd5860eab9a657756 --- /dev/null +++ b/graph/incidents_graphml/4/4fa8f810-394e-11ee-a463-c9469bb75709.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.63 + 100.64.28.63 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691871900 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4fa8f810-394e-11ee-a463-c9469bb75709 + + + diff --git a/graph/incidents_graphml/4/4fb70940-70ae-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4fb70940-70ae-11ee-89bb-13047ce19953.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30a45cbb600c70d723078291b7d6863e5d608b78 --- /dev/null +++ b/graph/incidents_graphml/4/4fb70940-70ae-11ee-89bb-13047ce19953.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.189 + 100.64.16.189 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697960446 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4fb70940-70ae-11ee-89bb-13047ce19953 + + + diff --git a/graph/incidents_graphml/4/4fb87890-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4fb87890-4e6f-11ee-a8e2-c1e2e4930822.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ef5265518e3277dfec3cfed38da89d4f21b5d50 --- /dev/null +++ b/graph/incidents_graphml/4/4fb87890-4e6f-11ee-a8e2-c1e2e4930822.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.4 + 100.64.8.4 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694195048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4fb87890-4e6f-11ee-a8e2-c1e2e4930822 + + + INCIDENT_LINK + 1694195048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4fb87890-4e6f-11ee-a8e2-c1e2e4930822 + + + diff --git a/graph/incidents_graphml/4/4fbfcf40-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4fbfcf40-1ed2-11ee-b536-839ca7748106.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b50ca9e29d36ebac8d33586705a2a97393a5bf4f --- /dev/null +++ b/graph/incidents_graphml/4/4fbfcf40-1ed2-11ee-b536-839ca7748106.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.53 + 100.64.44.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688959912 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4fbfcf40-1ed2-11ee-b536-839ca7748106 + + + diff --git a/graph/incidents_graphml/4/4fc204c0-4c1a-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/4/4fc204c0-4c1a-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a87e61a0fb0fc4cbf7cb0d4f58ee6f34de3c761e --- /dev/null +++ b/graph/incidents_graphml/4/4fc204c0-4c1a-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.211 + 100.64.23.211 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693938638 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4fc204c0-4c1a-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/4/4fd87000-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4fd87000-5c8e-11ee-b468-75a223656fa7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a9ef9b273ae8adbb44dc386ddcc448dd8e64f48 --- /dev/null +++ b/graph/incidents_graphml/4/4fd87000-5c8e-11ee-b468-75a223656fa7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.200 + 100.64.56.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695747679 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4fd87000-5c8e-11ee-b468-75a223656fa7 + + + diff --git a/graph/incidents_graphml/4/4fd93040-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/4/4fd93040-f9b3-11ee-9419-336c262dcd55.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa990fd0aa584384c1cf16367bebf4df5617b76a --- /dev/null +++ b/graph/incidents_graphml/4/4fd93040-f9b3-11ee-9419-336c262dcd55.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.4 + 100.64.10.4 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713025902 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4fd93040-f9b3-11ee-9419-336c262dcd55 + + + diff --git a/graph/incidents_graphml/4/4fd9cd30-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/4/4fd9cd30-0c22-11ef-9a57-bba1bbebb052.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4eabc8f27b2a817b1ef6a29dc6e97fd0f118282 --- /dev/null +++ b/graph/incidents_graphml/4/4fd9cd30-0c22-11ef-9a57-bba1bbebb052.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.225 + 100.64.14.225 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715052698 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4fd9cd30-0c22-11ef-9a57-bba1bbebb052 + + + diff --git a/graph/incidents_graphml/4/4fe1af20-1ed2-11ee-b536-839ca7748106.graphml b/graph/incidents_graphml/4/4fe1af20-1ed2-11ee-b536-839ca7748106.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66563efccddbe8c86ba90f93f97e67a08033bf49 --- /dev/null +++ b/graph/incidents_graphml/4/4fe1af20-1ed2-11ee-b536-839ca7748106.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.53 + 100.64.44.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688959912 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4fe1af20-1ed2-11ee-b536-839ca7748106 + + + diff --git a/graph/incidents_graphml/4/4fe2e560-1aa5-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/4/4fe2e560-1aa5-11ee-ae54-3b636b49055b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8405b5fc71d530ec55e5e9d33120eddc14f45d8 --- /dev/null +++ b/graph/incidents_graphml/4/4fe2e560-1aa5-11ee-ae54-3b636b49055b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.7.183 + 172.18.7.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.176 + 100.64.89.176 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688500780 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4fe2e560-1aa5-11ee-ae54-3b636b49055b + + + INCIDENT_LINK + 1688500780 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 4fe2e560-1aa5-11ee-ae54-3b636b49055b + + + diff --git a/graph/incidents_graphml/4/4fe94c90-4e6f-11ee-a8e2-c1e2e4930822.graphml b/graph/incidents_graphml/4/4fe94c90-4e6f-11ee-a8e2-c1e2e4930822.graphml new file mode 100644 index 0000000000000000000000000000000000000000..186fd365359d6287e1f8e9d19be6c3f239f27897 --- /dev/null +++ b/graph/incidents_graphml/4/4fe94c90-4e6f-11ee-a8e2-c1e2e4930822.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.4 + 100.64.8.4 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694195048 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4fe94c90-4e6f-11ee-a8e2-c1e2e4930822 + + + diff --git a/graph/incidents_graphml/4/4febce90-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/4/4febce90-0c22-11ef-9a57-bba1bbebb052.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00a4dd3932a2266b2fb6907b33876b4bd94abb6c --- /dev/null +++ b/graph/incidents_graphml/4/4febce90-0c22-11ef-9a57-bba1bbebb052.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.225 + 100.64.14.225 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715052698 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4febce90-0c22-11ef-9a57-bba1bbebb052 + + + diff --git a/graph/incidents_graphml/4/4febdc30-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4febdc30-62c9-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f0494a62896bf510e2e405ad59b0f57f790f550 --- /dev/null +++ b/graph/incidents_graphml/4/4febdc30-62c9-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,461 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.171 + 100.64.57.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.172 + 100.64.57.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.200 + 100.64.54.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.173 + 100.64.57.173 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.174 + 100.64.13.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.50 + 100.64.24.50 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.174 + 100.64.57.174 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.24 + 100.64.46.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.249 + 100.64.13.249 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.175 + 100.64.57.175 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.176 + 100.64.57.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4febdc30-62c9-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/4/4fefefa0-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/4/4fefefa0-5c8e-11ee-b468-75a223656fa7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce275ddb2a4a9a4c0a17c4ac597a3e7386424d31 --- /dev/null +++ b/graph/incidents_graphml/4/4fefefa0-5c8e-11ee-b468-75a223656fa7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.200 + 100.64.56.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695747679 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 4fefefa0-5c8e-11ee-b468-75a223656fa7 + + + diff --git a/graph/incidents_graphml/4/4ff60710-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/4/4ff60710-f9b3-11ee-9419-336c262dcd55.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09f0083d7a42a6213946432163c8d85907303a11 --- /dev/null +++ b/graph/incidents_graphml/4/4ff60710-f9b3-11ee-9419-336c262dcd55.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.194 + 100.64.41.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713025903 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ff60710-f9b3-11ee-9419-336c262dcd55 + + + diff --git a/graph/incidents_graphml/4/4ffb1e70-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4ffb1e70-62c9-11ee-a98e-093b6593236c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eea1994d6415f18b8d71a02fc6ec5f9ad0bdecc8 --- /dev/null +++ b/graph/incidents_graphml/4/4ffb1e70-62c9-11ee-a98e-093b6593236c.graphml @@ -0,0 +1,215 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.171 + 100.64.57.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.89 + 100.64.44.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.182 + 100.64.57.182 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.188 + 100.64.18.188 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.183 + 100.64.57.183 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ffb1e70-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ffb1e70-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ffb1e70-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ffb1e70-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ffb1e70-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ffb1e70-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ffb1e70-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ffb1e70-62c9-11ee-a98e-093b6593236c + + + INCIDENT_LINK + 1696432726 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 4ffb1e70-62c9-11ee-a98e-093b6593236c + + + diff --git a/graph/incidents_graphml/4/4ffb8600-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/4/4ffb8600-0c22-11ef-9a57-bba1bbebb052.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68dc57c376749d927e86ffde83ce8f9c79ce015d --- /dev/null +++ b/graph/incidents_graphml/4/4ffb8600-0c22-11ef-9a57-bba1bbebb052.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.112 + 100.64.36.112 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715052698 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 4ffb8600-0c22-11ef-9a57-bba1bbebb052 + + + diff --git a/graph/incidents_graphml/5/5007a010-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5007a010-2227-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8dcd6a2dbe66abc1b282bd35d8ad5aca3be38abf --- /dev/null +++ b/graph/incidents_graphml/5/5007a010-2227-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.65 + 100.64.21.65 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689326273 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5007a010-2227-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/500cc410-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/500cc410-0c22-11ef-9a57-bba1bbebb052.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4fa75e6f4957a18a1a046461d7b4b98f30c89dac --- /dev/null +++ b/graph/incidents_graphml/5/500cc410-0c22-11ef-9a57-bba1bbebb052.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.112 + 100.64.36.112 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1715052698 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 500cc410-0c22-11ef-9a57-bba1bbebb052 + + + diff --git a/graph/incidents_graphml/5/501d8cf0-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/501d8cf0-0c22-11ef-9a57-bba1bbebb052.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e54dfb57e83c12ba527406f776c1a943a492582 --- /dev/null +++ b/graph/incidents_graphml/5/501d8cf0-0c22-11ef-9a57-bba1bbebb052.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.181 + 100.64.26.181 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715052698 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 501d8cf0-0c22-11ef-9a57-bba1bbebb052 + + + diff --git a/graph/incidents_graphml/5/501e2d70-93b6-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/5/501e2d70-93b6-11ee-ad07-e3190f846a2a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56832b6eb1027ffb21d5b66800e76a0a47d48cf3 --- /dev/null +++ b/graph/incidents_graphml/5/501e2d70-93b6-11ee-ad07-e3190f846a2a.graphml @@ -0,0 +1,97 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.20 + 100.64.68.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.14.84 + 100.64.14.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + INCIDENT_LINK + 1701812173 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 501e2d70-93b6-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812173 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 501e2d70-93b6-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812173 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 501e2d70-93b6-11ee-ad07-e3190f846a2a + + + diff --git a/graph/incidents_graphml/5/5023ef60-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/5/5023ef60-68ac-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2ae177564da5fb3f93015d2442710de93fad8ec --- /dev/null +++ b/graph/incidents_graphml/5/5023ef60-68ac-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.56 + 100.64.18.56 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697079978 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5023ef60-68ac-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/5/502fdc70-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/502fdc70-0c22-11ef-9a57-bba1bbebb052.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4cc8ed7e10998658f8225431cbb8b08a88536d3 --- /dev/null +++ b/graph/incidents_graphml/5/502fdc70-0c22-11ef-9a57-bba1bbebb052.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.181 + 100.64.26.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715052698 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 502fdc70-0c22-11ef-9a57-bba1bbebb052 + + + diff --git a/graph/incidents_graphml/5/503df250-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/503df250-2227-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7c38f668e948f962a9a7a86d0120681b3a50e76 --- /dev/null +++ b/graph/incidents_graphml/5/503df250-2227-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689326274 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 503df250-2227-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/5043c180-1394-11ef-9295-05a4a3befc7c.graphml b/graph/incidents_graphml/5/5043c180-1394-11ef-9295-05a4a3befc7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f1c35d4660ca04efe5fa74a5973182af326cd9f --- /dev/null +++ b/graph/incidents_graphml/5/5043c180-1394-11ef-9295-05a4a3befc7c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.221 + 100.64.56.221 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1715871319 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5043c180-1394-11ef-9295-05a4a3befc7c + + + diff --git a/graph/incidents_graphml/5/5048e300-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/5048e300-5133-11ee-b458-8f76bdd93836.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1bef0bebad05d42c372420eecbe56e965520a19 --- /dev/null +++ b/graph/incidents_graphml/5/5048e300-5133-11ee-b458-8f76bdd93836.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.243 + 100.64.13.243 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694499132 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5048e300-5133-11ee-b458-8f76bdd93836 + + + diff --git a/graph/incidents_graphml/5/505b3280-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/505b3280-5133-11ee-b458-8f76bdd93836.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0391f0095742adb3a39e3da4e9f94af0fe08473d --- /dev/null +++ b/graph/incidents_graphml/5/505b3280-5133-11ee-b458-8f76bdd93836.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.97 + 100.64.59.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694499132 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 505b3280-5133-11ee-b458-8f76bdd93836 + + + diff --git a/graph/incidents_graphml/5/5061a6f0-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5061a6f0-2227-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8635e4c389df9e0a78bcf0e8c4eb84ef034a8d0d --- /dev/null +++ b/graph/incidents_graphml/5/5061a6f0-2227-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689326274 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5061a6f0-2227-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/5067a350-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/5/5067a350-535c-11ee-aeed-cffe9ef9c7cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a6e086f834d66e326702baf84a0a2a5bc2619ec --- /dev/null +++ b/graph/incidents_graphml/5/5067a350-535c-11ee-aeed-cffe9ef9c7cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.122 + 100.64.15.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1694736644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5067a350-535c-11ee-aeed-cffe9ef9c7cb + + + diff --git a/graph/incidents_graphml/5/506ab090-535c-11ee-aeed-cffe9ef9c7cb.graphml b/graph/incidents_graphml/5/506ab090-535c-11ee-aeed-cffe9ef9c7cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60ee64735d40fa304888d811c6c0213ed191e7c2 --- /dev/null +++ b/graph/incidents_graphml/5/506ab090-535c-11ee-aeed-cffe9ef9c7cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.15.122 + 100.64.15.122 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1694736644 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 506ab090-535c-11ee-aeed-cffe9ef9c7cb + + + diff --git a/graph/incidents_graphml/5/507be6a0-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/507be6a0-0fb1-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abe713de09bf33aa02ca917da2d5d41380b47ef3 --- /dev/null +++ b/graph/incidents_graphml/5/507be6a0-0fb1-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.164 + 100.64.42.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715443970 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 507be6a0-0fb1-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/5/507e9b10-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/5/507e9b10-5c8e-11ee-b468-75a223656fa7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b435185ce0d1b5b68e5a8541fa77f859b5480d6 --- /dev/null +++ b/graph/incidents_graphml/5/507e9b10-5c8e-11ee-b468-75a223656fa7.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695747680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 507e9b10-5c8e-11ee-b468-75a223656fa7 + + + INCIDENT_LINK + 1695747680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 507e9b10-5c8e-11ee-b468-75a223656fa7 + + + INCIDENT_LINK + 1695747680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 507e9b10-5c8e-11ee-b468-75a223656fa7 + + + diff --git a/graph/incidents_graphml/5/508caf80-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/508caf80-0fb1-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ecd67b5e60466f9a80f0cbc557d4190fc0f60344 --- /dev/null +++ b/graph/incidents_graphml/5/508caf80-0fb1-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.164 + 100.64.42.164 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715443970 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 508caf80-0fb1-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/5/509186d0-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/5/509186d0-5c8e-11ee-b468-75a223656fa7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..277571fc3e3ba2e8cc0f89654c4dcd5f02bce5de --- /dev/null +++ b/graph/incidents_graphml/5/509186d0-5c8e-11ee-b468-75a223656fa7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695747680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 509186d0-5c8e-11ee-b468-75a223656fa7 + + + diff --git a/graph/incidents_graphml/5/50932d30-9183-11ee-afab-0bead911b18a.graphml b/graph/incidents_graphml/5/50932d30-9183-11ee-afab-0bead911b18a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fca359ee9d63075a9bcbc70436667dd9d94c2d81 --- /dev/null +++ b/graph/incidents_graphml/5/50932d30-9183-11ee-afab-0bead911b18a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.18 + 100.64.49.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701570367 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 50932d30-9183-11ee-afab-0bead911b18a + + + diff --git a/graph/incidents_graphml/5/509512d0-3d36-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/5/509512d0-3d36-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab391a252762f40712db0ee7f1a5c16dc120c431 --- /dev/null +++ b/graph/incidents_graphml/5/509512d0-3d36-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.28.63.204 + USER-0015-2061.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.87.3 + 100.64.87.3 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.1.77 + 100.64.1.77 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720448896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 509512d0-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 509512d0-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 509512d0-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720448896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 509512d0-3d36-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/5/509ba800-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/5/509ba800-2f33-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5590b127b5840cb8e2d6679c9c6ffca0c2f2844 --- /dev/null +++ b/graph/incidents_graphml/5/509ba800-2f33-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.188 + 100.64.25.188 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.82 + 100.64.73.82 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.52 + 100.64.82.52 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690760793 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 509ba800-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760793 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 509ba800-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760793 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 509ba800-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760793 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 509ba800-2f33-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/5/50a3d650-5c8e-11ee-b468-75a223656fa7.graphml b/graph/incidents_graphml/5/50a3d650-5c8e-11ee-b468-75a223656fa7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bdb2d3bf5bc35a23cbe848c9553e4b4ebb74bbae --- /dev/null +++ b/graph/incidents_graphml/5/50a3d650-5c8e-11ee-b468-75a223656fa7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.133 + 100.64.13.133 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695747680 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 50a3d650-5c8e-11ee-b468-75a223656fa7 + + + diff --git a/graph/incidents_graphml/5/50a4ac60-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/5/50a4ac60-2435-11ee-bc29-cfb067a56058.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9532b0dc6049288db88e43c1029b97b4f9b12727 --- /dev/null +++ b/graph/incidents_graphml/5/50a4ac60-2435-11ee-bc29-cfb067a56058.graphml @@ -0,0 +1,459 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.217 + 100.64.20.217 + ["Exploiting Host"] + 0.6203125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.11.113 + 100.64.11.113 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.93 + 100.64.69.93 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.94 + 100.64.69.94 + ["Exploiting Host","Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552190 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50a4ac60-2435-11ee-bc29-cfb067a56058 + + + diff --git a/graph/incidents_graphml/5/50acb6d0-121a-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/5/50acb6d0-121a-11ee-a890-99c329874409.graphml new file mode 100644 index 0000000000000000000000000000000000000000..761bea12b6b1d2f8da332fe4887192c81b7c5431 --- /dev/null +++ b/graph/incidents_graphml/5/50acb6d0-121a-11ee-a890-99c329874409.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.22 + 100.64.20.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687561472 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 50acb6d0-121a-11ee-a890-99c329874409 + + + diff --git a/graph/incidents_graphml/5/50b35f30-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/50b35f30-6a4e-11ee-a1cb-53f21743b64f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c0490c2399e89bb20885d3c4916b67da78d85f9 --- /dev/null +++ b/graph/incidents_graphml/5/50b35f30-6a4e-11ee-a1cb-53f21743b64f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.41 + 100.64.58.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697259508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 50b35f30-6a4e-11ee-a1cb-53f21743b64f + + + diff --git a/graph/incidents_graphml/5/50c20530-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/50c20530-6a4e-11ee-a1cb-53f21743b64f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59de2f7768619c42a9c7c36c80bdb7732d17884f --- /dev/null +++ b/graph/incidents_graphml/5/50c20530-6a4e-11ee-a1cb-53f21743b64f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.15 + 100.64.62.15 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697259509 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 50c20530-6a4e-11ee-a1cb-53f21743b64f + + + diff --git a/graph/incidents_graphml/5/50cb8170-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/50cb8170-063d-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e5990f8dfb03111488f0d99b5e466556c3587fa --- /dev/null +++ b/graph/incidents_graphml/5/50cb8170-063d-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.34 + 100.64.37.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686257091 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 50cb8170-063d-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/5/50d03600-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/50d03600-6a4e-11ee-a1cb-53f21743b64f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c7520d39264de5e1443c8ba1a7a5c5adcee3c5b --- /dev/null +++ b/graph/incidents_graphml/5/50d03600-6a4e-11ee-a1cb-53f21743b64f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.15 + 100.64.62.15 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697259509 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 50d03600-6a4e-11ee-a1cb-53f21743b64f + + + diff --git a/graph/incidents_graphml/5/50d48a20-121a-11ee-a890-99c329874409.graphml b/graph/incidents_graphml/5/50d48a20-121a-11ee-a890-99c329874409.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28ccbf6bd96c99e49811cdb44993b217a8dbf9fd --- /dev/null +++ b/graph/incidents_graphml/5/50d48a20-121a-11ee-a890-99c329874409.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.74 + USER-0015-1252.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687561473 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50d48a20-121a-11ee-a890-99c329874409 + + + diff --git a/graph/incidents_graphml/5/50dee890-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/50dee890-20a2-11ed-ab44-599bbcff3eda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6cec14ed7e93f8feefb829c0fb795d097b17be69 --- /dev/null +++ b/graph/incidents_graphml/5/50dee890-20a2-11ed-ab44-599bbcff3eda.graphml @@ -0,0 +1,725 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.73 + 100.64.38.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.58 + 100.64.72.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.83 + 100.64.79.83 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.29 + 100.64.71.29 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.79.84 + 100.64.79.84 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.79.85 + 100.64.79.85 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.79.86 + 100.64.79.86 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.79.87 + 100.64.79.87 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.79.88 + 100.64.79.88 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.36 + USER-0015-1668.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.89 + 100.64.79.89 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.79.90 + 100.64.79.90 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.79.91 + 100.64.79.91 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.79.92 + USER-0015-1811.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.48.120 + 100.64.48.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.93 + 100.64.79.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.94 + 100.64.79.94 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.95 + USER-0015-1812.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.31.220 + 100.64.31.220 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011703 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50dee890-20a2-11ed-ab44-599bbcff3eda + + + diff --git a/graph/incidents_graphml/5/50e15360-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/50e15360-063d-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b265c921ca5290318563d5eab7b58bf9854115c0 --- /dev/null +++ b/graph/incidents_graphml/5/50e15360-063d-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.34 + 100.64.37.34 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686257091 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 50e15360-063d-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/5/50e9b320-2957-11ed-833a-955cfd42297d.graphml b/graph/incidents_graphml/5/50e9b320-2957-11ed-833a-955cfd42297d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69bc726b4b362f4fea8218337376181c8b72b4b1 --- /dev/null +++ b/graph/incidents_graphml/5/50e9b320-2957-11ed-833a-955cfd42297d.graphml @@ -0,0 +1,509 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.74.165 + 172.21.74.165 + ["Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.88.129 + 100.64.88.129 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.130 + 100.64.88.130 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.131 + 100.64.88.131 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.132 + 100.64.88.132 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.91 + 100.64.2.91 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.72 + 100.64.2.72 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.242 + 100.64.87.242 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.133 + 100.64.88.133 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.134 + 100.64.88.134 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.242.39 + 172.24.242.39 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.88.135 + 100.64.88.135 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.136 + 100.64.88.136 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.137 + 100.64.88.137 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + INCIDENT_LINK + 1661969051 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50e9b320-2957-11ed-833a-955cfd42297d + + + diff --git a/graph/incidents_graphml/5/50f7b600-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/5/50f7b600-2122-11ee-9a61-05dd24aa353e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a3c0c4375b71bcc8c8abab36424968656f2f135 --- /dev/null +++ b/graph/incidents_graphml/5/50f7b600-2122-11ee-9a61-05dd24aa353e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.248 + 100.64.24.248 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1689214176 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50f7b600-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214176 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50f7b600-2122-11ee-9a61-05dd24aa353e + + + diff --git a/graph/incidents_graphml/5/50f8c770-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/5/50f8c770-2122-11ee-9a61-05dd24aa353e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6668987ec848bedab0fed4b2626caa6267f8f52f --- /dev/null +++ b/graph/incidents_graphml/5/50f8c770-2122-11ee-9a61-05dd24aa353e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.39 + 100.64.54.39 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.124 + 100.64.69.124 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1689214176 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50f8c770-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214176 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50f8c770-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214176 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50f8c770-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214176 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 50f8c770-2122-11ee-9a61-05dd24aa353e + + + diff --git a/graph/incidents_graphml/5/510accf0-68ac-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/5/510accf0-68ac-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..699f45d3bdad3b6e0f6a2147e0e899cb7e795d63 --- /dev/null +++ b/graph/incidents_graphml/5/510accf0-68ac-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.86 + 100.64.18.86 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697079979 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 510accf0-68ac-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/5/51122670-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/51122670-5133-11ee-b458-8f76bdd93836.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63fdae262f033baededa61aefaed4407be628606 --- /dev/null +++ b/graph/incidents_graphml/5/51122670-5133-11ee-b458-8f76bdd93836.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.103 + 100.64.66.103 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694499134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 51122670-5133-11ee-b458-8f76bdd93836 + + + diff --git a/graph/incidents_graphml/5/5113d320-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/5/5113d320-f9b3-11ee-9419-336c262dcd55.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4babc9bffa1c9554602858230024707460e21da0 --- /dev/null +++ b/graph/incidents_graphml/5/5113d320-f9b3-11ee-9419-336c262dcd55.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.196 + 100.64.41.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713025905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5113d320-f9b3-11ee-9419-336c262dcd55 + + + diff --git a/graph/incidents_graphml/5/512168b0-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/512168b0-5133-11ee-b458-8f76bdd93836.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8de6eb9060cc9e51a4419adc5f381551aa299226 --- /dev/null +++ b/graph/incidents_graphml/5/512168b0-5133-11ee-b458-8f76bdd93836.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.105 + 100.64.66.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694499134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 512168b0-5133-11ee-b458-8f76bdd93836 + + + diff --git a/graph/incidents_graphml/5/5121b5d0-f9b3-11ee-9419-336c262dcd55.graphml b/graph/incidents_graphml/5/5121b5d0-f9b3-11ee-9419-336c262dcd55.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80b22fb7e385e72ef4a82243b8fb3d9f537491e8 --- /dev/null +++ b/graph/incidents_graphml/5/5121b5d0-f9b3-11ee-9419-336c262dcd55.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.196 + 100.64.41.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713025905 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5121b5d0-f9b3-11ee-9419-336c262dcd55 + + + diff --git a/graph/incidents_graphml/5/512db620-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/512db620-2ff4-11ee-881d-9b9601b76edb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c51e4b60f8e5636c457d0145f8e5ee796196d13b --- /dev/null +++ b/graph/incidents_graphml/5/512db620-2ff4-11ee-881d-9b9601b76edb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.164 + USER-0015-1318.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690843687 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 512db620-2ff4-11ee-881d-9b9601b76edb + + + diff --git a/graph/incidents_graphml/5/51319550-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/51319550-5133-11ee-b458-8f76bdd93836.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83796e25cbd1b2ad15d00f250d34f95cef47380a --- /dev/null +++ b/graph/incidents_graphml/5/51319550-5133-11ee-b458-8f76bdd93836.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.105 + 100.64.66.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694499134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 51319550-5133-11ee-b458-8f76bdd93836 + + + diff --git a/graph/incidents_graphml/5/513e1ad0-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/5/513e1ad0-fe0c-11ec-809b-91d71d0233d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab9ae919f4195c96a3e41809dc0224e3e85201b2 --- /dev/null +++ b/graph/incidents_graphml/5/513e1ad0-fe0c-11ec-809b-91d71d0233d6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.14 + 100.64.79.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.45 + 100.64.73.45 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657208939 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 513e1ad0-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208939 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 513e1ad0-fe0c-11ec-809b-91d71d0233d6 + + + diff --git a/graph/incidents_graphml/5/51427fd0-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/51427fd0-6a4e-11ee-a1cb-53f21743b64f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d99c43c7f9dc6c81da695b99817ef74ab4629529 --- /dev/null +++ b/graph/incidents_graphml/5/51427fd0-6a4e-11ee-a1cb-53f21743b64f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.17 + 100.64.62.17 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697259509 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51427fd0-6a4e-11ee-a1cb-53f21743b64f + + + diff --git a/graph/incidents_graphml/5/51521030-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/51521030-6a4e-11ee-a1cb-53f21743b64f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b7c5b1e102e5753b33f040750efda73ea319e39 --- /dev/null +++ b/graph/incidents_graphml/5/51521030-6a4e-11ee-a1cb-53f21743b64f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.17 + 100.64.62.17 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697259510 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 51521030-6a4e-11ee-a1cb-53f21743b64f + + + diff --git a/graph/incidents_graphml/5/5153dbc0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/5153dbc0-2ff4-11ee-881d-9b9601b76edb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfc47ef8b172c155ef91d86d97ff3c754c01fe20 --- /dev/null +++ b/graph/incidents_graphml/5/5153dbc0-2ff4-11ee-881d-9b9601b76edb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.178 + 100.64.32.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690843687 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5153dbc0-2ff4-11ee-881d-9b9601b76edb + + + diff --git a/graph/incidents_graphml/5/515e6c40-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/515e6c40-6a4e-11ee-a1cb-53f21743b64f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08b19713afb77200ea375645e4fe644eacb0ee3d --- /dev/null +++ b/graph/incidents_graphml/5/515e6c40-6a4e-11ee-a1cb-53f21743b64f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.50 + 100.64.51.50 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697259510 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 515e6c40-6a4e-11ee-a1cb-53f21743b64f + + + diff --git a/graph/incidents_graphml/5/5167d8f0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/5167d8f0-2ff4-11ee-881d-9b9601b76edb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1dd50b36d40fdb56d1d33d11d878f7f39c6479fa --- /dev/null +++ b/graph/incidents_graphml/5/5167d8f0-2ff4-11ee-881d-9b9601b76edb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.178 + 100.64.32.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690843688 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5167d8f0-2ff4-11ee-881d-9b9601b76edb + + + diff --git a/graph/incidents_graphml/5/516c00d0-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/516c00d0-6a4e-11ee-a1cb-53f21743b64f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac6ba2dcaf72ba3dd5dce6d63fe1a5fd3b403819 --- /dev/null +++ b/graph/incidents_graphml/5/516c00d0-6a4e-11ee-a1cb-53f21743b64f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.50 + 100.64.51.50 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697259510 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 516c00d0-6a4e-11ee-a1cb-53f21743b64f + + + diff --git a/graph/incidents_graphml/5/516f1f50-2227-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/516f1f50-2227-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7761e6d54bfe1cf1dbdc089f1a758033ad842bf0 --- /dev/null +++ b/graph/incidents_graphml/5/516f1f50-2227-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.208 + 100.64.3.208 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689326276 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 516f1f50-2227-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/517492b0-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/517492b0-063d-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c2af7054d2544bb40aff92df770879c57e9987f --- /dev/null +++ b/graph/incidents_graphml/5/517492b0-063d-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.125 + 100.64.12.125 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686257092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 517492b0-063d-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/5/517694b0-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/517694b0-20a2-11ed-ab44-599bbcff3eda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8c166b07a13ee4ab8e0d2af0db2cea3bd69bf79 --- /dev/null +++ b/graph/incidents_graphml/5/517694b0-20a2-11ed-ab44-599bbcff3eda.graphml @@ -0,0 +1,243 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.167 + 100.64.72.167 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.74 + 100.64.75.74 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.38.73 + 100.64.38.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.128 + 100.64.79.128 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.26.73 + 100.64.26.73 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.52 + 100.64.72.52 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.129 + 100.64.79.129 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 517694b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 517694b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 517694b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 517694b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 517694b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 517694b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 517694b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 517694b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 517694b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 517694b0-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 517694b0-20a2-11ed-ab44-599bbcff3eda + + + diff --git a/graph/incidents_graphml/5/51789080-20a2-11ed-ab44-599bbcff3eda.graphml b/graph/incidents_graphml/5/51789080-20a2-11ed-ab44-599bbcff3eda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eed4f2c049076521b055e09560aefd23942efb13 --- /dev/null +++ b/graph/incidents_graphml/5/51789080-20a2-11ed-ab44-599bbcff3eda.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.130 + 100.64.79.130 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.233 + 100.64.73.233 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.138 + 100.64.72.138 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.79.131 + 100.64.79.131 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.68.129 + 100.64.68.129 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.132 + 100.64.79.132 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.89 + 100.64.73.89 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + INCIDENT_LINK + 1661011704 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51789080-20a2-11ed-ab44-599bbcff3eda + + + diff --git a/graph/incidents_graphml/5/5178a1d0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/5178a1d0-2ff4-11ee-881d-9b9601b76edb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c3c55ff05afc62a6b3039b8e5225b58b7ba4085 --- /dev/null +++ b/graph/incidents_graphml/5/5178a1d0-2ff4-11ee-881d-9b9601b76edb.graphml @@ -0,0 +1,129 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.73 + 100.64.29.73 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690843688 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5178a1d0-2ff4-11ee-881d-9b9601b76edb + + + INCIDENT_LINK + 1690843688 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5178a1d0-2ff4-11ee-881d-9b9601b76edb + + + INCIDENT_LINK + 1690843688 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5178a1d0-2ff4-11ee-881d-9b9601b76edb + + + INCIDENT_LINK + 1690843688 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5178a1d0-2ff4-11ee-881d-9b9601b76edb + + + diff --git a/graph/incidents_graphml/5/518ef880-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/518ef880-063d-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c402a0a9e3053097208e2c82c33c2b109bbb64dd --- /dev/null +++ b/graph/incidents_graphml/5/518ef880-063d-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.125 + 100.64.12.125 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686257092 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 518ef880-063d-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/5/5191b6a0-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/5191b6a0-51f7-11ee-8f5a-e9a9bd036d73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2da03604dd42dd2098a406e7c490db923aa87b78 --- /dev/null +++ b/graph/incidents_graphml/5/5191b6a0-51f7-11ee-8f5a-e9a9bd036d73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.74 + 100.64.83.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694583316 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5191b6a0-51f7-11ee-8f5a-e9a9bd036d73 + + + diff --git a/graph/incidents_graphml/5/5192d410-0835-11ee-9239-4117e3175884.graphml b/graph/incidents_graphml/5/5192d410-0835-11ee-9239-4117e3175884.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f3cc5d08025af932acaf0d1fd153845b66397c0 --- /dev/null +++ b/graph/incidents_graphml/5/5192d410-0835-11ee-9239-4117e3175884.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.141 + USER-0015-1430.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686473559 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5192d410-0835-11ee-9239-4117e3175884 + + + diff --git a/graph/incidents_graphml/5/51950370-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/51950370-2ff4-11ee-881d-9b9601b76edb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..172b1f2d99c6a0972c79fd861b3a2edc57ee6156 --- /dev/null +++ b/graph/incidents_graphml/5/51950370-2ff4-11ee-881d-9b9601b76edb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.73 + 100.64.29.73 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690843688 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 51950370-2ff4-11ee-881d-9b9601b76edb + + + diff --git a/graph/incidents_graphml/5/519e87e0-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/519e87e0-51f7-11ee-8f5a-e9a9bd036d73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8bc6a547f8c387e4863be5dc8794b720c7af53d0 --- /dev/null +++ b/graph/incidents_graphml/5/519e87e0-51f7-11ee-8f5a-e9a9bd036d73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.83.74 + 100.64.83.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694583316 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 519e87e0-51f7-11ee-8f5a-e9a9bd036d73 + + + diff --git a/graph/incidents_graphml/5/51a8a6d0-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/51a8a6d0-0fb1-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35db02a21b9d5c76973c742fbd944d0fcdd998c4 --- /dev/null +++ b/graph/incidents_graphml/5/51a8a6d0-0fb1-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.166 + 100.64.42.166 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715443972 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51a8a6d0-0fb1-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/5/51a98560-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/51a98560-063d-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be1e21fa3d3eadaf64f3694cfe93184d58aa18f0 --- /dev/null +++ b/graph/incidents_graphml/5/51a98560-063d-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.36 + 100.64.37.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686257092 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51a98560-063d-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/5/51a99ce0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/51a99ce0-2ff4-11ee-881d-9b9601b76edb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13680846197e247c220985a776ed4538f9574216 --- /dev/null +++ b/graph/incidents_graphml/5/51a99ce0-2ff4-11ee-881d-9b9601b76edb.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.166 + 100.64.38.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690843688 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51a99ce0-2ff4-11ee-881d-9b9601b76edb + + + INCIDENT_LINK + 1690843688 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51a99ce0-2ff4-11ee-881d-9b9601b76edb + + + diff --git a/graph/incidents_graphml/5/51b83cc0-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/5/51b83cc0-ed09-11ec-8ab6-b3d858f740e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d11f46e6ea7b71a29fc0d76557091eb4eae1f6f --- /dev/null +++ b/graph/incidents_graphml/5/51b83cc0-ed09-11ec-8ab6-b3d858f740e7.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.172 + USER-0015-1789.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.3.254 + 100.64.3.254 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655338482 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51b83cc0-ed09-11ec-8ab6-b3d858f740e7 + + + INCIDENT_LINK + 1655338482 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51b83cc0-ed09-11ec-8ab6-b3d858f740e7 + + + diff --git a/graph/incidents_graphml/5/51b96fb0-0fb1-11ef-ba57-a7da65bcbce4.graphml b/graph/incidents_graphml/5/51b96fb0-0fb1-11ef-ba57-a7da65bcbce4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9bb42a64d6f4f1d601fd1994c0e867b71cc1c56 --- /dev/null +++ b/graph/incidents_graphml/5/51b96fb0-0fb1-11ef-ba57-a7da65bcbce4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.166 + 100.64.42.166 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715443972 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 51b96fb0-0fb1-11ef-ba57-a7da65bcbce4 + + + diff --git a/graph/incidents_graphml/5/51b9aba0-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/51b9aba0-6a4e-11ee-a1cb-53f21743b64f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10d58f5fa104786ac25888b1e4638ffab6163fde --- /dev/null +++ b/graph/incidents_graphml/5/51b9aba0-6a4e-11ee-a1cb-53f21743b64f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.19 + 100.64.62.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697259510 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51b9aba0-6a4e-11ee-a1cb-53f21743b64f + + + diff --git a/graph/incidents_graphml/5/51bfe400-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/51bfe400-2ff4-11ee-881d-9b9601b76edb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03ed686ca1e35443bd4a1981e01f71b8a72f7cb4 --- /dev/null +++ b/graph/incidents_graphml/5/51bfe400-2ff4-11ee-881d-9b9601b76edb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.166 + 100.64.38.166 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690843688 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 51bfe400-2ff4-11ee-881d-9b9601b76edb + + + diff --git a/graph/incidents_graphml/5/51c67e50-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/51c67e50-515f-11ee-9251-b53d19eaa2b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ff7cd369a91788515048724072832c703e6be91 --- /dev/null +++ b/graph/incidents_graphml/5/51c67e50-515f-11ee-9251-b53d19eaa2b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.236 + 100.64.52.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694518033 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51c67e50-515f-11ee-9251-b53d19eaa2b9 + + + diff --git a/graph/incidents_graphml/5/51c8c6d0-6a4e-11ee-a1cb-53f21743b64f.graphml b/graph/incidents_graphml/5/51c8c6d0-6a4e-11ee-a1cb-53f21743b64f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3231e233b3399ded6c9728184a5fc7c22211375b --- /dev/null +++ b/graph/incidents_graphml/5/51c8c6d0-6a4e-11ee-a1cb-53f21743b64f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.19 + 100.64.62.19 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697259510 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 51c8c6d0-6a4e-11ee-a1cb-53f21743b64f + + + diff --git a/graph/incidents_graphml/5/51cb3e30-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/51cb3e30-063d-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e406d20c2742b155225fb558d3378766132ffc7 --- /dev/null +++ b/graph/incidents_graphml/5/51cb3e30-063d-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.36 + 100.64.37.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686257093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 51cb3e30-063d-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/5/51d0e290-5133-11ee-b458-8f76bdd93836.graphml b/graph/incidents_graphml/5/51d0e290-5133-11ee-b458-8f76bdd93836.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ecd204717a4a252def33112b9933b4d399471436 --- /dev/null +++ b/graph/incidents_graphml/5/51d0e290-5133-11ee-b458-8f76bdd93836.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.46 + 100.64.21.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694499135 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 51d0e290-5133-11ee-b458-8f76bdd93836 + + + diff --git a/graph/incidents_graphml/5/51d1a070-7412-11ee-91c2-7545920d3cab.graphml b/graph/incidents_graphml/5/51d1a070-7412-11ee-91c2-7545920d3cab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d97661b93a6eaa09255d560ac3b3b829e63f61eb --- /dev/null +++ b/graph/incidents_graphml/5/51d1a070-7412-11ee-91c2-7545920d3cab.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.8 + 100.64.70.8 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.29.177 + 100.64.29.177 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1698333252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51d1a070-7412-11ee-91c2-7545920d3cab + + + INCIDENT_LINK + 1698333252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51d1a070-7412-11ee-91c2-7545920d3cab + + + INCIDENT_LINK + 1698333252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51d1a070-7412-11ee-91c2-7545920d3cab + + + INCIDENT_LINK + 1698333252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51d1a070-7412-11ee-91c2-7545920d3cab + + + diff --git a/graph/incidents_graphml/5/51da22c0-2ff4-11ee-881d-9b9601b76edb.graphml b/graph/incidents_graphml/5/51da22c0-2ff4-11ee-881d-9b9601b76edb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..563589aff73521368adc3b6cf0704a71d0e2ea92 --- /dev/null +++ b/graph/incidents_graphml/5/51da22c0-2ff4-11ee-881d-9b9601b76edb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.168 + 100.64.38.168 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690843688 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51da22c0-2ff4-11ee-881d-9b9601b76edb + + + diff --git a/graph/incidents_graphml/5/51db65e0-515f-11ee-9251-b53d19eaa2b9.graphml b/graph/incidents_graphml/5/51db65e0-515f-11ee-9251-b53d19eaa2b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a45d392e739093f53ef25d490ffd4d41cdb11e39 --- /dev/null +++ b/graph/incidents_graphml/5/51db65e0-515f-11ee-9251-b53d19eaa2b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.236 + 100.64.52.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694518033 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51db65e0-515f-11ee-9251-b53d19eaa2b9 + + + diff --git a/graph/incidents_graphml/5/51e1ac60-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/51e1ac60-063d-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34e5ef79d32005f81cc49cce1f794a0c191cb448 --- /dev/null +++ b/graph/incidents_graphml/5/51e1ac60-063d-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.254 + 100.64.17.254 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686257093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51e1ac60-063d-11ee-a6b9-2fa958ecde6f + + + INCIDENT_LINK + 1686257093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51e1ac60-063d-11ee-a6b9-2fa958ecde6f + + + INCIDENT_LINK + 1686257093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51e1ac60-063d-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/5/51f2c260-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/51f2c260-51f7-11ee-8f5a-e9a9bd036d73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85c805ed89bb8c701dbe25e7814a74413b6d9d67 --- /dev/null +++ b/graph/incidents_graphml/5/51f2c260-51f7-11ee-8f5a-e9a9bd036d73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.169 + USER-0015-2071.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1694583316 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 51f2c260-51f7-11ee-8f5a-e9a9bd036d73 + + + diff --git a/graph/incidents_graphml/5/51f3dfa0-adbb-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/5/51f3dfa0-adbb-11ed-a9cd-bdbbd3b810c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e69d6a8071f25e1317a86d3242c4e4c4575a2801 --- /dev/null +++ b/graph/incidents_graphml/5/51f3dfa0-adbb-11ed-a9cd-bdbbd3b810c7.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.163.188.4 + 10.163.188.4 + ["Exploiting Host"] + 0.7890625 + ["Precinct","AWS VPC Security","Windows Logs"] + + + HOST + 10.187.158.205 + 10.187.158.205 + ["Exploiting Target"] + 0.7890625 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1676525556 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51f3dfa0-adbb-11ed-a9cd-bdbbd3b810c7 + + + INCIDENT_LINK + 1676525556 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 51f3dfa0-adbb-11ed-a9cd-bdbbd3b810c7 + + + diff --git a/graph/incidents_graphml/5/51f904f0-063d-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/5/51f904f0-063d-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55ee54e73108b9073b32178a00dc9160d283dc74 --- /dev/null +++ b/graph/incidents_graphml/5/51f904f0-063d-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.254 + 100.64.17.254 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686257093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 51f904f0-063d-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/5/52044e90-51f7-11ee-8f5a-e9a9bd036d73.graphml b/graph/incidents_graphml/5/52044e90-51f7-11ee-8f5a-e9a9bd036d73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..acc552141b284194f99532b97b4bc39cf13b9df7 --- /dev/null +++ b/graph/incidents_graphml/5/52044e90-51f7-11ee-8f5a-e9a9bd036d73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.91.169 + USER-0015-2071.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694583317 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 52044e90-51f7-11ee-8f5a-e9a9bd036d73 + + + diff --git a/graph/incidents_graphml/5/520b8bb0-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/5/520b8bb0-2f33-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9816edeb3214f1498a48ca644195370560289b2f --- /dev/null +++ b/graph/incidents_graphml/5/520b8bb0-2f33-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.126 + 100.64.71.126 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.53 + 100.64.82.53 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.54 + 100.64.82.54 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.85 + 100.64.73.85 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.116 + 100.64.72.116 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.52 + 100.64.72.52 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.24.235 + 100.64.24.235 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.9.12 + 100.64.9.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760796 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 520b8bb0-2f33-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/5/520bba90-3662-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/5/520bba90-3662-11ef-b33d-111abc4c57da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f7518f842e1d044149b6a3073dff3a18b70e70f --- /dev/null +++ b/graph/incidents_graphml/5/520bba90-3662-11ef-b33d-111abc4c57da.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.73 + USER-0015-1343.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719698138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 520bba90-3662-11ef-b33d-111abc4c57da + + + INCIDENT_LINK + 1719698138 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 520bba90-3662-11ef-b33d-111abc4c57da + + +