diff --git a/graph/incidents_graphml/e/ed0c84a0-fd59-11ec-a469-5997b7522014.graphml b/graph/incidents_graphml/e/ed0c84a0-fd59-11ec-a469-5997b7522014.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ab728ff48d0bc144e14cc0c28688b8134f62c43
--- /dev/null
+++ b/graph/incidents_graphml/e/ed0c84a0-fd59-11ec-a469-5997b7522014.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.23
+ 100.64.82.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.158
+ USER-0015-1647.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.24
+ 100.64.82.24
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657132321
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed0c84a0-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132321
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed0c84a0-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132321
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed0c84a0-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132321
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed0c84a0-fd59-11ec-a469-5997b7522014
+
+
+
diff --git a/graph/incidents_graphml/e/ed112c20-212b-11ee-be86-791271b8260d.graphml b/graph/incidents_graphml/e/ed112c20-212b-11ee-be86-791271b8260d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7122172c91e0d15aa3c8422ca23b62e6e99858d6
--- /dev/null
+++ b/graph/incidents_graphml/e/ed112c20-212b-11ee-be86-791271b8260d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.213
+ 100.64.5.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689218304
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed112c20-212b-11ee-be86-791271b8260d
+
+
+
diff --git a/graph/incidents_graphml/e/ed12b6f0-71b5-11ee-83bd-d7ace4b5b84d.graphml b/graph/incidents_graphml/e/ed12b6f0-71b5-11ee-83bd-d7ace4b5b84d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1bb7903980f09d0433412186a78b0db95d87b882
--- /dev/null
+++ b/graph/incidents_graphml/e/ed12b6f0-71b5-11ee-83bd-d7ace4b5b84d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.11.33
+ 100.64.11.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1698073667
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ed12b6f0-71b5-11ee-83bd-d7ace4b5b84d
+
+
+
diff --git a/graph/incidents_graphml/e/ed14ec10-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/e/ed14ec10-0ea8-11ee-ac51-1fc12cdb93ff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f40bf7a1adcd20fef31be761a94f2c0695e63eb0
--- /dev/null
+++ b/graph/incidents_graphml/e/ed14ec10-0ea8-11ee-ac51-1fc12cdb93ff.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.219
+ 100.64.13.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687182919
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed14ec10-0ea8-11ee-ac51-1fc12cdb93ff
+
+
+
diff --git a/graph/incidents_graphml/e/ed1c7390-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/e/ed1c7390-1228-11ed-99ed-adca11e4059c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a66f7b7bd1e36bdadcfbd9fea0c28828c9275b5
--- /dev/null
+++ b/graph/incidents_graphml/e/ed1c7390-1228-11ed-99ed-adca11e4059c.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.230.18
+ 172.16.230.18
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.89.32
+ 100.64.89.32
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.33
+ 100.64.89.33
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.34
+ 100.64.89.34
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.77
+ 100.64.87.77
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659420250
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed1c7390-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420250
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed1c7390-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420250
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed1c7390-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420250
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed1c7390-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420250
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed1c7390-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420250
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed1c7390-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420250
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed1c7390-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420250
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed1c7390-1228-11ed-99ed-adca11e4059c
+
+
+
diff --git a/graph/incidents_graphml/e/ed230660-5c87-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/e/ed230660-5c87-11ee-8e0e-93298c809ccb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db7ca3bb094431a8a373a0ecba0f1200bb4c053e
--- /dev/null
+++ b/graph/incidents_graphml/e/ed230660-5c87-11ee-8e0e-93298c809ccb.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.241
+ 100.64.11.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.17.224
+ 100.64.17.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1695744936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed230660-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed230660-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed230660-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed230660-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed230660-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed230660-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed230660-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed230660-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed230660-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed230660-5c87-11ee-8e0e-93298c809ccb
+
+
+
diff --git a/graph/incidents_graphml/e/ed273b80-75f6-11ee-8cab-f39a0af54aaa.graphml b/graph/incidents_graphml/e/ed273b80-75f6-11ee-8cab-f39a0af54aaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8a8baea967c337e4883b875737012aaacc4dce3
--- /dev/null
+++ b/graph/incidents_graphml/e/ed273b80-75f6-11ee-8cab-f39a0af54aaa.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.226
+ 100.64.49.226
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698541389
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed273b80-75f6-11ee-8cab-f39a0af54aaa
+
+
+ INCIDENT_LINK
+ 1698541389
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed273b80-75f6-11ee-8cab-f39a0af54aaa
+
+
+
diff --git a/graph/incidents_graphml/e/ed2f83d0-9cf8-11ed-8fd7-753be03cabc2.graphml b/graph/incidents_graphml/e/ed2f83d0-9cf8-11ed-8fd7-753be03cabc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4a2a7a6f1d6f70b5a58059b13af4083dd74bbb9
--- /dev/null
+++ b/graph/incidents_graphml/e/ed2f83d0-9cf8-11ed-8fd7-753be03cabc2.graphml
@@ -0,0 +1,169 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.216.82
+ 172.25.216.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF","ManageEngine ADManager"]
+
+
+ HOST
+ 172.21.4.34
+ 172.21.4.34
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 172.21.5.68
+ 172.21.5.68
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1674682846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed2f83d0-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed2f83d0-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed2f83d0-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed2f83d0-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed2f83d0-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed2f83d0-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed2f83d0-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed2f83d0-9cf8-11ed-8fd7-753be03cabc2
+
+
+
diff --git a/graph/incidents_graphml/e/ed372c80-2a5b-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/e/ed372c80-2a5b-11ed-8698-87f85c8d72c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..163cfd640e67036c5e962115ba6d47680bcb7675
--- /dev/null
+++ b/graph/incidents_graphml/e/ed372c80-2a5b-11ed-8698-87f85c8d72c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.170
+ 100.64.97.170
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662080982
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed372c80-2a5b-11ed-8698-87f85c8d72c2
+
+
+
diff --git a/graph/incidents_graphml/e/ed3c0e80-2a5b-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/e/ed3c0e80-2a5b-11ed-8698-87f85c8d72c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dbd6b9893bbf6a68568fcf45467bf68d867a764b
--- /dev/null
+++ b/graph/incidents_graphml/e/ed3c0e80-2a5b-11ed-8698-87f85c8d72c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.0.145.98
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.170
+ 100.64.97.170
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662080982
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed3c0e80-2a5b-11ed-8698-87f85c8d72c2
+
+
+
diff --git a/graph/incidents_graphml/e/ed415340-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/e/ed415340-0ea8-11ee-ac51-1fc12cdb93ff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d63d39eb03b9ab6ffc7dc1ea0d440c02a7d0f24
--- /dev/null
+++ b/graph/incidents_graphml/e/ed415340-0ea8-11ee-ac51-1fc12cdb93ff.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.219
+ 100.64.13.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687182919
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed415340-0ea8-11ee-ac51-1fc12cdb93ff
+
+
+
diff --git a/graph/incidents_graphml/e/ed466ec0-2a5b-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/e/ed466ec0-2a5b-11ed-8698-87f85c8d72c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aad40144627e393c4f1bfe05a057be95178c3d6b
--- /dev/null
+++ b/graph/incidents_graphml/e/ed466ec0-2a5b-11ed-8698-87f85c8d72c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.172
+ 100.64.97.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1662080982
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed466ec0-2a5b-11ed-8698-87f85c8d72c2
+
+
+
diff --git a/graph/incidents_graphml/e/ed4cd760-2a5b-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/e/ed4cd760-2a5b-11ed-8698-87f85c8d72c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82764a21ec274c25c64306870b0bc1d9875c19a1
--- /dev/null
+++ b/graph/incidents_graphml/e/ed4cd760-2a5b-11ed-8698-87f85c8d72c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.97.172
+ 100.64.97.172
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662080982
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed4cd760-2a5b-11ed-8698-87f85c8d72c2
+
+
+
diff --git a/graph/incidents_graphml/e/ed4f4860-2a5b-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/e/ed4f4860-2a5b-11ed-8698-87f85c8d72c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1dcf8cbb68cae6654866b7345d5e5f2a2ca24098
--- /dev/null
+++ b/graph/incidents_graphml/e/ed4f4860-2a5b-11ed-8698-87f85c8d72c2.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.174
+ 100.64.97.174
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662080983
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed4f4860-2a5b-11ed-8698-87f85c8d72c2
+
+
+ INCIDENT_LINK
+ 1662080983
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed4f4860-2a5b-11ed-8698-87f85c8d72c2
+
+
+
diff --git a/graph/incidents_graphml/e/ed51bbc0-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/e/ed51bbc0-9172-11ee-94be-75b251a8fc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a933dc86e1a63cc57a1e068a2f895e04cdc83f11
--- /dev/null
+++ b/graph/incidents_graphml/e/ed51bbc0-9172-11ee-94be-75b251a8fc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.58
+ 100.64.35.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701563328
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed51bbc0-9172-11ee-94be-75b251a8fc8a
+
+
+
diff --git a/graph/incidents_graphml/e/ed51fd90-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/e/ed51fd90-4efd-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b9bdb57f1bb11439673260716b138ff55f4db08
--- /dev/null
+++ b/graph/incidents_graphml/e/ed51fd90-4efd-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.176
+ 100.64.25.176
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694256301
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed51fd90-4efd-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/e/ed58b6d0-6d66-11ee-acf4-ebf255c20472.graphml b/graph/incidents_graphml/e/ed58b6d0-6d66-11ee-acf4-ebf255c20472.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c72659d97bc54d7accf1d7765cf1624f1864dade
--- /dev/null
+++ b/graph/incidents_graphml/e/ed58b6d0-6d66-11ee-acf4-ebf255c20472.graphml
@@ -0,0 +1,799 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.71
+ 100.64.56.71
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.146
+ 100.64.31.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.72
+ 100.64.56.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.76
+ 100.64.7.76
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.73
+ 100.64.56.73
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.74
+ 100.64.56.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.83
+ 100.64.14.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.191
+ 100.64.54.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.75
+ 100.64.56.75
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.12
+ 100.64.55.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.150
+ 100.64.16.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.76
+ 100.64.56.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.48
+ 100.64.51.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.77
+ 100.64.56.77
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.78
+ 100.64.56.78
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.79
+ 100.64.56.79
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.80
+ 100.64.56.80
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+ INCIDENT_LINK
+ 1697599933
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed58b6d0-6d66-11ee-acf4-ebf255c20472
+
+
+
diff --git a/graph/incidents_graphml/e/ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/e/ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c337c4d3a4a24511b4cb32a4259ac38c019f8a30
--- /dev/null
+++ b/graph/incidents_graphml/e/ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.41
+ 100.64.71.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.146
+ 100.64.78.146
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.147
+ 100.64.78.147
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.148
+ 100.64.78.148
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.12.123
+ 100.64.12.123
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+
diff --git a/graph/incidents_graphml/e/ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/e/ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25475961eff85314a73df7ece3d76004c429c302
--- /dev/null
+++ b/graph/incidents_graphml/e/ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
@@ -0,0 +1,207 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.151
+ 100.64.78.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.101
+ 100.64.71.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.152
+ 100.64.78.152
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.153
+ 100.64.78.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.13
+ USER-0015-1785.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519859
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+
diff --git a/graph/incidents_graphml/e/ed635a30-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/e/ed635a30-0ea8-11ee-ac51-1fc12cdb93ff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da7ab6897f8d1ca98cd097d4b2b2f68a06c72dd0
--- /dev/null
+++ b/graph/incidents_graphml/e/ed635a30-0ea8-11ee-ac51-1fc12cdb93ff.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.161
+ 100.64.9.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687182919
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ed635a30-0ea8-11ee-ac51-1fc12cdb93ff
+
+
+
diff --git a/graph/incidents_graphml/e/ed63e430-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/e/ed63e430-9172-11ee-94be-75b251a8fc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f32849cf11d1160ca36e47185c7fa2637917843
--- /dev/null
+++ b/graph/incidents_graphml/e/ed63e430-9172-11ee-94be-75b251a8fc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.58
+ 100.64.35.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701563329
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed63e430-9172-11ee-94be-75b251a8fc8a
+
+
+
diff --git a/graph/incidents_graphml/e/ed73e9c0-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/e/ed73e9c0-9172-11ee-94be-75b251a8fc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33f71a74bdc74971c33caa9b1859d60bb1353049
--- /dev/null
+++ b/graph/incidents_graphml/e/ed73e9c0-9172-11ee-94be-75b251a8fc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.60
+ 100.64.35.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701563329
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed73e9c0-9172-11ee-94be-75b251a8fc8a
+
+
+
diff --git a/graph/incidents_graphml/e/ed7e0e20-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/e/ed7e0e20-0ea8-11ee-ac51-1fc12cdb93ff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad633153186cd68f83beb88f4df5c11490c13332
--- /dev/null
+++ b/graph/incidents_graphml/e/ed7e0e20-0ea8-11ee-ac51-1fc12cdb93ff.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.161
+ 100.64.9.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687182919
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed7e0e20-0ea8-11ee-ac51-1fc12cdb93ff
+
+
+
diff --git a/graph/incidents_graphml/e/ed7ef240-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/e/ed7ef240-2f46-11ee-8421-f3eff1a35bff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a113449546387523e8bd9383df459df87f0eef9e
--- /dev/null
+++ b/graph/incidents_graphml/e/ed7ef240-2f46-11ee-8421-f3eff1a35bff.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.132
+ 100.64.76.132
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.91
+ 100.64.72.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.243
+ 100.64.11.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.43.16
+ 100.64.43.16
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690769217
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed7ef240-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769217
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed7ef240-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769217
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed7ef240-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769217
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed7ef240-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769217
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed7ef240-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769217
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed7ef240-2f46-11ee-8421-f3eff1a35bff
+
+
+
diff --git a/graph/incidents_graphml/e/ed84b2a0-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/e/ed84b2a0-9172-11ee-94be-75b251a8fc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdcdb7ef4c5589d471a22ff67645f848a24e8af9
--- /dev/null
+++ b/graph/incidents_graphml/e/ed84b2a0-9172-11ee-94be-75b251a8fc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.60
+ 100.64.35.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701563329
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed84b2a0-9172-11ee-94be-75b251a8fc8a
+
+
+
diff --git a/graph/incidents_graphml/e/ed860e60-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/ed860e60-5c0d-11ee-9a52-1fcf6498e362.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10029a42a5b8eaa303b3d57041434eeee756b93e
--- /dev/null
+++ b/graph/incidents_graphml/e/ed860e60-5c0d-11ee-9a52-1fcf6498e362.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.151
+ 100.64.58.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695692538
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed860e60-5c0d-11ee-9a52-1fcf6498e362
+
+
+
diff --git a/graph/incidents_graphml/e/ed866b70-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/e/ed866b70-6861-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..306e3ce0b6b08a84f5d0011c0cc740fc88b96625
--- /dev/null
+++ b/graph/incidents_graphml/e/ed866b70-6861-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.227
+ 100.64.53.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697048030
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ed866b70-6861-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/e/ed8e3680-256c-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/e/ed8e3680-256c-11ee-8760-d9b0ea984292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..073b6ebecc2c93fb3f5ec6a97cbb327b305fa1d5
--- /dev/null
+++ b/graph/incidents_graphml/e/ed8e3680-256c-11ee-8760-d9b0ea984292.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.73
+ 100.64.7.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689686026
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed8e3680-256c-11ee-8760-d9b0ea984292
+
+
+
diff --git a/graph/incidents_graphml/e/ed8eafe0-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ed8eafe0-95b3-11ee-a46e-7b17a4f6b26c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..689dc0ea5687f1c8caab3869b3571c5cb4d292b2
--- /dev/null
+++ b/graph/incidents_graphml/e/ed8eafe0-95b3-11ee-a46e-7b17a4f6b26c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.96.42
+ USER-0015-2145.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702031051
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed8eafe0-95b3-11ee-a46e-7b17a4f6b26c
+
+
+
diff --git a/graph/incidents_graphml/e/ed952990-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/ed952990-5c0d-11ee-9a52-1fcf6498e362.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc5490b8491c3826546907d85bf8cb18b147f6b9
--- /dev/null
+++ b/graph/incidents_graphml/e/ed952990-5c0d-11ee-9a52-1fcf6498e362.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.151
+ 100.64.58.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695692538
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed952990-5c0d-11ee-9a52-1fcf6498e362
+
+
+
diff --git a/graph/incidents_graphml/e/ed9ce0b0-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ed9ce0b0-95b3-11ee-a46e-7b17a4f6b26c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57f41b571c45353289539ca240c510aed2777fcc
--- /dev/null
+++ b/graph/incidents_graphml/e/ed9ce0b0-95b3-11ee-a46e-7b17a4f6b26c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.44
+ USER-0015-2146.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 100.64.88.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702031051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ed9ce0b0-95b3-11ee-a46e-7b17a4f6b26c
+
+
+
diff --git a/graph/incidents_graphml/e/ed9d27c0-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/e/ed9d27c0-6861-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff8974494ef80559a77f9db52bd7c35ebd7f39b6
--- /dev/null
+++ b/graph/incidents_graphml/e/ed9d27c0-6861-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.47
+ 100.64.17.47
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697048030
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ed9d27c0-6861-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/e/eda46fd0-2d7e-11ee-b431-c96f4a8a8f7e.graphml b/graph/incidents_graphml/e/eda46fd0-2d7e-11ee-b431-c96f4a8a8f7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..606eec081583b6fa67db46ca421f971dcb55cd0a
--- /dev/null
+++ b/graph/incidents_graphml/e/eda46fd0-2d7e-11ee-b431-c96f4a8a8f7e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.200
+ 100.64.82.200
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690573367
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda46fd0-2d7e-11ee-b431-c96f4a8a8f7e
+
+
+
diff --git a/graph/incidents_graphml/e/eda53680-fcd3-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/e/eda53680-fcd3-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f33c880bf33498ee7286c8e0a76a874b24e2fbf6
--- /dev/null
+++ b/graph/incidents_graphml/e/eda53680-fcd3-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.131
+ 100.64.13.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.3.212
+ 100.64.3.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.132
+ 100.64.13.132
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.133
+ 100.64.13.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.13.134
+ 100.64.13.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.13.135
+ 100.64.13.135
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685222267
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eda53680-fcd3-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/e/eda667a0-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/eda667a0-5c0d-11ee-9a52-1fcf6498e362.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a0712fc3c51194fb6c280934e2b9f3dcfcef7f2
--- /dev/null
+++ b/graph/incidents_graphml/e/eda667a0-5c0d-11ee-9a52-1fcf6498e362.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.191
+ 100.64.30.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695692538
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eda667a0-5c0d-11ee-9a52-1fcf6498e362
+
+
+
diff --git a/graph/incidents_graphml/e/edab3890-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/edab3890-95b3-11ee-a46e-7b17a4f6b26c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ccac1187932a25aebb38abe56d6b85dd9450c179
--- /dev/null
+++ b/graph/incidents_graphml/e/edab3890-95b3-11ee-a46e-7b17a4f6b26c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 100.64.88.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.44
+ USER-0015-2146.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702031051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ edab3890-95b3-11ee-a46e-7b17a4f6b26c
+
+
+
diff --git a/graph/incidents_graphml/e/edb42340-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/edb42340-5c0d-11ee-9a52-1fcf6498e362.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70d7e1376c4fc4aece4d124befbb0633b7c1b3fb
--- /dev/null
+++ b/graph/incidents_graphml/e/edb42340-5c0d-11ee-9a52-1fcf6498e362.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.191
+ 100.64.30.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695692538
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ edb42340-5c0d-11ee-9a52-1fcf6498e362
+
+
+
diff --git a/graph/incidents_graphml/e/edc05840-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/edc05840-5c0d-11ee-9a52-1fcf6498e362.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46570ecdb66726ac7371396ca4964ab0b7b31c4e
--- /dev/null
+++ b/graph/incidents_graphml/e/edc05840-5c0d-11ee-9a52-1fcf6498e362.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.153
+ 100.64.58.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695692538
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ edc05840-5c0d-11ee-9a52-1fcf6498e362
+
+
+
diff --git a/graph/incidents_graphml/e/edc66750-bc37-11ee-9aca-efbccc10f79c.graphml b/graph/incidents_graphml/e/edc66750-bc37-11ee-9aca-efbccc10f79c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b721c74eea919a71fcf0b6f804731da6d15b49ec
--- /dev/null
+++ b/graph/incidents_graphml/e/edc66750-bc37-11ee-9aca-efbccc10f79c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.232
+ 100.64.51.232
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1706265889
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ edc66750-bc37-11ee-9aca-efbccc10f79c
+
+
+
diff --git a/graph/incidents_graphml/e/edcdc5c0-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/edcdc5c0-5c0d-11ee-9a52-1fcf6498e362.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..536b04aee591ddf987c3db83efabb3deddec5b2e
--- /dev/null
+++ b/graph/incidents_graphml/e/edcdc5c0-5c0d-11ee-9a52-1fcf6498e362.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.153
+ 100.64.58.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695692538
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ edcdc5c0-5c0d-11ee-9a52-1fcf6498e362
+
+
+
diff --git a/graph/incidents_graphml/e/edd1f780-fd59-11ec-a469-5997b7522014.graphml b/graph/incidents_graphml/e/edd1f780-fd59-11ec-a469-5997b7522014.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a567fc7aec7c569622fab4427e592aa088ca19c
--- /dev/null
+++ b/graph/incidents_graphml/e/edd1f780-fd59-11ec-a469-5997b7522014.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.25
+ 100.64.82.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.226
+ USER-0015-1727.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657132322
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ edd1f780-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132322
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ edd1f780-fd59-11ec-a469-5997b7522014
+
+
+
diff --git a/graph/incidents_graphml/e/edd2e270-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/e/edd2e270-0cc7-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bbcb5c152d1174467c87f1d5e2b4f570436f46e
--- /dev/null
+++ b/graph/incidents_graphml/e/edd2e270-0cc7-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,129 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.16
+ 100.64.8.16
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686976332
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ edd2e270-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976332
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ edd2e270-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976332
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ edd2e270-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976332
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ edd2e270-0cc7-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/e/edd2ea70-bc37-11ee-9aca-efbccc10f79c.graphml b/graph/incidents_graphml/e/edd2ea70-bc37-11ee-9aca-efbccc10f79c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6f7652f0aa8458a13cae99fd44f260258884a77
--- /dev/null
+++ b/graph/incidents_graphml/e/edd2ea70-bc37-11ee-9aca-efbccc10f79c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.232
+ 100.64.51.232
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1706265889
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ edd2ea70-bc37-11ee-9aca-efbccc10f79c
+
+
+
diff --git a/graph/incidents_graphml/e/edd56340-0769-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/e/edd56340-0769-11ef-93a8-d78cfa287885.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d09632e2237f2b01389cc6b2d538f79df1a1e02
--- /dev/null
+++ b/graph/incidents_graphml/e/edd56340-0769-11ef-93a8-d78cfa287885.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.127.220
+ 172.21.127.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.1.193
+ 100.64.1.193
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1714533701
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ edd56340-0769-11ef-93a8-d78cfa287885
+
+
+ INCIDENT_LINK
+ 1714533701
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ edd56340-0769-11ef-93a8-d78cfa287885
+
+
+
diff --git a/graph/incidents_graphml/e/edd97190-fd59-11ec-a469-5997b7522014.graphml b/graph/incidents_graphml/e/edd97190-fd59-11ec-a469-5997b7522014.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..505022db3eff2c388d5eaca1fc6c0202d3ca5a24
--- /dev/null
+++ b/graph/incidents_graphml/e/edd97190-fd59-11ec-a469-5997b7522014.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.91
+ 100.64.40.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.177
+ 100.64.75.177
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.80
+ 100.64.77.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.145
+ 100.64.81.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.26
+ 100.64.82.26
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657132322
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ edd97190-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132322
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ edd97190-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132322
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ edd97190-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132322
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ edd97190-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132322
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ edd97190-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132322
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ edd97190-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132322
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ edd97190-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132322
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ edd97190-fd59-11ec-a469-5997b7522014
+
+
+
diff --git a/graph/incidents_graphml/e/eddd2f10-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/eddd2f10-5c0d-11ee-9a52-1fcf6498e362.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c0a1bc0ca32445b70375fc6f23a1d59a0794d62
--- /dev/null
+++ b/graph/incidents_graphml/e/eddd2f10-5c0d-11ee-9a52-1fcf6498e362.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.84
+ 100.64.8.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695692539
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ eddd2f10-5c0d-11ee-9a52-1fcf6498e362
+
+
+
diff --git a/graph/incidents_graphml/e/edf89ae0-bc37-11ee-9aca-efbccc10f79c.graphml b/graph/incidents_graphml/e/edf89ae0-bc37-11ee-9aca-efbccc10f79c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fe7b1b55d45a5bca3e9161e934e42678c480a02
--- /dev/null
+++ b/graph/incidents_graphml/e/edf89ae0-bc37-11ee-9aca-efbccc10f79c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.96
+ 100.64.25.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1706265889
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ edf89ae0-bc37-11ee-9aca-efbccc10f79c
+
+
+
diff --git a/graph/incidents_graphml/e/edf92d50-256c-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/e/edf92d50-256c-11ee-8760-d9b0ea984292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19b7153d5ba537a9a1a003d95e6398315747294d
--- /dev/null
+++ b/graph/incidents_graphml/e/edf92d50-256c-11ee-8760-d9b0ea984292.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.4
+ 100.64.12.4
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689686027
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ edf92d50-256c-11ee-8760-d9b0ea984292
+
+
+
diff --git a/graph/incidents_graphml/e/ee039f30-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/e/ee039f30-26cd-11ee-863d-83828757c718.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e70066d384a89718ea997389b117f0e0f28bca63
--- /dev/null
+++ b/graph/incidents_graphml/e/ee039f30-26cd-11ee-863d-83828757c718.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.172
+ 100.64.49.172
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.173
+ 100.64.49.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.174
+ 100.64.49.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689837639
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee039f30-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837639
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee039f30-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837639
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee039f30-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837639
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee039f30-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837639
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee039f30-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837639
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee039f30-26cd-11ee-863d-83828757c718
+
+
+
diff --git a/graph/incidents_graphml/e/ee0b08d0-ab74-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/e/ee0b08d0-ab74-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71f3fd2486e6664530e92e5086fed49775f1ba7f
--- /dev/null
+++ b/graph/incidents_graphml/e/ee0b08d0-ab74-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.224
+ 100.64.92.224
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1676275421
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee0b08d0-ab74-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/e/ee10ae20-ab74-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/e/ee10ae20-ab74-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..105989980d4162599e29938d7e0de90800fe43cd
--- /dev/null
+++ b/graph/incidents_graphml/e/ee10ae20-ab74-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.224
+ 100.64.92.224
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676275421
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ee10ae20-ab74-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/e/ee120cc0-1145-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/e/ee120cc0-1145-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ee8e53f57a9f6d896e76247b5176eff998d7477
--- /dev/null
+++ b/graph/incidents_graphml/e/ee120cc0-1145-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.68
+ 100.64.21.68
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.240
+ 100.64.71.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687470254
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee120cc0-1145-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687470254
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee120cc0-1145-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/e/ee12be50-2bee-11ed-a2b6-b13ea2175bd9.graphml b/graph/incidents_graphml/e/ee12be50-2bee-11ed-a2b6-b13ea2175bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a743d7e88c5472e8393d80bc6a9987986a139a8
--- /dev/null
+++ b/graph/incidents_graphml/e/ee12be50-2bee-11ed-a2b6-b13ea2175bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.243
+ 100.64.11.243
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662254071
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee12be50-2bee-11ed-a2b6-b13ea2175bd9
+
+
+
diff --git a/graph/incidents_graphml/e/ee138150-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/ee138150-5c0d-11ee-9a52-1fcf6498e362.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8008680a4551cc7855e98bda709c95a04fafe239
--- /dev/null
+++ b/graph/incidents_graphml/e/ee138150-5c0d-11ee-9a52-1fcf6498e362.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.141
+ 100.64.22.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695692539
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ee138150-5c0d-11ee-9a52-1fcf6498e362
+
+
+
diff --git a/graph/incidents_graphml/e/ee1c87f0-9998-11ee-9c88-85e8bec5492c.graphml b/graph/incidents_graphml/e/ee1c87f0-9998-11ee-9c88-85e8bec5492c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8ac9dde5c2c3683078c989e8dbeb6486055ddb6
--- /dev/null
+++ b/graph/incidents_graphml/e/ee1c87f0-9998-11ee-9c88-85e8bec5492c.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.199
+ 100.64.52.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.200
+ 100.64.52.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.102
+ 100.64.17.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702459260
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee1c87f0-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459260
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee1c87f0-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459260
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee1c87f0-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459260
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee1c87f0-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459260
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee1c87f0-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459260
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee1c87f0-9998-11ee-9c88-85e8bec5492c
+
+
+
diff --git a/graph/incidents_graphml/e/ee23fc10-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/ee23fc10-5c0d-11ee-9a52-1fcf6498e362.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90e22eb62a09667b8240888962feb2007726a85c
--- /dev/null
+++ b/graph/incidents_graphml/e/ee23fc10-5c0d-11ee-9a52-1fcf6498e362.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.155
+ 100.64.58.155
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695692539
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee23fc10-5c0d-11ee-9a52-1fcf6498e362
+
+
+
diff --git a/graph/incidents_graphml/e/ee275260-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/e/ee275260-9c29-11ed-a223-eb3483e385f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7917dc407790e31af029482a72aa0f4002abcf70
--- /dev/null
+++ b/graph/incidents_graphml/e/ee275260-9c29-11ed-a223-eb3483e385f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.145
+ 100.64.72.145
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.130
+ 100.64.71.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1674593942
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee275260-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593942
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee275260-9c29-11ed-a223-eb3483e385f1
+
+
+
diff --git a/graph/incidents_graphml/e/ee27bb90-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ee27bb90-95b3-11ee-a46e-7b17a4f6b26c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cc63868945687c31a87252ee3511f33a518254a
--- /dev/null
+++ b/graph/incidents_graphml/e/ee27bb90-95b3-11ee-a46e-7b17a4f6b26c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.14.83
+ 100.64.14.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1702031052
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ee27bb90-95b3-11ee-a46e-7b17a4f6b26c
+
+
+ INCIDENT_LINK
+ 1702031052
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ee27bb90-95b3-11ee-a46e-7b17a4f6b26c
+
+
+
diff --git a/graph/incidents_graphml/e/ee2eacd0-71e1-11ed-b9a8-2b933f6712c2.graphml b/graph/incidents_graphml/e/ee2eacd0-71e1-11ed-b9a8-2b933f6712c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f4a1b64446f93503419ef17572de3bf2c0343c2
--- /dev/null
+++ b/graph/incidents_graphml/e/ee2eacd0-71e1-11ed-b9a8-2b933f6712c2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.101
+ 100.64.82.101
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.196
+ 100.64.75.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.82.102
+ 100.64.82.102
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1669945069
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee2eacd0-71e1-11ed-b9a8-2b933f6712c2
+
+
+ INCIDENT_LINK
+ 1669945069
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee2eacd0-71e1-11ed-b9a8-2b933f6712c2
+
+
+ INCIDENT_LINK
+ 1669945069
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee2eacd0-71e1-11ed-b9a8-2b933f6712c2
+
+
+ INCIDENT_LINK
+ 1669945069
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee2eacd0-71e1-11ed-b9a8-2b933f6712c2
+
+
+
diff --git a/graph/incidents_graphml/e/ee31dec0-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/ee31dec0-5c0d-11ee-9a52-1fcf6498e362.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa086ee71c806e13724cd839bb9218f9996053d5
--- /dev/null
+++ b/graph/incidents_graphml/e/ee31dec0-5c0d-11ee-9a52-1fcf6498e362.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.155
+ 100.64.58.155
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695692539
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ee31dec0-5c0d-11ee-9a52-1fcf6498e362
+
+
+
diff --git a/graph/incidents_graphml/e/ee353db0-c01b-11ed-93b0-17c4c2638708.graphml b/graph/incidents_graphml/e/ee353db0-c01b-11ed-93b0-17c4c2638708.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d4c29b4da476b2e2320da51d56f2eccb2e8d004
--- /dev/null
+++ b/graph/incidents_graphml/e/ee353db0-c01b-11ed-93b0-17c4c2638708.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.126
+ 100.64.84.126
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678546171
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee353db0-c01b-11ed-93b0-17c4c2638708
+
+
+
diff --git a/graph/incidents_graphml/e/ee49b950-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/ee49b950-2d4f-11ef-80f2-29529499b1dd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35cd4e9d81cbfc327cc55fe31851eea6f8ad504e
--- /dev/null
+++ b/graph/incidents_graphml/e/ee49b950-2d4f-11ef-80f2-29529499b1dd.graphml
@@ -0,0 +1,753 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.59
+ 100.64.67.59
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.159.145.125
+ 10.159.145.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.25
+ 100.64.84.25
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.27
+ 100.64.84.27
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.26
+ 100.64.84.26
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.14.220
+ 100.64.14.220
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.22
+ 100.64.84.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.24.154
+ 100.64.24.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.23
+ 100.64.84.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.28
+ 100.64.84.28
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.29
+ 100.64.84.29
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.37.195
+ 100.64.37.195
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.31
+ 100.64.84.31
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.33
+ 100.64.84.33
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.34
+ 100.64.84.34
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.35
+ 100.64.84.35
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.84.38
+ 100.64.84.38
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.40
+ 100.64.83.40
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.5.233
+ 100.64.5.233
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.34.227
+ 100.64.34.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+ INCIDENT_LINK
+ 1718700679
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee49b950-2d4f-11ef-80f2-29529499b1dd
+
+
+
diff --git a/graph/incidents_graphml/e/ee4c2150-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/e/ee4c2150-9172-11ee-94be-75b251a8fc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..01219db460ec4d08f7f06907b52207f94481f5c2
--- /dev/null
+++ b/graph/incidents_graphml/e/ee4c2150-9172-11ee-94be-75b251a8fc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.62
+ USER-0015-1305.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701563330
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ee4c2150-9172-11ee-94be-75b251a8fc8a
+
+
+
diff --git a/graph/incidents_graphml/e/ee550260-b4f1-11ed-9d28-d755eb33fc3e.graphml b/graph/incidents_graphml/e/ee550260-b4f1-11ed-9d28-d755eb33fc3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da5763082de1d0d89b12e8041d92c4495fd9eed6
--- /dev/null
+++ b/graph/incidents_graphml/e/ee550260-b4f1-11ed-9d28-d755eb33fc3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.95
+ 100.64.86.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677318669
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee550260-b4f1-11ed-9d28-d755eb33fc3e
+
+
+
diff --git a/graph/incidents_graphml/e/ee580fa0-b4f1-11ed-9d28-d755eb33fc3e.graphml b/graph/incidents_graphml/e/ee580fa0-b4f1-11ed-9d28-d755eb33fc3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13eaba9052d163539741a11f8793829cf1269fd7
--- /dev/null
+++ b/graph/incidents_graphml/e/ee580fa0-b4f1-11ed-9d28-d755eb33fc3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.95
+ 100.64.86.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677318669
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ee580fa0-b4f1-11ed-9d28-d755eb33fc3e
+
+
+
diff --git a/graph/incidents_graphml/e/ee614850-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/e/ee614850-75d9-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb4425cdb74a0152f46e8d23a17c7dd78d71f72a
--- /dev/null
+++ b/graph/incidents_graphml/e/ee614850-75d9-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.173
+ 100.64.28.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698528936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ee614850-75d9-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/e/ee6f7920-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/e/ee6f7920-75d9-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d20b01f54f9312f2ee1863ef507a03310510ac2
--- /dev/null
+++ b/graph/incidents_graphml/e/ee6f7920-75d9-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.173
+ 100.64.28.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698528936
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ee6f7920-75d9-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/e/ee7d0db0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/e/ee7d0db0-75d9-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..793f9b1ef22ffa5ab90313f92c73710b8e56e0da
--- /dev/null
+++ b/graph/incidents_graphml/e/ee7d0db0-75d9-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.141
+ 100.64.45.141
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698528936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee7d0db0-75d9-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/e/ee834aa0-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/e/ee834aa0-11e8-11ed-97d5-3360f7274b74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..463ffad9b1b85ae75a07752310d0c29b3f6117f7
--- /dev/null
+++ b/graph/incidents_graphml/e/ee834aa0-11e8-11ed-97d5-3360f7274b74.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.134
+ 100.64.77.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.173
+ 100.64.72.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.135
+ 100.64.77.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.243
+ 100.64.71.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.136
+ 100.64.77.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659392765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee834aa0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee834aa0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee834aa0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee834aa0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee834aa0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee834aa0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee834aa0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee834aa0-11e8-11ed-97d5-3360f7274b74
+
+
+
diff --git a/graph/incidents_graphml/e/ee8c7700-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/e/ee8c7700-75d9-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce245d2b72439071065a60d11f291b64830d585d
--- /dev/null
+++ b/graph/incidents_graphml/e/ee8c7700-75d9-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.141
+ 100.64.45.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698528936
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ee8c7700-75d9-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/e/ee8dab60-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/e/ee8dab60-9268-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63438e5245b88e7ea36eaa7081fc3cbfb84a75c7
--- /dev/null
+++ b/graph/incidents_graphml/e/ee8dab60-9268-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.183
+ 100.64.65.183
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701668987
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ee8dab60-9268-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/e/ee91ef10-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ee91ef10-95b3-11ee-a46e-7b17a4f6b26c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..501463f9ef2ca493213f1000dbeec503f4281151
--- /dev/null
+++ b/graph/incidents_graphml/e/ee91ef10-95b3-11ee-a46e-7b17a4f6b26c.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.46
+ 100.64.96.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 100.64.88.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1702031053
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee91ef10-95b3-11ee-a46e-7b17a4f6b26c
+
+
+ INCIDENT_LINK
+ 1702031053
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee91ef10-95b3-11ee-a46e-7b17a4f6b26c
+
+
+
diff --git a/graph/incidents_graphml/e/ee957720-bc37-11ee-9aca-efbccc10f79c.graphml b/graph/incidents_graphml/e/ee957720-bc37-11ee-9aca-efbccc10f79c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1909543d9e8686f0351c642e0841e96219c8d15
--- /dev/null
+++ b/graph/incidents_graphml/e/ee957720-bc37-11ee-9aca-efbccc10f79c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.236
+ 100.64.51.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1706265890
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee957720-bc37-11ee-9aca-efbccc10f79c
+
+
+
diff --git a/graph/incidents_graphml/e/ee982a10-2efc-11ee-bea9-c5ecb1b621be.graphml b/graph/incidents_graphml/e/ee982a10-2efc-11ee-bea9-c5ecb1b621be.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6b4ba487b2d2055f3cd3908d4fc32c32c43df91
--- /dev/null
+++ b/graph/incidents_graphml/e/ee982a10-2efc-11ee-bea9-c5ecb1b621be.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.232
+ 100.64.81.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.95
+ 100.64.74.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690737436
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ee982a10-2efc-11ee-bea9-c5ecb1b621be
+
+
+
diff --git a/graph/incidents_graphml/e/ee989530-329f-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/e/ee989530-329f-11ee-8ce2-1f9d9a95bd90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d55ea3e39f3acb8f6a58b737f9955a2b178255f7
--- /dev/null
+++ b/graph/incidents_graphml/e/ee989530-329f-11ee-8ce2-1f9d9a95bd90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.252
+ 100.64.23.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691137298
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee989530-329f-11ee-8ce2-1f9d9a95bd90
+
+
+
diff --git a/graph/incidents_graphml/e/ee9a0770-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/e/ee9a0770-9268-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6145bbb3addc4fc4250ac238a42c012804a45822
--- /dev/null
+++ b/graph/incidents_graphml/e/ee9a0770-9268-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.185
+ 100.64.65.185
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701668987
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee9a0770-9268-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/e/ee9d66f0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/e/ee9d66f0-75d9-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eafef473bcb17ea9d43bb28389cf9d3a345b6d09
--- /dev/null
+++ b/graph/incidents_graphml/e/ee9d66f0-75d9-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.15
+ 100.64.11.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698528936
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ee9d66f0-75d9-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/e/ee9e2ca0-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/e/ee9e2ca0-4efd-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..de8e5aede320972beb4f7e221931c6c373ec5266
--- /dev/null
+++ b/graph/incidents_graphml/e/ee9e2ca0-4efd-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.234
+ 100.64.11.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694256303
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ee9e2ca0-4efd-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/e/eea2e8f0-234a-11ee-a619-11a50471d879.graphml b/graph/incidents_graphml/e/eea2e8f0-234a-11ee-a619-11a50471d879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59d11a66a22b70b6409dd6512904742a4718b09a
--- /dev/null
+++ b/graph/incidents_graphml/e/eea2e8f0-234a-11ee-a619-11a50471d879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.206
+ 100.64.41.206
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689451523
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eea2e8f0-234a-11ee-a619-11a50471d879
+
+
+
diff --git a/graph/incidents_graphml/e/eea41d20-bc37-11ee-9aca-efbccc10f79c.graphml b/graph/incidents_graphml/e/eea41d20-bc37-11ee-9aca-efbccc10f79c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..386a4d05301f625ea067a4431ce0a488b1b2475f
--- /dev/null
+++ b/graph/incidents_graphml/e/eea41d20-bc37-11ee-9aca-efbccc10f79c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.236
+ 100.64.51.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1706265890
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ eea41d20-bc37-11ee-9aca-efbccc10f79c
+
+
+
diff --git a/graph/incidents_graphml/e/eea83630-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/eea83630-95b3-11ee-a46e-7b17a4f6b26c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5becb0914c1634562b1b44a981076adba440663
--- /dev/null
+++ b/graph/incidents_graphml/e/eea83630-95b3-11ee-a46e-7b17a4f6b26c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 100.64.88.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.46
+ 100.64.96.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702031053
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ eea83630-95b3-11ee-a46e-7b17a4f6b26c
+
+
+
diff --git a/graph/incidents_graphml/e/eeb40c70-329f-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/e/eeb40c70-329f-11ee-8ce2-1f9d9a95bd90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5998d22b544183901054fc18b43866063532bbc6
--- /dev/null
+++ b/graph/incidents_graphml/e/eeb40c70-329f-11ee-8ce2-1f9d9a95bd90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.252
+ 100.64.23.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691137298
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ eeb40c70-329f-11ee-8ce2-1f9d9a95bd90
+
+
+
diff --git a/graph/incidents_graphml/e/eeb80b80-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/eeb80b80-2d4f-11ef-80f2-29529499b1dd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ea35b2cf53ecb42ba963a67ab7115e9be770e1d
--- /dev/null
+++ b/graph/incidents_graphml/e/eeb80b80-2d4f-11ef-80f2-29529499b1dd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.242
+ 100.64.4.242
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.159.145.125
+ 10.159.145.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1718700680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeb80b80-2d4f-11ef-80f2-29529499b1dd
+
+
+
diff --git a/graph/incidents_graphml/e/eebc5780-fd59-11ec-a469-5997b7522014.graphml b/graph/incidents_graphml/e/eebc5780-fd59-11ec-a469-5997b7522014.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6808574bec42a9d3a30bf0cc4087c8e04d14d307
--- /dev/null
+++ b/graph/incidents_graphml/e/eebc5780-fd59-11ec-a469-5997b7522014.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.27
+ 100.64.82.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.215
+ 100.64.72.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657132324
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eebc5780-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132324
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eebc5780-fd59-11ec-a469-5997b7522014
+
+
+
diff --git a/graph/incidents_graphml/e/eec38030-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/e/eec38030-2f46-11ee-8421-f3eff1a35bff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..898fb13c9c51364e5bb38ba1d09ec2a3e4991188
--- /dev/null
+++ b/graph/incidents_graphml/e/eec38030-2f46-11ee-8421-f3eff1a35bff.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.98
+ 100.64.36.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.195
+ 100.64.73.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.133
+ 100.64.76.133
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.18.180
+ 100.64.18.180
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.66.225
+ 100.64.66.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690769219
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eec38030-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769219
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eec38030-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769219
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eec38030-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769219
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eec38030-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769219
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eec38030-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769219
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eec38030-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769219
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eec38030-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769219
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eec38030-2f46-11ee-8421-f3eff1a35bff
+
+
+
diff --git a/graph/incidents_graphml/e/eec79be0-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/eec79be0-2d4f-11ef-80f2-29529499b1dd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..74ebe4020637a5b882cfb4900c4fcc57cf66ea35
--- /dev/null
+++ b/graph/incidents_graphml/e/eec79be0-2d4f-11ef-80f2-29529499b1dd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.159.145.125
+ 10.159.145.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.4.242
+ 100.64.4.242
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1718700680
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ eec79be0-2d4f-11ef-80f2-29529499b1dd
+
+
+
diff --git a/graph/incidents_graphml/e/eecb2520-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/e/eecb2520-0cc7-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4db302806c7c4e10d49465276b40d30c31f2e6c
--- /dev/null
+++ b/graph/incidents_graphml/e/eecb2520-0cc7-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.153
+ 100.64.6.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686976334
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ eecb2520-0cc7-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/e/eeceb150-086f-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/e/eeceb150-086f-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa4b536e22864b609bb4f0944bd13b3955d3a498
--- /dev/null
+++ b/graph/incidents_graphml/e/eeceb150-086f-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.159
+ 100.64.58.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.160
+ 100.64.58.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.161
+ 100.64.58.161
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.162
+ 100.64.58.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.2.213
+ 100.64.2.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.163
+ 100.64.58.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.212
+ 100.64.50.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.164
+ 100.64.58.164
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.165
+ 100.64.58.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646231
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eeceb150-086f-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/e/eecfa490-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/e/eecfa490-21fe-11ef-a065-0d11f2930c39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e1efefd7f769fe330d4d54b701879efa33c04a4
--- /dev/null
+++ b/graph/incidents_graphml/e/eecfa490-21fe-11ef-a065-0d11f2930c39.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.157
+ 100.64.32.157
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717456428
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eecfa490-21fe-11ef-a065-0d11f2930c39
+
+
+
diff --git a/graph/incidents_graphml/e/eed55780-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/eed55780-2d4f-11ef-80f2-29529499b1dd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9ce9c62843b4fc218a652b74fbe1444a6ba4aa0
--- /dev/null
+++ b/graph/incidents_graphml/e/eed55780-2d4f-11ef-80f2-29529499b1dd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.29
+ 100.64.8.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.159.145.125
+ 10.159.145.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1718700680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eed55780-2d4f-11ef-80f2-29529499b1dd
+
+
+
diff --git a/graph/incidents_graphml/e/eed6b400-dd4a-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/eed6b400-dd4a-11ed-8595-d92cdedd1bfb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa3106da9a76c9638fb73ae25e7d3369f4dd149a
--- /dev/null
+++ b/graph/incidents_graphml/e/eed6b400-dd4a-11ed-8595-d92cdedd1bfb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.232
+ 100.64.72.232
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681754942
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eed6b400-dd4a-11ed-8595-d92cdedd1bfb
+
+
+
diff --git a/graph/incidents_graphml/e/eedce470-4135-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/e/eedce470-4135-11ee-89c1-af7b5492d246.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e3271006d5ac04f15e23f708099e794e2996126
--- /dev/null
+++ b/graph/incidents_graphml/e/eedce470-4135-11ee-89c1-af7b5492d246.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.198
+ 100.64.51.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1692741039
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eedce470-4135-11ee-89c1-af7b5492d246
+
+
+
diff --git a/graph/incidents_graphml/e/eedcf590-dd4a-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/eedcf590-dd4a-11ed-8595-d92cdedd1bfb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a77938470104fe8745b80ce727d15111f6bb1a07
--- /dev/null
+++ b/graph/incidents_graphml/e/eedcf590-dd4a-11ed-8595-d92cdedd1bfb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.232
+ 100.64.72.232
+ ["Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681754942
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ eedcf590-dd4a-11ed-8595-d92cdedd1bfb
+
+
+
diff --git a/graph/incidents_graphml/e/eede81e0-2efc-11ee-bea9-c5ecb1b621be.graphml b/graph/incidents_graphml/e/eede81e0-2efc-11ee-bea9-c5ecb1b621be.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c76eac26c63d2a533c08319210d0c8dc6ca296e
--- /dev/null
+++ b/graph/incidents_graphml/e/eede81e0-2efc-11ee-bea9-c5ecb1b621be.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.232
+ 100.64.81.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690737437
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eede81e0-2efc-11ee-bea9-c5ecb1b621be
+
+
+
diff --git a/graph/incidents_graphml/e/eee46510-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/e/eee46510-21fe-11ef-a065-0d11f2930c39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58061550f0dd82d50d20eb5bfeacfde558570ff7
--- /dev/null
+++ b/graph/incidents_graphml/e/eee46510-21fe-11ef-a065-0d11f2930c39.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.157
+ 100.64.32.157
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717456428
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ eee46510-21fe-11ef-a065-0d11f2930c39
+
+
+
diff --git a/graph/incidents_graphml/e/eee4e7e0-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/eee4e7e0-2d4f-11ef-80f2-29529499b1dd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e977b042b1a1e31abce3c5adf5a2e3a6b0c886f
--- /dev/null
+++ b/graph/incidents_graphml/e/eee4e7e0-2d4f-11ef-80f2-29529499b1dd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.159.145.125
+ 10.159.145.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.8.29
+ 100.64.8.29
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1718700680
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ eee4e7e0-2d4f-11ef-80f2-29529499b1dd
+
+
+
diff --git a/graph/incidents_graphml/e/eeea0410-234a-11ee-a619-11a50471d879.graphml b/graph/incidents_graphml/e/eeea0410-234a-11ee-a619-11a50471d879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f86e0bdff8a3b85580acfa27a6754af782739d6e
--- /dev/null
+++ b/graph/incidents_graphml/e/eeea0410-234a-11ee-a619-11a50471d879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.128
+ 100.64.28.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689451523
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeea0410-234a-11ee-a619-11a50471d879
+
+
+
diff --git a/graph/incidents_graphml/e/eeecc5d0-2a32-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/e/eeecc5d0-2a32-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..089d7545720f6e04f7aba073b229516c114c69c0
--- /dev/null
+++ b/graph/incidents_graphml/e/eeecc5d0-2a32-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690210874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeecc5d0-2a32-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeecc5d0-2a32-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeecc5d0-2a32-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeecc5d0-2a32-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/e/eeee2280-4135-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/e/eeee2280-4135-11ee-89c1-af7b5492d246.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26e5fb943fb95b533f21f447634a35c4cc0700d0
--- /dev/null
+++ b/graph/incidents_graphml/e/eeee2280-4135-11ee-89c1-af7b5492d246.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.51.198
+ 100.64.51.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692741039
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ eeee2280-4135-11ee-89c1-af7b5492d246
+
+
+
diff --git a/graph/incidents_graphml/e/eeee79c0-5061-11ee-a936-57e582280eb3.graphml b/graph/incidents_graphml/e/eeee79c0-5061-11ee-a936-57e582280eb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cda22583c4910117aa4687a506498accc21e29b3
--- /dev/null
+++ b/graph/incidents_graphml/e/eeee79c0-5061-11ee-a936-57e582280eb3.graphml
@@ -0,0 +1,229 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.126
+ 100.64.9.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.87
+ 100.64.23.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.217
+ 100.64.14.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.88
+ 100.64.23.88
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.144
+ 100.64.12.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694409204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeee79c0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeee79c0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeee79c0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeee79c0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeee79c0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeee79c0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeee79c0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeee79c0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeee79c0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeee79c0-5061-11ee-a936-57e582280eb3
+
+
+
diff --git a/graph/incidents_graphml/e/eef3b4f0-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/eef3b4f0-2d4f-11ef-80f2-29529499b1dd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5535bd15c6ea57cc4fac89ea4f29da0ba440bd6e
--- /dev/null
+++ b/graph/incidents_graphml/e/eef3b4f0-2d4f-11ef-80f2-29529499b1dd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.218
+ 100.64.64.218
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.159.145.125
+ 10.159.145.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1718700680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eef3b4f0-2d4f-11ef-80f2-29529499b1dd
+
+
+
diff --git a/graph/incidents_graphml/e/eefdb810-f51b-11ec-9c76-edb488c77bbc.graphml b/graph/incidents_graphml/e/eefdb810-f51b-11ec-9c76-edb488c77bbc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c951348f79e5cc7a63986d7a0e4fd2f5ba18c37b
--- /dev/null
+++ b/graph/incidents_graphml/e/eefdb810-f51b-11ec-9c76-edb488c77bbc.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.176
+ 100.64.5.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.71
+ 100.64.73.71
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656226086
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eefdb810-f51b-11ec-9c76-edb488c77bbc
+
+
+ INCIDENT_LINK
+ 1656226086
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eefdb810-f51b-11ec-9c76-edb488c77bbc
+
+
+
diff --git a/graph/incidents_graphml/e/eeff9360-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/e/eeff9360-59ba-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e82fcd76e077e534fe1d200d3a8f681b86fad1f
--- /dev/null
+++ b/graph/incidents_graphml/e/eeff9360-59ba-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.76
+ 100.64.20.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695436990
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eeff9360-59ba-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/e/ef031e40-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/ef031e40-2d4f-11ef-80f2-29529499b1dd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a190f0febc8307f624514727619e993b01e1062
--- /dev/null
+++ b/graph/incidents_graphml/e/ef031e40-2d4f-11ef-80f2-29529499b1dd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.159.145.125
+ 10.159.145.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.64.218
+ 100.64.64.218
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1718700680
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef031e40-2d4f-11ef-80f2-29529499b1dd
+
+
+
diff --git a/graph/incidents_graphml/e/ef04a0a0-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/e/ef04a0a0-1f1b-11ee-9e2e-57c890ee02a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb97691d61be887cbe8c816c1b3629da636a8f83
--- /dev/null
+++ b/graph/incidents_graphml/e/ef04a0a0-1f1b-11ee-9e2e-57c890ee02a2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.69
+ 100.64.47.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688991533
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef04a0a0-1f1b-11ee-9e2e-57c890ee02a2
+
+
+
diff --git a/graph/incidents_graphml/e/ef061790-234a-11ee-a619-11a50471d879.graphml b/graph/incidents_graphml/e/ef061790-234a-11ee-a619-11a50471d879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9faaaba450fe69c60bf3d165a22561e97d71deba
--- /dev/null
+++ b/graph/incidents_graphml/e/ef061790-234a-11ee-a619-11a50471d879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.54
+ 100.64.12.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689451524
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef061790-234a-11ee-a619-11a50471d879
+
+
+
diff --git a/graph/incidents_graphml/e/ef08e580-3661-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/e/ef08e580-3661-11ef-b33d-111abc4c57da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fe2a12d30a669ec80f06ea3a82327161cc9dc7e
--- /dev/null
+++ b/graph/incidents_graphml/e/ef08e580-3661-11ef-b33d-111abc4c57da.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.151
+ 100.64.44.151
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.254
+ 100.64.8.254
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719697972
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef08e580-3661-11ef-b33d-111abc4c57da
+
+
+ INCIDENT_LINK
+ 1719697972
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef08e580-3661-11ef-b33d-111abc4c57da
+
+
+ INCIDENT_LINK
+ 1719697972
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef08e580-3661-11ef-b33d-111abc4c57da
+
+
+ INCIDENT_LINK
+ 1719697972
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef08e580-3661-11ef-b33d-111abc4c57da
+
+
+
diff --git a/graph/incidents_graphml/e/ef1100f0-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/ef1100f0-2d4f-11ef-80f2-29529499b1dd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a6b808f48c271a4076c5a2c8a1cfa685024c4e3
--- /dev/null
+++ b/graph/incidents_graphml/e/ef1100f0-2d4f-11ef-80f2-29529499b1dd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.86
+ 100.64.44.86
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.159.145.125
+ 10.159.145.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1718700680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef1100f0-2d4f-11ef-80f2-29529499b1dd
+
+
+
diff --git a/graph/incidents_graphml/e/ef127f20-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/e/ef127f20-59ba-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5018ea4a3038d68b5974d116026ef20473dd2baf
--- /dev/null
+++ b/graph/incidents_graphml/e/ef127f20-59ba-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.76
+ 100.64.20.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695436990
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef127f20-59ba-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/e/ef1290c0-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ef1290c0-95b3-11ee-a46e-7b17a4f6b26c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52e85f15509ee7f3b55b104c04393ed09bb3487c
--- /dev/null
+++ b/graph/incidents_graphml/e/ef1290c0-95b3-11ee-a46e-7b17a4f6b26c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.96.46
+ 100.64.96.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702031053
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef1290c0-95b3-11ee-a46e-7b17a4f6b26c
+
+
+
diff --git a/graph/incidents_graphml/e/ef16dc00-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/e/ef16dc00-1068-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ab64352a6e5e5121fb3009030e5c2c0fe4858b6
--- /dev/null
+++ b/graph/incidents_graphml/e/ef16dc00-1068-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.225
+ USER-0015-1208.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687375337
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef16dc00-1068-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/e/ef271890-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/e/ef271890-59ba-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b1eda40fa56fd9fc7d99b5bc7b9d051a914713d4
--- /dev/null
+++ b/graph/incidents_graphml/e/ef271890-59ba-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695436990
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef271890-59ba-11ee-8c81-27ac3690fef9
+
+
+ INCIDENT_LINK
+ 1695436990
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef271890-59ba-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/e/ef28a360-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/e/ef28a360-1f1b-11ee-9e2e-57c890ee02a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..647deff533bac90d7affe11b2d34369aebb2a0ac
--- /dev/null
+++ b/graph/incidents_graphml/e/ef28a360-1f1b-11ee-9e2e-57c890ee02a2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.69
+ 100.64.47.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688991533
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef28a360-1f1b-11ee-9e2e-57c890ee02a2
+
+
+
diff --git a/graph/incidents_graphml/e/ef2e1310-6d66-11ee-acf4-ebf255c20472.graphml b/graph/incidents_graphml/e/ef2e1310-6d66-11ee-acf4-ebf255c20472.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..526f7052d625b1531c45a2fab1f8a1d51acef330
--- /dev/null
+++ b/graph/incidents_graphml/e/ef2e1310-6d66-11ee-acf4-ebf255c20472.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.93
+ 100.64.56.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697599936
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef2e1310-6d66-11ee-acf4-ebf255c20472
+
+
+
diff --git a/graph/incidents_graphml/e/ef37a070-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/e/ef37a070-0bf4-11ee-9b02-ffb3de173f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3705fdc29a3a9a715714def86366a6d9c0e523b0
--- /dev/null
+++ b/graph/incidents_graphml/e/ef37a070-0bf4-11ee-9b02-ffb3de173f5d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.207
+ 100.64.80.207
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.157
+ 100.64.78.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686885710
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef37a070-0bf4-11ee-9b02-ffb3de173f5d
+
+
+ INCIDENT_LINK
+ 1686885710
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef37a070-0bf4-11ee-9b02-ffb3de173f5d
+
+
+
diff --git a/graph/incidents_graphml/e/ef38a4c0-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/e/ef38a4c0-59ba-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50336b2a717e2c4e23133a13bea7cd40ee61d265
--- /dev/null
+++ b/graph/incidents_graphml/e/ef38a4c0-59ba-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695436990
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ef38a4c0-59ba-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/e/ef3d0440-f30a-11ee-9a5d-cb0254535644.graphml b/graph/incidents_graphml/e/ef3d0440-f30a-11ee-9a5d-cb0254535644.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..295fac53f3448326d5835f1220a96e141f8320dd
--- /dev/null
+++ b/graph/incidents_graphml/e/ef3d0440-f30a-11ee-9a5d-cb0254535644.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.93
+ 100.64.18.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712293878
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef3d0440-f30a-11ee-9a5d-cb0254535644
+
+
+
diff --git a/graph/incidents_graphml/e/ef4124c0-234a-11ee-a619-11a50471d879.graphml b/graph/incidents_graphml/e/ef4124c0-234a-11ee-a619-11a50471d879.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1895bb72289c732ab4bbdf37e2f6250a42ac21b0
--- /dev/null
+++ b/graph/incidents_graphml/e/ef4124c0-234a-11ee-a619-11a50471d879.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.35
+ 100.64.29.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689451524
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef4124c0-234a-11ee-a619-11a50471d879
+
+
+
diff --git a/graph/incidents_graphml/e/ef4851d0-6d66-11ee-acf4-ebf255c20472.graphml b/graph/incidents_graphml/e/ef4851d0-6d66-11ee-acf4-ebf255c20472.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb1f9dc04b60b0192dd00a9343720f23a5c5b877
--- /dev/null
+++ b/graph/incidents_graphml/e/ef4851d0-6d66-11ee-acf4-ebf255c20472.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.93
+ 100.64.56.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697599936
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef4851d0-6d66-11ee-acf4-ebf255c20472
+
+
+
diff --git a/graph/incidents_graphml/e/ef4a1700-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/e/ef4a1700-0bf4-11ee-9b02-ffb3de173f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15d24fb220b31fe1e463ed5270f2f58295155665
--- /dev/null
+++ b/graph/incidents_graphml/e/ef4a1700-0bf4-11ee-9b02-ffb3de173f5d.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.75
+ 100.64.7.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.36
+ 100.64.1.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.208
+ 100.64.80.208
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686885711
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef4a1700-0bf4-11ee-9b02-ffb3de173f5d
+
+
+ INCIDENT_LINK
+ 1686885711
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef4a1700-0bf4-11ee-9b02-ffb3de173f5d
+
+
+ INCIDENT_LINK
+ 1686885711
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef4a1700-0bf4-11ee-9b02-ffb3de173f5d
+
+
+ INCIDENT_LINK
+ 1686885711
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef4a1700-0bf4-11ee-9b02-ffb3de173f5d
+
+
+
diff --git a/graph/incidents_graphml/e/ef4da370-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/e/ef4da370-1068-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a073da6a99634c4e61bca4a7b9eb84bd19a8cf30
--- /dev/null
+++ b/graph/incidents_graphml/e/ef4da370-1068-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.225
+ USER-0015-1208.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687375337
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef4da370-1068-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/e/ef5e0c70-dd4a-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/ef5e0c70-dd4a-11ed-8595-d92cdedd1bfb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a3c4830ae182a3798d6b542ce56bcab2a47633b
--- /dev/null
+++ b/graph/incidents_graphml/e/ef5e0c70-dd4a-11ed-8595-d92cdedd1bfb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.859375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.234
+ 100.64.72.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1681754943
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef5e0c70-dd4a-11ed-8595-d92cdedd1bfb
+
+
+ INCIDENT_LINK
+ 1681754943
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef5e0c70-dd4a-11ed-8595-d92cdedd1bfb
+
+
+
diff --git a/graph/incidents_graphml/e/ef613370-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/e/ef613370-1228-11ed-99ed-adca11e4059c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8148a18248f6530314487ae8d0d33bef8cbe3d43
--- /dev/null
+++ b/graph/incidents_graphml/e/ef613370-1228-11ed-99ed-adca11e4059c.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.249.41
+ 172.22.249.41
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.252
+ 100.64.86.252
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.35
+ 100.64.89.35
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.36
+ 100.64.89.36
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659420254
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef613370-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420254
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef613370-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420254
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef613370-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420254
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef613370-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420254
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef613370-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420254
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef613370-1228-11ed-99ed-adca11e4059c
+
+
+
diff --git a/graph/incidents_graphml/e/ef69fff0-2f73-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/e/ef69fff0-2f73-11ee-b11e-87149c94e410.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..31485d44a3d92b92a2a497ff71c4c3c4f9bbf39f
--- /dev/null
+++ b/graph/incidents_graphml/e/ef69fff0-2f73-11ee-b11e-87149c94e410.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.250
+ 100.64.41.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690788548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef69fff0-2f73-11ee-b11e-87149c94e410
+
+
+
diff --git a/graph/incidents_graphml/e/ef6d3c70-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/e/ef6d3c70-230b-11ee-b0f8-a7fcea0862f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..673697468e68a8f8202ee573d006f898ba958c19
--- /dev/null
+++ b/graph/incidents_graphml/e/ef6d3c70-230b-11ee-b0f8-a7fcea0862f2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.215
+ 100.64.31.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689424466
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ef6d3c70-230b-11ee-b0f8-a7fcea0862f2
+
+
+
diff --git a/graph/incidents_graphml/e/ef7a7a50-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ef7a7a50-95b3-11ee-a46e-7b17a4f6b26c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a70218acebc482d7913ea3c43d7f3322a9a0478b
--- /dev/null
+++ b/graph/incidents_graphml/e/ef7a7a50-95b3-11ee-a46e-7b17a4f6b26c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.140
+ USER-0015-1952.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1702031054
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef7a7a50-95b3-11ee-a46e-7b17a4f6b26c
+
+
+
diff --git a/graph/incidents_graphml/e/ef7fdb80-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/e/ef7fdb80-7588-11ee-8bdd-0135165fdaaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..02ee10b398f508cff5b4bba5d5fc168e757a5413
--- /dev/null
+++ b/graph/incidents_graphml/e/ef7fdb80-7588-11ee-8bdd-0135165fdaaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.97
+ 100.64.13.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698494149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef7fdb80-7588-11ee-8bdd-0135165fdaaa
+
+
+
diff --git a/graph/incidents_graphml/e/ef8d5a40-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/e/ef8d5a40-6317-11ee-bf7a-9334ddba6edc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f12a58399cd9f13b7116af697a9c4a821ab787d7
--- /dev/null
+++ b/graph/incidents_graphml/e/ef8d5a40-6317-11ee-bf7a-9334ddba6edc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.215
+ 100.64.88.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696466495
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef8d5a40-6317-11ee-bf7a-9334ddba6edc
+
+
+
diff --git a/graph/incidents_graphml/e/ef8f88f0-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ef8f88f0-95b3-11ee-a46e-7b17a4f6b26c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63f52b62ddb5be852d51951df3281474fe0fbe56
--- /dev/null
+++ b/graph/incidents_graphml/e/ef8f88f0-95b3-11ee-a46e-7b17a4f6b26c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.5.140
+ USER-0015-1952.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702031054
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef8f88f0-95b3-11ee-a46e-7b17a4f6b26c
+
+
+
diff --git a/graph/incidents_graphml/e/ef931560-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/e/ef931560-7588-11ee-8bdd-0135165fdaaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..07c88fc0d2be83022c057a3344eaf6a27e748595
--- /dev/null
+++ b/graph/incidents_graphml/e/ef931560-7588-11ee-8bdd-0135165fdaaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.97
+ 100.64.13.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698494149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ef931560-7588-11ee-8bdd-0135165fdaaa
+
+
+
diff --git a/graph/incidents_graphml/e/ef93b030-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/e/ef93b030-230b-11ee-b0f8-a7fcea0862f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82d5be6e1647d8536d60ddcce2fc80c6bd0afec1
--- /dev/null
+++ b/graph/incidents_graphml/e/ef93b030-230b-11ee-b0f8-a7fcea0862f2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.215
+ 100.64.31.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689424466
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ef93b030-230b-11ee-b0f8-a7fcea0862f2
+
+
+
diff --git a/graph/incidents_graphml/e/ef97dc50-a7f0-11ed-af31-070b715d9bbb.graphml b/graph/incidents_graphml/e/ef97dc50-a7f0-11ed-af31-070b715d9bbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5bd1d8fbe95079c43ef96ceea3fa07492ec2ec72
--- /dev/null
+++ b/graph/incidents_graphml/e/ef97dc50-a7f0-11ed-af31-070b715d9bbb.graphml
@@ -0,0 +1,785 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.200
+ 100.64.87.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.201
+ 100.64.87.201
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.202
+ 100.64.87.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.203
+ 100.64.87.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.204
+ 100.64.87.204
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.205
+ 100.64.87.205
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.206
+ 100.64.87.206
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.207
+ 100.64.87.207
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.150
+ 100.64.9.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.75.168
+ 100.64.75.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.119
+ 100.64.25.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.208
+ 100.64.87.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.209
+ 100.64.87.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.210
+ 100.64.87.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.211
+ 100.64.87.211
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-16914
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.212
+ 100.64.87.212
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.213
+ 100.64.87.213
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.214
+ 100.64.87.214
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.215
+ 100.64.87.215
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ef97dc50-a7f0-11ed-af31-070b715d9bbb
+
+
+
diff --git a/graph/incidents_graphml/e/efa423f0-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/e/efa423f0-11e8-11ed-97d5-3360f7274b74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1af8ed7b9d2633551ef946f6794dd620c055051e
--- /dev/null
+++ b/graph/incidents_graphml/e/efa423f0-11e8-11ed-97d5-3360f7274b74.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.21
+ 100.64.73.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.137
+ 100.64.77.137
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659392766
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efa423f0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392766
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efa423f0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392766
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efa423f0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392766
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efa423f0-11e8-11ed-97d5-3360f7274b74
+
+
+
diff --git a/graph/incidents_graphml/e/efa7fcf0-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/e/efa7fcf0-7588-11ee-8bdd-0135165fdaaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..221df94e84d44a45ba2c7acdce19f99d3836b6ff
--- /dev/null
+++ b/graph/incidents_graphml/e/efa7fcf0-7588-11ee-8bdd-0135165fdaaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.97
+ 100.64.13.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698494149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ efa7fcf0-7588-11ee-8bdd-0135165fdaaa
+
+
+
diff --git a/graph/incidents_graphml/e/efaeb240-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/e/efaeb240-230b-11ee-b0f8-a7fcea0862f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f497bb3b6c4edac353f49d47d0f9ea0e10852b0
--- /dev/null
+++ b/graph/incidents_graphml/e/efaeb240-230b-11ee-b0f8-a7fcea0862f2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.19
+ 100.64.9.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689424466
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ efaeb240-230b-11ee-b0f8-a7fcea0862f2
+
+
+
diff --git a/graph/incidents_graphml/e/efb89ec0-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/e/efb89ec0-7588-11ee-8bdd-0135165fdaaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b65562946033744462ceaed0728b5a5f5394aafc
--- /dev/null
+++ b/graph/incidents_graphml/e/efb89ec0-7588-11ee-8bdd-0135165fdaaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.97
+ 100.64.13.97
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698494149
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ efb89ec0-7588-11ee-8bdd-0135165fdaaa
+
+
+
diff --git a/graph/incidents_graphml/e/efbd0d40-2d97-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/efbd0d40-2d97-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c35b28a6e272af42e2a00e6ea156582298430b8
--- /dev/null
+++ b/graph/incidents_graphml/e/efbd0d40-2d97-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,121 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.252
+ 100.64.52.252
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.244
+ 100.64.8.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690584108
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ efbd0d40-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584108
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ efbd0d40-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584108
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ efbd0d40-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584108
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ efbd0d40-2d97-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/e/efcade40-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/e/efcade40-0fae-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..692bbbefeaaa6775bafadf6bc68054899ec2663f
--- /dev/null
+++ b/graph/incidents_graphml/e/efcade40-0fae-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.231
+ USER-0015-1934.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687295451
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ efcade40-0fae-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/e/efd01ee0-2dd6-11ef-a033-7190c885d3e4.graphml b/graph/incidents_graphml/e/efd01ee0-2dd6-11ef-a033-7190c885d3e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3420a2903db8d69e94f2dfd05d8ae4ad330940f6
--- /dev/null
+++ b/graph/incidents_graphml/e/efd01ee0-2dd6-11ef-a033-7190c885d3e4.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.243
+ 100.64.50.243
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.120
+ 100.64.8.120
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.131
+ 100.64.62.131
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.37
+ USER-0015-1466.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.111
+ 100.64.65.111
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.30
+ 100.64.7.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.232
+ 100.64.43.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.112
+ 100.64.65.112
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+ INCIDENT_LINK
+ 1718758664
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efd01ee0-2dd6-11ef-a033-7190c885d3e4
+
+
+
diff --git a/graph/incidents_graphml/e/efd6dc10-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/e/efd6dc10-452b-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dcf5baccb9605971990102fb4c8d3039b46b50f2
--- /dev/null
+++ b/graph/incidents_graphml/e/efd6dc10-452b-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.125
+ 100.64.12.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176550
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ efd6dc10-452b-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/e/efd8d700-28d3-11ee-97fa-5dcf6851b43e.graphml b/graph/incidents_graphml/e/efd8d700-28d3-11ee-97fa-5dcf6851b43e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d73c1019958691ef98c44193fbc7dc5adca13bba
--- /dev/null
+++ b/graph/incidents_graphml/e/efd8d700-28d3-11ee-97fa-5dcf6851b43e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.92
+ 100.64.85.92
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690060122
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ efd8d700-28d3-11ee-97fa-5dcf6851b43e
+
+
+
diff --git a/graph/incidents_graphml/e/efdcb2c0-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/e/efdcb2c0-6317-11ee-bf7a-9334ddba6edc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d179cfb655c0d4fc27a5d787f6093ca575119db
--- /dev/null
+++ b/graph/incidents_graphml/e/efdcb2c0-6317-11ee-bf7a-9334ddba6edc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.217
+ 100.64.88.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696466495
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ efdcb2c0-6317-11ee-bf7a-9334ddba6edc
+
+
+
diff --git a/graph/incidents_graphml/e/efe4aaa0-42ad-11ee-912e-5fdb65c11aab.graphml b/graph/incidents_graphml/e/efe4aaa0-42ad-11ee-912e-5fdb65c11aab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ea9919458847c7f977866fe531229000ffa2718
--- /dev/null
+++ b/graph/incidents_graphml/e/efe4aaa0-42ad-11ee-912e-5fdb65c11aab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.174
+ 100.64.21.174
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692902531
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ efe4aaa0-42ad-11ee-912e-5fdb65c11aab
+
+
+
diff --git a/graph/incidents_graphml/e/efe55610-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/e/efe55610-9c29-11ed-a223-eb3483e385f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cea517764cf822c3a4ca6abcce176c17d995a9a4
--- /dev/null
+++ b/graph/incidents_graphml/e/efe55610-9c29-11ed-a223-eb3483e385f1.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.146
+ 100.64.72.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.147
+ 100.64.72.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.148
+ 100.64.72.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.149
+ 100.64.72.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1674593945
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efe55610-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593945
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efe55610-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593945
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efe55610-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593945
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efe55610-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593945
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efe55610-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593945
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efe55610-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593945
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efe55610-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593945
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efe55610-9c29-11ed-a223-eb3483e385f1
+
+
+
diff --git a/graph/incidents_graphml/e/efe55b00-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/e/efe55b00-452b-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fd7998d8d6b52f1798a2cccf37693ef7a2e3895
--- /dev/null
+++ b/graph/incidents_graphml/e/efe55b00-452b-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.63
+ 100.64.38.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176550
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ efe55b00-452b-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/e/efee1db0-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/e/efee1db0-0fae-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b543445f82a961e1944aa0e4a2b7ef0b922fa8bd
--- /dev/null
+++ b/graph/incidents_graphml/e/efee1db0-0fae-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.232
+ 100.64.82.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687295452
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ efee1db0-0fae-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/e/efef7770-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/e/efef7770-6317-11ee-bf7a-9334ddba6edc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4659b806797a51f7db972f70559b19582c4be51
--- /dev/null
+++ b/graph/incidents_graphml/e/efef7770-6317-11ee-bf7a-9334ddba6edc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.217
+ 100.64.88.217
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696466495
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ efef7770-6317-11ee-bf7a-9334ddba6edc
+
+
+
diff --git a/graph/incidents_graphml/e/eff40020-28d3-11ee-97fa-5dcf6851b43e.graphml b/graph/incidents_graphml/e/eff40020-28d3-11ee-97fa-5dcf6851b43e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbfe621e2a23ea57fd54f676e3cdb38ddaf7e3af
--- /dev/null
+++ b/graph/incidents_graphml/e/eff40020-28d3-11ee-97fa-5dcf6851b43e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.90.184
+ 172.25.90.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.97
+ 100.64.85.97
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.98
+ 100.64.85.98
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690060122
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eff40020-28d3-11ee-97fa-5dcf6851b43e
+
+
+ INCIDENT_LINK
+ 1690060122
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eff40020-28d3-11ee-97fa-5dcf6851b43e
+
+
+ INCIDENT_LINK
+ 1690060122
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eff40020-28d3-11ee-97fa-5dcf6851b43e
+
+
+ INCIDENT_LINK
+ 1690060122
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ eff40020-28d3-11ee-97fa-5dcf6851b43e
+
+
+
diff --git a/graph/incidents_graphml/e/eff4f070-a7f0-11ed-af31-070b715d9bbb.graphml b/graph/incidents_graphml/e/eff4f070-a7f0-11ed-af31-070b715d9bbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dec8389f4a90194bb6fbd2997d4b4ade601c8408
--- /dev/null
+++ b/graph/incidents_graphml/e/eff4f070-a7f0-11ed-af31-070b715d9bbb.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.28.113.148
+ 172.28.113.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.1.8
+ 100.64.1.8
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.238
+ 100.64.87.238
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.170
+ 100.64.86.170
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.239
+ 100.64.87.239
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.240
+ 100.64.87.240
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.241
+ 100.64.87.241
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.242
+ 100.64.87.242
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ eff4f070-a7f0-11ed-af31-070b715d9bbb
+
+
+
diff --git a/graph/incidents_graphml/e/eff51270-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/e/eff51270-452b-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00e8e8fd68b24cd701f3005f5c2b7b9eb5b6d648
--- /dev/null
+++ b/graph/incidents_graphml/e/eff51270-452b-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.63
+ 100.64.38.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176550
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ eff51270-452b-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/f/f0017060-5061-11ee-a936-57e582280eb3.graphml b/graph/incidents_graphml/f/f0017060-5061-11ee-a936-57e582280eb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b5bdfe2748ef467f3a2b559aaad8c345bd8b1d9
--- /dev/null
+++ b/graph/incidents_graphml/f/f0017060-5061-11ee-a936-57e582280eb3.graphml
@@ -0,0 +1,287 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.91
+ 100.64.23.91
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.92
+ 100.64.23.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.93
+ USER-0015-1240.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.94
+ 100.64.23.94
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.95
+ 100.64.23.95
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.96
+ 100.64.23.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.29
+ 100.64.8.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.56
+ 100.64.9.56
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409206
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0017060-5061-11ee-a936-57e582280eb3
+
+
+
diff --git a/graph/incidents_graphml/f/f0042540-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/f/f0042540-230b-11ee-b0f8-a7fcea0862f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8df9753673c4f01614c107e0e785659ad07a17b1
--- /dev/null
+++ b/graph/incidents_graphml/f/f0042540-230b-11ee-b0f8-a7fcea0862f2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.231
+ 100.64.45.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689424467
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0042540-230b-11ee-b0f8-a7fcea0862f2
+
+
+
diff --git a/graph/incidents_graphml/f/f0044070-3fac-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/f/f0044070-3fac-11ef-931a-1d289e4afac0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5169738e987c2d835cf96b2466d0564cdeb6a39e
--- /dev/null
+++ b/graph/incidents_graphml/f/f0044070-3fac-11ef-931a-1d289e4afac0.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.10.155
+ 172.27.10.155
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.115
+ 100.64.90.115
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.147
+ 100.64.86.147
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720719746
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0044070-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719746
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0044070-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719746
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0044070-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719746
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0044070-3fac-11ef-931a-1d289e4afac0
+
+
+
diff --git a/graph/incidents_graphml/f/f00d1760-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f00d1760-0fae-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27daaf8ec2a67efbee7ae4528ff01860b850801a
--- /dev/null
+++ b/graph/incidents_graphml/f/f00d1760-0fae-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.232
+ 100.64.82.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687295452
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f00d1760-0fae-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/f01f01b0-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f01f01b0-7588-11ee-8bdd-0135165fdaaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ca4b563770e0a54aac6e1e2e3f3f7ab1bd41da6
--- /dev/null
+++ b/graph/incidents_graphml/f/f01f01b0-7588-11ee-8bdd-0135165fdaaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.99
+ 100.64.13.99
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698494150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f01f01b0-7588-11ee-8bdd-0135165fdaaa
+
+
+
diff --git a/graph/incidents_graphml/f/f027d9e0-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/f/f027d9e0-230b-11ee-b0f8-a7fcea0862f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d2e163bbebbd0ee76127d9915ec071f720ec7a14
--- /dev/null
+++ b/graph/incidents_graphml/f/f027d9e0-230b-11ee-b0f8-a7fcea0862f2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.231
+ 100.64.45.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689424467
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f027d9e0-230b-11ee-b0f8-a7fcea0862f2
+
+
+
diff --git a/graph/incidents_graphml/f/f029ff20-9cf8-11ed-8fd7-753be03cabc2.graphml b/graph/incidents_graphml/f/f029ff20-9cf8-11ed-8fd7-753be03cabc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88d47ae8f6998caf84e8c3f4825b746dda896b46
--- /dev/null
+++ b/graph/incidents_graphml/f/f029ff20-9cf8-11ed-8fd7-753be03cabc2.graphml
@@ -0,0 +1,767 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.61
+ 100.64.97.61
+ ["Exploiting Host"]
+ 0.8576171875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.62
+ 100.64.97.62
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.905078125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.31.204
+ 100.64.31.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.63
+ 100.64.97.63
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.64
+ 100.64.97.64
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ CRED
+ CRED-0015
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ HOST
+ 100.64.21.22
+ 100.64.21.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.80.58
+ 100.64.80.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.65
+ 100.64.97.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.325
+ ["Barracuda WAF"]
+
+
+ CRED
+ CRED-0016
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ HOST
+ 100.64.38.73
+ 100.64.38.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.81.253
+ 100.64.81.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.84.239
+ 100.64.84.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.66
+ 100.64.97.66
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+ INCIDENT_LINK
+ 1674682851
+ malicious
+ 0.905078125
+ 0.905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f029ff20-9cf8-11ed-8fd7-753be03cabc2
+
+
+
diff --git a/graph/incidents_graphml/f/f02ff1a0-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f02ff1a0-7588-11ee-8bdd-0135165fdaaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ff9ec17aa95c851614a74a268ade8a8ab7a13a7
--- /dev/null
+++ b/graph/incidents_graphml/f/f02ff1a0-7588-11ee-8bdd-0135165fdaaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.99
+ 100.64.13.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698494150
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f02ff1a0-7588-11ee-8bdd-0135165fdaaa
+
+
+
diff --git a/graph/incidents_graphml/f/f035ca90-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f035ca90-0a07-11ee-9f50-eb86987e1788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a273c9450e98b4b6c6a7afec612582da40931fb
--- /dev/null
+++ b/graph/incidents_graphml/f/f035ca90-0a07-11ee-9f50-eb86987e1788.graphml
@@ -0,0 +1,545 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.237
+ 100.64.28.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.238
+ HOST-5730
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.99
+ 100.64.18.99
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.239
+ 100.64.28.239
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.243
+ 100.64.24.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.240
+ 100.64.28.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.133
+ 100.64.27.133
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.77
+ USER-0015-1276.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.241
+ 100.64.28.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.242
+ 100.64.28.242
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.101
+ 100.64.18.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.243
+ 100.64.28.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.244
+ 100.64.28.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.245
+ 100.64.28.245
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f035ca90-0a07-11ee-9f50-eb86987e1788
+
+
+
diff --git a/graph/incidents_graphml/f/f03854a0-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/f/f03854a0-4efd-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..589253caef033d2d2252e22532bbb59d4998f147
--- /dev/null
+++ b/graph/incidents_graphml/f/f03854a0-4efd-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.83
+ 100.64.6.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694256305
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f03854a0-4efd-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/f/f03d3810-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f03d3810-7588-11ee-8bdd-0135165fdaaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..415112613707e1a1211badfa973e0d2420df2221
--- /dev/null
+++ b/graph/incidents_graphml/f/f03d3810-7588-11ee-8bdd-0135165fdaaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.101
+ 100.64.13.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698494150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f03d3810-7588-11ee-8bdd-0135165fdaaa
+
+
+
diff --git a/graph/incidents_graphml/f/f0436fa0-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/f/f0436fa0-95b3-11ee-a46e-7b17a4f6b26c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f07eda0a41f1a712a6532774b7c4ea7134ecce33
--- /dev/null
+++ b/graph/incidents_graphml/f/f0436fa0-95b3-11ee-a46e-7b17a4f6b26c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.48
+ 100.64.96.48
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1702031055
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0436fa0-95b3-11ee-a46e-7b17a4f6b26c
+
+
+
diff --git a/graph/incidents_graphml/f/f0491d80-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/f/f0491d80-4efd-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8fd9db05654040ebda2076e0d9462cd33ecd5856
--- /dev/null
+++ b/graph/incidents_graphml/f/f0491d80-4efd-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.83
+ 100.64.6.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694256306
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0491d80-4efd-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/f/f04e2800-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f04e2800-7588-11ee-8bdd-0135165fdaaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e691c57237f9ccc7164b8ca069fa18b8a76f72a
--- /dev/null
+++ b/graph/incidents_graphml/f/f04e2800-7588-11ee-8bdd-0135165fdaaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.101
+ 100.64.13.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698494150
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f04e2800-7588-11ee-8bdd-0135165fdaaa
+
+
+
diff --git a/graph/incidents_graphml/f/f0542800-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f0542800-0a07-11ee-9f50-eb86987e1788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c847be261c3dd74ca93e3199aa8b50efae8e2cf
--- /dev/null
+++ b/graph/incidents_graphml/f/f0542800-0a07-11ee-9f50-eb86987e1788.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.1
+ 100.64.29.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.2
+ 100.64.29.2
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.3
+ 100.64.29.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.4
+ 100.64.29.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.5
+ 100.64.29.5
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.61
+ 100.64.12.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673970
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0542800-0a07-11ee-9f50-eb86987e1788
+
+
+
diff --git a/graph/incidents_graphml/f/f056c320-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/f/f056c320-1f1b-11ee-9e2e-57c890ee02a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4c1958373394325d336366073f830ededff6fd5
--- /dev/null
+++ b/graph/incidents_graphml/f/f056c320-1f1b-11ee-9e2e-57c890ee02a2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.71
+ 100.64.47.71
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688991535
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f056c320-1f1b-11ee-9e2e-57c890ee02a2
+
+
+
diff --git a/graph/incidents_graphml/f/f05bbc90-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f05bbc90-7588-11ee-8bdd-0135165fdaaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6dcf38017d57f9c7bc4ba0c6f9f1ad6d735cda55
--- /dev/null
+++ b/graph/incidents_graphml/f/f05bbc90-7588-11ee-8bdd-0135165fdaaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.103
+ 100.64.13.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698494150
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f05bbc90-7588-11ee-8bdd-0135165fdaaa
+
+
+
diff --git a/graph/incidents_graphml/f/f05bee80-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/f/f05bee80-9172-11ee-94be-75b251a8fc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c55f9e8a7fae878658799e7e20ae1f4daa7bb0b
--- /dev/null
+++ b/graph/incidents_graphml/f/f05bee80-9172-11ee-94be-75b251a8fc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.64
+ 100.64.35.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701563334
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f05bee80-9172-11ee-94be-75b251a8fc8a
+
+
+
diff --git a/graph/incidents_graphml/f/f0607610-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/f/f0607610-230b-11ee-b0f8-a7fcea0862f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c60378cea866d1229447d3b3a767e4a6ada1fb7e
--- /dev/null
+++ b/graph/incidents_graphml/f/f0607610-230b-11ee-b0f8-a7fcea0862f2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.175
+ 100.64.16.175
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689424468
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f0607610-230b-11ee-b0f8-a7fcea0862f2
+
+
+
diff --git a/graph/incidents_graphml/f/f060c830-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f060c830-5b06-11ee-9ed7-8fb556fb8db7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7c8a65d4877e21cc7fafefa1f54d4482c6495c9
--- /dev/null
+++ b/graph/incidents_graphml/f/f060c830-5b06-11ee-9ed7-8fb556fb8db7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.235
+ 100.64.35.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695579585
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f060c830-5b06-11ee-9ed7-8fb556fb8db7
+
+
+
diff --git a/graph/incidents_graphml/f/f0676620-dd4a-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/f/f0676620-dd4a-11ed-8595-d92cdedd1bfb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..07dd7c304bbf13117b1813fbfef5c6656d4c059b
--- /dev/null
+++ b/graph/incidents_graphml/f/f0676620-dd4a-11ed-8595-d92cdedd1bfb.graphml
@@ -0,0 +1,135 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.9915625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.235
+ 100.64.72.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.236
+ 100.64.72.236
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.218
+ 100.64.71.218
+ ["Exploiting Target","Exploiting Host"]
+ 0.859375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681754944
+ malicious
+ 0.9915625
+ 0.9915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0676620-dd4a-11ed-8595-d92cdedd1bfb
+
+
+ INCIDENT_LINK
+ 1681754944
+ malicious
+ 0.9915625
+ 0.9915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0676620-dd4a-11ed-8595-d92cdedd1bfb
+
+
+ INCIDENT_LINK
+ 1681754944
+ malicious
+ 0.9915625
+ 0.9915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0676620-dd4a-11ed-8595-d92cdedd1bfb
+
+
+ INCIDENT_LINK
+ 1681754944
+ malicious
+ 0.9915625
+ 0.9915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0676620-dd4a-11ed-8595-d92cdedd1bfb
+
+
+ INCIDENT_LINK
+ 1681754944
+ malicious
+ 0.9915625
+ 0.9915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0676620-dd4a-11ed-8595-d92cdedd1bfb
+
+
+
diff --git a/graph/incidents_graphml/f/f067b9f0-2efc-11ee-bea9-c5ecb1b621be.graphml b/graph/incidents_graphml/f/f067b9f0-2efc-11ee-bea9-c5ecb1b621be.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15bfc8ca2ef240bc2db1053a20b02df8fa377647
--- /dev/null
+++ b/graph/incidents_graphml/f/f067b9f0-2efc-11ee-bea9-c5ecb1b621be.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.235
+ 100.64.81.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.114
+ 100.64.71.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690737439
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f067b9f0-2efc-11ee-bea9-c5ecb1b621be
+
+
+
diff --git a/graph/incidents_graphml/f/f06ad7c0-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f06ad7c0-7588-11ee-8bdd-0135165fdaaa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f842566f9d50822fd38d6316be476521be17af1b
--- /dev/null
+++ b/graph/incidents_graphml/f/f06ad7c0-7588-11ee-8bdd-0135165fdaaa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.103
+ 100.64.13.103
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698494150
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f06ad7c0-7588-11ee-8bdd-0135165fdaaa
+
+
+
diff --git a/graph/incidents_graphml/f/f06b5ed0-435e-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/f/f06b5ed0-435e-11ef-9e66-fd84d5bf3736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7475c73ef1b3bda1d697f8905d63b1f754e56f5e
--- /dev/null
+++ b/graph/incidents_graphml/f/f06b5ed0-435e-11ef-9e66-fd84d5bf3736.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.65
+ 100.64.28.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721126051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f06b5ed0-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f06b5ed0-435e-11ef-9e66-fd84d5bf3736
+
+
+
diff --git a/graph/incidents_graphml/f/f06cde70-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/f/f06cde70-9172-11ee-94be-75b251a8fc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2375cc499072971155ee81763e6e799dbd1d6348
--- /dev/null
+++ b/graph/incidents_graphml/f/f06cde70-9172-11ee-94be-75b251a8fc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.64
+ 100.64.35.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701563334
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f06cde70-9172-11ee-94be-75b251a8fc8a
+
+
+
diff --git a/graph/incidents_graphml/f/f06d7260-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f06d7260-5b06-11ee-9ed7-8fb556fb8db7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a095b7fb6480912c38cee7825fa5162b945ae70
--- /dev/null
+++ b/graph/incidents_graphml/f/f06d7260-5b06-11ee-9ed7-8fb556fb8db7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.10
+ 100.64.16.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695579585
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f06d7260-5b06-11ee-9ed7-8fb556fb8db7
+
+
+
diff --git a/graph/incidents_graphml/f/f072a280-2a32-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/f/f072a280-2a32-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5246471d3703599606368ba0d4c63fbf30c1a0a
--- /dev/null
+++ b/graph/incidents_graphml/f/f072a280-2a32-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.56.204
+ 100.64.56.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.22.254
+ 100.64.22.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690210876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f072a280-2a32-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f072a280-2a32-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f072a280-2a32-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f072a280-2a32-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/f/f07337b0-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/f07337b0-1068-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e59687da83cc33353cc880555df28d52a6c66dde
--- /dev/null
+++ b/graph/incidents_graphml/f/f07337b0-1068-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.227
+ 100.64.15.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687375339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f07337b0-1068-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/f/f07a6ab0-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f07a6ab0-5b06-11ee-9ed7-8fb556fb8db7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4fa4b493ad492c0e8ffa856a4b4bfa661dd0da48
--- /dev/null
+++ b/graph/incidents_graphml/f/f07a6ab0-5b06-11ee-9ed7-8fb556fb8db7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.10
+ 100.64.16.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695579585
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f07a6ab0-5b06-11ee-9ed7-8fb556fb8db7
+
+
+
diff --git a/graph/incidents_graphml/f/f07b6460-435e-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/f/f07b6460-435e-11ef-9e66-fd84d5bf3736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..617ce32fb98c13dd2f792e0123dc218d3bee87e7
--- /dev/null
+++ b/graph/incidents_graphml/f/f07b6460-435e-11ef-9e66-fd84d5bf3736.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.67
+ 100.64.28.67
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.68
+ USER-0015-1269.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.69
+ 100.64.28.69
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721126051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f07b6460-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f07b6460-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f07b6460-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f07b6460-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f07b6460-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f07b6460-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f07b6460-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f07b6460-435e-11ef-9e66-fd84d5bf3736
+
+
+
diff --git a/graph/incidents_graphml/f/f07ca980-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/f07ca980-04ca-11ed-ab4e-45e26abbd382.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c65b39d987757d06496d7e1bf03966de73652c02
--- /dev/null
+++ b/graph/incidents_graphml/f/f07ca980-04ca-11ed-ab4e-45e26abbd382.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.54
+ 100.64.79.54
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657950518
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f07ca980-04ca-11ed-ab4e-45e26abbd382
+
+
+ INCIDENT_LINK
+ 1657950518
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f07ca980-04ca-11ed-ab4e-45e26abbd382
+
+
+
diff --git a/graph/incidents_graphml/f/f07f13e0-0f7e-11ee-a9d1-514a3be7d931.graphml b/graph/incidents_graphml/f/f07f13e0-0f7e-11ee-a9d1-514a3be7d931.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7641c9a83dc9adea37e023671fe4b7304ad12597
--- /dev/null
+++ b/graph/incidents_graphml/f/f07f13e0-0f7e-11ee-a9d1-514a3be7d931.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687274837
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f07f13e0-0f7e-11ee-a9d1-514a3be7d931
+
+
+
diff --git a/graph/incidents_graphml/f/f092e360-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/f/f092e360-6317-11ee-bf7a-9334ddba6edc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6f5258c5f0ffd326787827048a8f24ad812e3db
--- /dev/null
+++ b/graph/incidents_graphml/f/f092e360-6317-11ee-bf7a-9334ddba6edc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.219
+ 100.64.88.219
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696466496
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f092e360-6317-11ee-bf7a-9334ddba6edc
+
+
+
diff --git a/graph/incidents_graphml/f/f0951bc0-4135-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/f/f0951bc0-4135-11ee-89c1-af7b5492d246.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db8c57622e63999830fe829abdfe94f0b6798a3f
--- /dev/null
+++ b/graph/incidents_graphml/f/f0951bc0-4135-11ee-89c1-af7b5492d246.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.120
+ 100.64.16.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1692741042
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0951bc0-4135-11ee-89c1-af7b5492d246
+
+
+
diff --git a/graph/incidents_graphml/f/f096f360-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f096f360-5b06-11ee-9ed7-8fb556fb8db7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..804960412e6d9fee4375c4800ce27d820127de95
--- /dev/null
+++ b/graph/incidents_graphml/f/f096f360-5b06-11ee-9ed7-8fb556fb8db7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.182
+ 100.64.41.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695579586
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f096f360-5b06-11ee-9ed7-8fb556fb8db7
+
+
+
diff --git a/graph/incidents_graphml/f/f09798c0-eb97-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/f/f09798c0-eb97-11ee-8f3a-6b2412cfa52f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f7515c7e6907664f23addc719233944282967ca
--- /dev/null
+++ b/graph/incidents_graphml/f/f09798c0-eb97-11ee-8f3a-6b2412cfa52f.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.121.238.220
+ 10.121.238.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","PAN NGFW","Vulnerability Management","Windows Active Directory"]
+
+
+ HOST
+ 100.64.70.26
+ 100.64.70.26
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.27
+ 100.64.70.27
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.28
+ 100.64.70.28
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.29
+ 100.64.70.29
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.30
+ 100.64.70.30
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.31
+ 100.64.70.31
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.154
+ 100.64.69.154
+ ["Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474830
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f09798c0-eb97-11ee-8f3a-6b2412cfa52f
+
+
+
diff --git a/graph/incidents_graphml/f/f0a4c450-0f7e-11ee-a9d1-514a3be7d931.graphml b/graph/incidents_graphml/f/f0a4c450-0f7e-11ee-a9d1-514a3be7d931.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5cb8d24e04856e6626b0a5ba87e891f21dfbef89
--- /dev/null
+++ b/graph/incidents_graphml/f/f0a4c450-0f7e-11ee-a9d1-514a3be7d931.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687274837
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f0a4c450-0f7e-11ee-a9d1-514a3be7d931
+
+
+
diff --git a/graph/incidents_graphml/f/f0a56f70-4135-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/f/f0a56f70-4135-11ee-89c1-af7b5492d246.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ac6685fe956e8bc9ead99375aa5ce9a933c6973
--- /dev/null
+++ b/graph/incidents_graphml/f/f0a56f70-4135-11ee-89c1-af7b5492d246.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.16.120
+ 100.64.16.120
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692741042
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f0a56f70-4135-11ee-89c1-af7b5492d246
+
+
+
diff --git a/graph/incidents_graphml/f/f0a59960-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0a59960-5b06-11ee-9ed7-8fb556fb8db7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..73be7cd92a718c6b8ec4bf611a18158b4cda0c85
--- /dev/null
+++ b/graph/incidents_graphml/f/f0a59960-5b06-11ee-9ed7-8fb556fb8db7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.182
+ 100.64.41.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695579586
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f0a59960-5b06-11ee-9ed7-8fb556fb8db7
+
+
+
diff --git a/graph/incidents_graphml/f/f0a95b00-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f0a95b00-0cc7-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1fae7ffaffbfa15920a3c00b233debb892b298d3
--- /dev/null
+++ b/graph/incidents_graphml/f/f0a95b00-0cc7-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.17
+ USER-0015-1187.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686976337
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0a95b00-0cc7-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/f/f0a98f60-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f0a98f60-5b66-11ee-a387-a18350d70540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..406a1f65631b2810d81110fe654fddc517447731
--- /dev/null
+++ b/graph/incidents_graphml/f/f0a98f60-5b66-11ee-a387-a18350d70540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.119
+ 100.64.35.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695620817
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f0a98f60-5b66-11ee-a387-a18350d70540
+
+
+
diff --git a/graph/incidents_graphml/f/f0aef110-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/f/f0aef110-59ba-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7a486f856fd819eecbd99cc842d13033d703081
--- /dev/null
+++ b/graph/incidents_graphml/f/f0aef110-59ba-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.185
+ 100.64.58.185
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695436993
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0aef110-59ba-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/f/f0b03d40-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f0b03d40-9268-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a057915ab21638c52ea4986e83b9c08325994645
--- /dev/null
+++ b/graph/incidents_graphml/f/f0b03d40-9268-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.187
+ 100.64.65.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701668990
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b03d40-9268-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/f/f0b291b0-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0b291b0-5b06-11ee-9ed7-8fb556fb8db7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9db987914a280cf3197d02a1d933c5baa0006e0a
--- /dev/null
+++ b/graph/incidents_graphml/f/f0b291b0-5b06-11ee-9ed7-8fb556fb8db7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.184
+ 100.64.41.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695579586
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b291b0-5b06-11ee-9ed7-8fb556fb8db7
+
+
+
diff --git a/graph/incidents_graphml/f/f0b4ab00-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f0b4ab00-2f61-11ef-b208-d10830cadc66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..733cb6b2934f10653e1125b0874ae5d97f00acf2
--- /dev/null
+++ b/graph/incidents_graphml/f/f0b4ab00-2f61-11ef-b208-d10830cadc66.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.116.174
+ USER-0015-2012.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.239
+ 100.64.88.239
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.42.189
+ USER-0015-1969.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.240
+ 100.64.88.240
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.241
+ 100.64.88.241
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.13
+ 100.64.87.13
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.20.184.163
+ USER-0015-2013.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.242
+ 100.64.88.242
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.243
+ 100.64.88.243
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928317
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0b4ab00-2f61-11ef-b208-d10830cadc66
+
+
+
diff --git a/graph/incidents_graphml/f/f0bfff30-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0bfff30-5b06-11ee-9ed7-8fb556fb8db7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..724d96e4783a30346ffe7411323ec293f03811b3
--- /dev/null
+++ b/graph/incidents_graphml/f/f0bfff30-5b06-11ee-9ed7-8fb556fb8db7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.184
+ 100.64.41.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695579586
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f0bfff30-5b06-11ee-9ed7-8fb556fb8db7
+
+
+
diff --git a/graph/incidents_graphml/f/f0c125f0-0f7e-11ee-a9d1-514a3be7d931.graphml b/graph/incidents_graphml/f/f0c125f0-0f7e-11ee-a9d1-514a3be7d931.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b25f83dd8579d60c45961ead9c7862a8b04728f4
--- /dev/null
+++ b/graph/incidents_graphml/f/f0c125f0-0f7e-11ee-a9d1-514a3be7d931.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.128
+ 100.64.28.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687274837
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0c125f0-0f7e-11ee-a9d1-514a3be7d931
+
+
+
diff --git a/graph/incidents_graphml/f/f0cc0d20-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0cc0d20-5b06-11ee-9ed7-8fb556fb8db7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e1c2bb3e89bc00e7ef0a52fefb9e48b228493ed
--- /dev/null
+++ b/graph/incidents_graphml/f/f0cc0d20-5b06-11ee-9ed7-8fb556fb8db7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.186
+ 100.64.41.186
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695579586
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0cc0d20-5b06-11ee-9ed7-8fb556fb8db7
+
+
+
diff --git a/graph/incidents_graphml/f/f0cce250-23a1-11ee-b3c4-1b81ee59f0d7.graphml b/graph/incidents_graphml/f/f0cce250-23a1-11ee-b3c4-1b81ee59f0d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c12eb522cc755cd3a20c8847772540eaf22bc423
--- /dev/null
+++ b/graph/incidents_graphml/f/f0cce250-23a1-11ee-b3c4-1b81ee59f0d7.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.41
+ 100.64.69.41
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.42
+ 100.64.69.42
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.43
+ 100.64.69.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1689488893
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0cce250-23a1-11ee-b3c4-1b81ee59f0d7
+
+
+ INCIDENT_LINK
+ 1689488893
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0cce250-23a1-11ee-b3c4-1b81ee59f0d7
+
+
+ INCIDENT_LINK
+ 1689488893
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0cce250-23a1-11ee-b3c4-1b81ee59f0d7
+
+
+ INCIDENT_LINK
+ 1689488893
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0cce250-23a1-11ee-b3c4-1b81ee59f0d7
+
+
+ INCIDENT_LINK
+ 1689488893
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0cce250-23a1-11ee-b3c4-1b81ee59f0d7
+
+
+ INCIDENT_LINK
+ 1689488893
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0cce250-23a1-11ee-b3c4-1b81ee59f0d7
+
+
+
diff --git a/graph/incidents_graphml/f/f0ce5ff0-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/f/f0ce5ff0-59ba-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2137afced70f275cfc1afa26b9f19a169aff88d8
--- /dev/null
+++ b/graph/incidents_graphml/f/f0ce5ff0-59ba-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.185
+ 100.64.58.185
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695436993
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f0ce5ff0-59ba-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/f/f0d59120-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f0d59120-1911-11ed-9439-83188f456eb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..512c3f1227d6a6ace058cfc2335f44ec1ee2976e
--- /dev/null
+++ b/graph/incidents_graphml/f/f0d59120-1911-11ed-9439-83188f456eb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.78
+ 100.64.78.78
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.222
+ 100.64.71.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660180036
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0d59120-1911-11ed-9439-83188f456eb5
+
+
+
diff --git a/graph/incidents_graphml/f/f0d8b750-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0d8b750-5b06-11ee-9ed7-8fb556fb8db7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..080f5d1cf7f59d9565e94a6f26786e291b543f47
--- /dev/null
+++ b/graph/incidents_graphml/f/f0d8b750-5b06-11ee-9ed7-8fb556fb8db7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.186
+ 100.64.41.186
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695579586
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f0d8b750-5b06-11ee-9ed7-8fb556fb8db7
+
+
+
diff --git a/graph/incidents_graphml/f/f0dbf480-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/f/f0dbf480-59ba-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..402d747eeb8fd897e59f789401f3a929ef5554f7
--- /dev/null
+++ b/graph/incidents_graphml/f/f0dbf480-59ba-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.187
+ 100.64.58.187
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695436993
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0dbf480-59ba-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/f/f0e51360-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0e51360-5b06-11ee-9ed7-8fb556fb8db7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c594f0e2e98f17c2fe6d3ae88223abaf90b21ac
--- /dev/null
+++ b/graph/incidents_graphml/f/f0e51360-5b06-11ee-9ed7-8fb556fb8db7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.188
+ 100.64.41.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695579586
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0e51360-5b06-11ee-9ed7-8fb556fb8db7
+
+
+
diff --git a/graph/incidents_graphml/f/f0e54890-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f0e54890-1911-11ed-9439-83188f456eb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29bf832471934d5118bf94877af5ed57e4fc7aea
--- /dev/null
+++ b/graph/incidents_graphml/f/f0e54890-1911-11ed-9439-83188f456eb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.222
+ 100.64.71.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.78
+ 100.64.78.78
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660180036
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f0e54890-1911-11ed-9439-83188f456eb5
+
+
+
diff --git a/graph/incidents_graphml/f/f0f292a0-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/f/f0f292a0-6232-11ee-a972-e59ec7ee05b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ecc8a8eb2b77a0ddf84635bf37ed9ea6b34a765c
--- /dev/null
+++ b/graph/incidents_graphml/f/f0f292a0-6232-11ee-a972-e59ec7ee05b9.graphml
@@ -0,0 +1,517 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.22
+ 100.64.23.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.51
+ 100.64.7.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.23
+ 100.64.23.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.130
+ 100.64.11.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.24
+ 100.64.23.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.25
+ 100.64.23.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.214
+ 100.64.10.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.192
+ 100.64.19.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.26
+ 100.64.23.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.27
+ 100.64.23.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.28
+ 100.64.23.28
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.241
+ 100.64.2.241
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f0f292a0-6232-11ee-a972-e59ec7ee05b9
+
+
+
diff --git a/graph/incidents_graphml/f/f0f29770-1145-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f0f29770-1145-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc965fe697f973077f94ff045f09a4c2c0f1cf37
--- /dev/null
+++ b/graph/incidents_graphml/f/f0f29770-1145-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.37
+ 100.64.83.37
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.212
+ 100.64.72.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687470258
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0f29770-1145-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687470258
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0f29770-1145-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/f0f48590-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/f/f0f48590-59ba-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2b4eecfb8499ea2498959c0c3a39e460f994bec
--- /dev/null
+++ b/graph/incidents_graphml/f/f0f48590-59ba-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.187
+ 100.64.58.187
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695436993
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f0f48590-59ba-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/f/f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..252213bfeb6e82ee13b424c47517fe749023e305
--- /dev/null
+++ b/graph/incidents_graphml/f/f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.95.61.142
+ 10.95.61.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.37
+ 100.64.79.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.38
+ 100.64.79.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.39
+ 100.64.79.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687621012
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621012
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621012
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621012
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621012
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621012
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+
diff --git a/graph/incidents_graphml/f/f101fbf0-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/f/f101fbf0-6232-11ee-a972-e59ec7ee05b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18439e6fa5f19409cb22e7414feb2c18883c897f
--- /dev/null
+++ b/graph/incidents_graphml/f/f101fbf0-6232-11ee-a972-e59ec7ee05b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.22
+ 100.64.23.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696368142
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f101fbf0-6232-11ee-a972-e59ec7ee05b9
+
+
+
diff --git a/graph/incidents_graphml/f/f106e2c0-1145-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f106e2c0-1145-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbb046ddb1bff2d208360f47a79ff83366781f24
--- /dev/null
+++ b/graph/incidents_graphml/f/f106e2c0-1145-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.20
+ 100.64.43.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.245
+ 100.64.70.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687470259
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f106e2c0-1145-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687470259
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f106e2c0-1145-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/f109e250-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/f/f109e250-59ba-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac2622051b656ae5d53551abca71cf587ac488ca
--- /dev/null
+++ b/graph/incidents_graphml/f/f109e250-59ba-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.150
+ 100.64.43.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695436993
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f109e250-59ba-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/f/f10c7270-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/f/f10c7270-1228-11ed-99ed-adca11e4059c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab22fd9d45c81cf70931102f19e5335ffe2a7bdb
--- /dev/null
+++ b/graph/incidents_graphml/f/f10c7270-1228-11ed-99ed-adca11e4059c.graphml
@@ -0,0 +1,894 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.205
+ 100.64.78.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.37
+ 100.64.89.37
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.102
+ 100.64.16.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.241
+ 100.64.23.241
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.38
+ 100.64.89.38
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.39
+ 100.64.89.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.40
+ 100.64.89.40
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.41
+ 100.64.89.41
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.42
+ 100.64.89.42
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ CRED
+ CRED-0014
+ ["Suspicious User"]
+ 0.25
+ ["Windows Active Directory"]
+
+
+ HOST
+ 10.190.96.179
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Barracuda WAF","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.71.178
+ 100.64.71.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.83
+ 100.64.17.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.43
+ 100.64.89.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.44
+ 100.64.89.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.37
+ 100.64.14.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.219
+ 100.64.14.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.45
+ 100.64.89.45
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ f10c7270-1228-11ed-99ed-adca11e4059c
+
+
+
diff --git a/graph/incidents_graphml/f/f10e9550-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/f/f10e9550-1228-11ed-99ed-adca11e4059c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..049bbfac59e7d14a605ccbb7c7cba96d06257612
--- /dev/null
+++ b/graph/incidents_graphml/f/f10e9550-1228-11ed-99ed-adca11e4059c.graphml
@@ -0,0 +1,793 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.49.167
+ 100.64.49.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.87
+ 100.64.89.87
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.40
+ 100.64.89.40
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.88
+ 100.64.89.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.89
+ 100.64.89.89
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.202
+ 100.64.6.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.983125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.78.205
+ 100.64.78.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.90
+ 100.64.89.90
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.91
+ 100.64.89.91
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.92
+ 100.64.89.92
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.157
+ 100.64.23.157
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.93
+ 100.64.89.93
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.89.94
+ 100.64.89.94
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.95
+ 100.64.89.95
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.31.52
+ 100.64.31.52
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.22.62
+ 100.64.22.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.96
+ 100.64.89.96
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.23
+ 100.64.37.23
+ ["Exploiting Host"]
+ 0.8875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.97
+ 100.64.89.97
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+ INCIDENT_LINK
+ 1659420257
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f10e9550-1228-11ed-99ed-adca11e4059c
+
+
+
diff --git a/graph/incidents_graphml/f/f112c620-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/f112c620-12a4-11ee-ab1f-2bdb6669e8cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfeb8f180728feeb3be8d3734a53a923a5be91a4
--- /dev/null
+++ b/graph/incidents_graphml/f/f112c620-12a4-11ee-ab1f-2bdb6669e8cc.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.161
+ 100.64.72.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.86
+ 100.64.74.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.23.123
+ 100.64.23.123
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687621012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f112c620-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f112c620-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f112c620-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f112c620-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+
diff --git a/graph/incidents_graphml/f/f11814c0-3c0e-11ee-96ec-5323ee82cf36.graphml b/graph/incidents_graphml/f/f11814c0-3c0e-11ee-96ec-5323ee82cf36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc0077c667c0effe8eab3368f7cee98d82ae5b6c
--- /dev/null
+++ b/graph/incidents_graphml/f/f11814c0-3c0e-11ee-96ec-5323ee82cf36.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.196
+ 100.64.68.196
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.197
+ 100.64.68.197
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692174536
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f11814c0-3c0e-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692174536
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f11814c0-3c0e-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692174536
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f11814c0-3c0e-11ee-96ec-5323ee82cf36
+
+
+ INCIDENT_LINK
+ 1692174536
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f11814c0-3c0e-11ee-96ec-5323ee82cf36
+
+
+
diff --git a/graph/incidents_graphml/f/f11c7cb0-07d1-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/f/f11c7cb0-07d1-11ef-8107-af8140eb4c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..962a3994b003c41cf085d4288494d950cb4dddfe
--- /dev/null
+++ b/graph/incidents_graphml/f/f11c7cb0-07d1-11ef-8107-af8140eb4c5b.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.194.105
+ 172.24.194.105
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.87.2
+ 100.64.87.2
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.3
+ 100.64.87.3
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.4
+ 100.64.87.4
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714578374
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f11c7cb0-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578374
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f11c7cb0-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578374
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f11c7cb0-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578374
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f11c7cb0-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578374
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f11c7cb0-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578374
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f11c7cb0-07d1-11ef-8107-af8140eb4c5b
+
+
+
diff --git a/graph/incidents_graphml/f/f1244320-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f1244320-06ef-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7f3a2a148feeca20da382acd2b8adabb86d9c3f
--- /dev/null
+++ b/graph/incidents_graphml/f/f1244320-06ef-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686333810
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1244320-06ef-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/f/f129e770-15a0-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/f/f129e770-15a0-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..464a4fedb68e37ddb2e8f938d7c1681243bd869d
--- /dev/null
+++ b/graph/incidents_graphml/f/f129e770-15a0-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.160
+ 100.64.72.160
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.231
+ 100.64.73.231
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687949148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f129e770-15a0-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687949148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f129e770-15a0-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/f/f12ec290-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/f/f12ec290-4efd-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e92b65fe99d098dfce296bff710f9ac78da3401d
--- /dev/null
+++ b/graph/incidents_graphml/f/f12ec290-4efd-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.199
+ 100.64.24.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694256307
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f12ec290-4efd-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/f/f1316d50-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/f/f1316d50-6317-11ee-bf7a-9334ddba6edc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a1eababb2b6237617ed9233b16523d5a6a5e68f
--- /dev/null
+++ b/graph/incidents_graphml/f/f1316d50-6317-11ee-bf7a-9334ddba6edc.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.36.31
+ 100.64.36.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696466497
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1316d50-6317-11ee-bf7a-9334ddba6edc
+
+
+ INCIDENT_LINK
+ 1696466497
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1316d50-6317-11ee-bf7a-9334ddba6edc
+
+
+
diff --git a/graph/incidents_graphml/f/f132c500-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/f/f132c500-274f-11ee-9ae4-f7600c9ae4b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96ff502f68f904a09256d8d86349a95d6322fbed
--- /dev/null
+++ b/graph/incidents_graphml/f/f132c500-274f-11ee-9ae4-f7600c9ae4b6.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.81
+ USER-0015-1452.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.82
+ 100.64.63.82
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.239
+ 100.64.15.239
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.121
+ 100.64.8.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.2
+ 100.64.8.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.67
+ 100.64.20.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.116
+ 100.64.48.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893479
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f132c500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+
diff --git a/graph/incidents_graphml/f/f1359540-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1359540-367c-11ef-9a96-43590930a20f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f4bbb6ac6459c495edca2de56a2994433115b7c
--- /dev/null
+++ b/graph/incidents_graphml/f/f1359540-367c-11ef-9a96-43590930a20f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.34
+ USER-0015-1950.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.253.225.145
+ 10.253.225.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1719709572
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1359540-367c-11ef-9a96-43590930a20f
+
+
+
diff --git a/graph/incidents_graphml/f/f13c64c0-3d5b-11ef-86a6-4db713805853.graphml b/graph/incidents_graphml/f/f13c64c0-3d5b-11ef-86a6-4db713805853.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24cea835bbc2d48ae4a3d389fe86b96489500a2f
--- /dev/null
+++ b/graph/incidents_graphml/f/f13c64c0-3d5b-11ef-86a6-4db713805853.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.214
+ USER-0015-1218.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.184
+ 100.64.42.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720465057
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f13c64c0-3d5b-11ef-86a6-4db713805853
+
+
+ INCIDENT_LINK
+ 1720465057
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f13c64c0-3d5b-11ef-86a6-4db713805853
+
+
+ INCIDENT_LINK
+ 1720465057
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f13c64c0-3d5b-11ef-86a6-4db713805853
+
+
+ INCIDENT_LINK
+ 1720465057
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f13c64c0-3d5b-11ef-86a6-4db713805853
+
+
+
diff --git a/graph/incidents_graphml/f/f13d4860-15a0-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/f/f13d4860-15a0-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ae578b6b7b93c80343cf1aa7bf9e8cfcadd7347
--- /dev/null
+++ b/graph/incidents_graphml/f/f13d4860-15a0-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.232
+ 100.64.73.232
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.51
+ 100.64.1.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687949148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f13d4860-15a0-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687949148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f13d4860-15a0-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/f/f13da0f0-2d7b-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/f/f13da0f0-2d7b-11ef-88d9-1fb9581a602f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04314763473c4e6ffed70bd650cf29ef86e1457b
--- /dev/null
+++ b/graph/incidents_graphml/f/f13da0f0-2d7b-11ef-88d9-1fb9581a602f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.194
+ 100.64.93.194
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.10.213
+ 172.29.10.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1718719582
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f13da0f0-2d7b-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719582
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f13da0f0-2d7b-11ef-88d9-1fb9581a602f
+
+
+
diff --git a/graph/incidents_graphml/f/f13f4530-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f13f4530-06ef-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0dd7ffdbb06ee5d13fb86489406137e768aec26a
--- /dev/null
+++ b/graph/incidents_graphml/f/f13f4530-06ef-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686333811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f13f4530-06ef-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/f/f1431a60-2d7e-11ee-b431-c96f4a8a8f7e.graphml b/graph/incidents_graphml/f/f1431a60-2d7e-11ee-b431-c96f4a8a8f7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87181e1ed414fb71171fe469e61ab51bef0416d8
--- /dev/null
+++ b/graph/incidents_graphml/f/f1431a60-2d7e-11ee-b431-c96f4a8a8f7e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.183
+ 100.64.23.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.85
+ 100.64.73.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690573373
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1431a60-2d7e-11ee-b431-c96f4a8a8f7e
+
+
+
diff --git a/graph/incidents_graphml/f/f146f230-b4f1-11ed-9d28-d755eb33fc3e.graphml b/graph/incidents_graphml/f/f146f230-b4f1-11ed-9d28-d755eb33fc3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..282d771109ce670888e5967d3f6fde218fd44542
--- /dev/null
+++ b/graph/incidents_graphml/f/f146f230-b4f1-11ed-9d28-d755eb33fc3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677318674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f146f230-b4f1-11ed-9d28-d755eb33fc3e
+
+
+
diff --git a/graph/incidents_graphml/f/f14b37f0-b4f1-11ed-9d28-d755eb33fc3e.graphml b/graph/incidents_graphml/f/f14b37f0-b4f1-11ed-9d28-d755eb33fc3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..47931a709eceba0a7182f79ba1034167db241c46
--- /dev/null
+++ b/graph/incidents_graphml/f/f14b37f0-b4f1-11ed-9d28-d755eb33fc3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677318674
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f14b37f0-b4f1-11ed-9d28-d755eb33fc3e
+
+
+
diff --git a/graph/incidents_graphml/f/f14bb550-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f14bb550-367c-11ef-9a96-43590930a20f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18e3f417373fe6915fd5a7dc7c3ec859041fef04
--- /dev/null
+++ b/graph/incidents_graphml/f/f14bb550-367c-11ef-9a96-43590930a20f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.253.225.145
+ 10.253.225.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.59.34
+ USER-0015-1950.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1719709572
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f14bb550-367c-11ef-9a96-43590930a20f
+
+
+
diff --git a/graph/incidents_graphml/f/f14bcab0-5061-11ee-a936-57e582280eb3.graphml b/graph/incidents_graphml/f/f14bcab0-5061-11ee-a936-57e582280eb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6653e36590de5a12d86c335ecbb7160e8787763
--- /dev/null
+++ b/graph/incidents_graphml/f/f14bcab0-5061-11ee-a936-57e582280eb3.graphml
@@ -0,0 +1,801 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.94
+ 100.64.23.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.103
+ 100.64.23.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.104
+ USER-0015-1241.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.105
+ 100.64.23.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.106
+ 100.64.23.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.107
+ 100.64.23.107
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.108
+ 100.64.23.108
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.42
+ 100.64.13.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.109
+ 100.64.23.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.84
+ 100.64.14.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.110
+ 100.64.23.110
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+ INCIDENT_LINK
+ 1694409208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f14bcab0-5061-11ee-a936-57e582280eb3
+
+
+
diff --git a/graph/incidents_graphml/f/f150f090-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/f/f150f090-230b-11ee-b0f8-a7fcea0862f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ccc8ee60b63cf71f422f4e522f8ed612aacba196
--- /dev/null
+++ b/graph/incidents_graphml/f/f150f090-230b-11ee-b0f8-a7fcea0862f2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.233
+ USER-0015-1355.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689424469
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f150f090-230b-11ee-b0f8-a7fcea0862f2
+
+
+
diff --git a/graph/incidents_graphml/f/f151bac0-15a0-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/f/f151bac0-15a0-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d543f4f8de62332171580c9f035e6d8f83ce48a
--- /dev/null
+++ b/graph/incidents_graphml/f/f151bac0-15a0-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.219
+ 100.64.13.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687949148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f151bac0-15a0-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687949148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f151bac0-15a0-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/f/f15290a0-594c-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/f/f15290a0-594c-11ed-aecd-b7c09b1a67fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7792d3be03ea0f90cea0c1367b212f8ec8b001d0
--- /dev/null
+++ b/graph/incidents_graphml/f/f15290a0-594c-11ed-aecd-b7c09b1a67fb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.69
+ 100.64.23.69
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.80
+ 100.64.71.80
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1667242251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f15290a0-594c-11ed-aecd-b7c09b1a67fb
+
+
+ INCIDENT_LINK
+ 1667242251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f15290a0-594c-11ed-aecd-b7c09b1a67fb
+
+
+
diff --git a/graph/incidents_graphml/f/f1585fb0-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f1585fb0-0cc7-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d53a723b7ffbb79f6b0d9d6d3b05047539bbbb6
--- /dev/null
+++ b/graph/incidents_graphml/f/f1585fb0-0cc7-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,511 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.19
+ 100.64.8.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.20
+ USER-0015-1188.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.21
+ 100.64.8.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.22
+ 100.64.8.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.23
+ 100.64.8.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.24
+ 100.64.8.24
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.25
+ 100.64.8.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.26
+ 100.64.8.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.27
+ 100.64.8.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.28
+ 100.64.8.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.29
+ 100.64.8.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1585fb0-0cc7-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/f/f15f1640-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f15f1640-367c-11ef-9a96-43590930a20f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..960e12c80968809b70a638cee944e97724cb1764
--- /dev/null
+++ b/graph/incidents_graphml/f/f15f1640-367c-11ef-9a96-43590930a20f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.253.225.145
+ 10.253.225.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.46.24
+ 100.64.46.24
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1719709572
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f15f1640-367c-11ef-9a96-43590930a20f
+
+
+
diff --git a/graph/incidents_graphml/f/f167c450-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/f/f167c450-6861-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..740c8811bab00ab1cf94fc5ef02ee7cc8084bd7c
--- /dev/null
+++ b/graph/incidents_graphml/f/f167c450-6861-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.163
+ 100.64.15.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697048036
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f167c450-6861-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/f/f175e610-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f175e610-452b-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c42d6eb41167b656e1d72dcc4dd0927d3d0d8a25
--- /dev/null
+++ b/graph/incidents_graphml/f/f175e610-452b-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176553
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f175e610-452b-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/f/f176df80-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/f/f176df80-6861-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0ce36f339009344f4f312ccf7e10a5dce85e43f
--- /dev/null
+++ b/graph/incidents_graphml/f/f176df80-6861-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.229
+ 100.64.53.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697048036
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f176df80-6861-11ee-864e-0fda06c5b459
+
+
+ INCIDENT_LINK
+ 1697048036
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f176df80-6861-11ee-864e-0fda06c5b459
+
+
+ INCIDENT_LINK
+ 1697048036
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f176df80-6861-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/f/f17bcec0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f17bcec0-75d9-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9b9ced14cb7e2473d273e1ee310c5c3889e958c
--- /dev/null
+++ b/graph/incidents_graphml/f/f17bcec0-75d9-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.143
+ 100.64.45.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698528941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f17bcec0-75d9-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f1856320-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f1856320-0cc7-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..770559f8fd431eb591a96c94ffd4fe479a71141f
--- /dev/null
+++ b/graph/incidents_graphml/f/f1856320-0cc7-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.45
+ 100.64.8.45
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1856320-0cc7-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/f/f185d3a0-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/f/f185d3a0-6861-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48f1f6804e2bdc5d65b55b92ffe1a35186d60402
--- /dev/null
+++ b/graph/incidents_graphml/f/f185d3a0-6861-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.229
+ 100.64.53.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697048036
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f185d3a0-6861-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/f/f189f6d0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f189f6d0-367c-11ef-9a96-43590930a20f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d0fd4065c142a12d117ff60118b68767f61fc116
--- /dev/null
+++ b/graph/incidents_graphml/f/f189f6d0-367c-11ef-9a96-43590930a20f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.176
+ 100.64.83.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.253.225.145
+ 10.253.225.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1719709572
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f189f6d0-367c-11ef-9a96-43590930a20f
+
+
+
diff --git a/graph/incidents_graphml/f/f18e2900-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f18e2900-452b-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21925fa92c4753926b36303360c0d71a93983d90
--- /dev/null
+++ b/graph/incidents_graphml/f/f18e2900-452b-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176553
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f18e2900-452b-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/f/f190b8b0-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/f/f190b8b0-230b-11ee-b0f8-a7fcea0862f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e664894f6666db2f90a8fa63a940fdedf313acce
--- /dev/null
+++ b/graph/incidents_graphml/f/f190b8b0-230b-11ee-b0f8-a7fcea0862f2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.233
+ USER-0015-1355.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689424470
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f190b8b0-230b-11ee-b0f8-a7fcea0862f2
+
+
+
diff --git a/graph/incidents_graphml/f/f193eaa0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f193eaa0-75d9-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..468f0b455f1b3fd005464ab1cd74a26f4952bc5d
--- /dev/null
+++ b/graph/incidents_graphml/f/f193eaa0-75d9-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.143
+ 100.64.45.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698528941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f193eaa0-75d9-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f19515e0-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/f/f19515e0-6861-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c185789635330e78ea4222bf6a0276bd8f0eddb
--- /dev/null
+++ b/graph/incidents_graphml/f/f19515e0-6861-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.229
+ 100.64.53.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697048036
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f19515e0-6861-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/f/f1992970-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/f/f1992970-9172-11ee-94be-75b251a8fc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..966df3358e3ec722549dcefd64852d329b82272f
--- /dev/null
+++ b/graph/incidents_graphml/f/f1992970-9172-11ee-94be-75b251a8fc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.66
+ 100.64.35.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701563336
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f1992970-9172-11ee-94be-75b251a8fc8a
+
+
+
diff --git a/graph/incidents_graphml/f/f19ddec0-fd11-11ed-a4b5-cd7044d3b555.graphml b/graph/incidents_graphml/f/f19ddec0-fd11-11ed-a4b5-cd7044d3b555.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..590218beaced18d257be6070c1e8184a7ea380e8
--- /dev/null
+++ b/graph/incidents_graphml/f/f19ddec0-fd11-11ed-a4b5-cd7044d3b555.graphml
@@ -0,0 +1,811 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.142
+ 100.64.41.142
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.19.191
+ 100.64.19.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.16.36
+ 100.64.16.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.143
+ 100.64.41.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.28.193
+ 100.64.28.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.144
+ 100.64.41.144
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.145
+ 100.64.41.145
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.146
+ 100.64.41.146
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.147
+ 100.64.41.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.96
+ 100.64.38.96
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.148
+ 100.64.41.148
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.85
+ 100.64.36.85
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.149
+ 100.64.41.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.150
+ 100.64.41.150
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.170
+ 100.64.14.170
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.151
+ 100.64.41.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f19ddec0-fd11-11ed-a4b5-cd7044d3b555
+
+
+
diff --git a/graph/incidents_graphml/f/f1a287e0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1a287e0-367c-11ef-9a96-43590930a20f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af7dd8d5d8a71b5eb3c8042d96af7ff8bad3e11a
--- /dev/null
+++ b/graph/incidents_graphml/f/f1a287e0-367c-11ef-9a96-43590930a20f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.253.225.145
+ 10.253.225.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.176
+ 100.64.83.176
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1719709573
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1a287e0-367c-11ef-9a96-43590930a20f
+
+
+
diff --git a/graph/incidents_graphml/f/f1a2e980-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f1a2e980-452b-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e43f55c36ac81487285329a2eab1c688e58d8183
--- /dev/null
+++ b/graph/incidents_graphml/f/f1a2e980-452b-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176553
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f1a2e980-452b-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/f/f1a32450-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f1a32450-0cc7-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0a2899e808a9ddcd14cce600630cc66ee1c8c00
--- /dev/null
+++ b/graph/incidents_graphml/f/f1a32450-0cc7-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.45
+ 100.64.8.45
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686976338
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1a32450-0cc7-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/f/f1a50660-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f1a50660-5b66-11ee-a387-a18350d70540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72887352a9afa311e7293c7b2e52f1b1c61d9a36
--- /dev/null
+++ b/graph/incidents_graphml/f/f1a50660-5b66-11ee-a387-a18350d70540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.121
+ 100.64.35.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695620819
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1a50660-5b66-11ee-a387-a18350d70540
+
+
+
diff --git a/graph/incidents_graphml/f/f1a599c0-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f1a599c0-9268-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb7a870333f8e3ec56c75d155c429e11db77722a
--- /dev/null
+++ b/graph/incidents_graphml/f/f1a599c0-9268-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.189
+ 100.64.65.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701668992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1a599c0-9268-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/f/f1aca2c0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f1aca2c0-75d9-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4509c3de96e87f2c951a328683d8d9e3c79782b8
--- /dev/null
+++ b/graph/incidents_graphml/f/f1aca2c0-75d9-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.145
+ 100.64.45.145
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698528941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f1aca2c0-75d9-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f1b4bdd0-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f1b4bdd0-5b66-11ee-a387-a18350d70540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32b239a327fda81e02242389feee436da57b02fb
--- /dev/null
+++ b/graph/incidents_graphml/f/f1b4bdd0-5b66-11ee-a387-a18350d70540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.121
+ 100.64.35.121
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695620819
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1b4bdd0-5b66-11ee-a387-a18350d70540
+
+
+
diff --git a/graph/incidents_graphml/f/f1b60fe0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1b60fe0-367c-11ef-9a96-43590930a20f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60a95b6df8425406628af7a16e8403e129cb2756
--- /dev/null
+++ b/graph/incidents_graphml/f/f1b60fe0-367c-11ef-9a96-43590930a20f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.177
+ 100.64.83.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.253.225.145
+ 10.253.225.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1719709573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1b60fe0-367c-11ef-9a96-43590930a20f
+
+
+
diff --git a/graph/incidents_graphml/f/f1b9a5d0-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f1b9a5d0-452b-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dcdf3c2099891133e23b0feb3cc3b201aa253620
--- /dev/null
+++ b/graph/incidents_graphml/f/f1b9a5d0-452b-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176553
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f1b9a5d0-452b-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/f/f1b9e930-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f1b9e930-75d9-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d30a44e86e314d2dfce91bc600a0191c95bc0e50
--- /dev/null
+++ b/graph/incidents_graphml/f/f1b9e930-75d9-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.147
+ 100.64.45.147
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698528941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1b9e930-75d9-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f1bb3fa0-fd59-11ec-a469-5997b7522014.graphml b/graph/incidents_graphml/f/f1bb3fa0-fd59-11ec-a469-5997b7522014.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f828d614358e9e3bfeef0075533a6376028d603
--- /dev/null
+++ b/graph/incidents_graphml/f/f1bb3fa0-fd59-11ec-a469-5997b7522014.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.30
+ 100.64.74.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.6.18
+ 100.64.6.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657132329
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1bb3fa0-fd59-11ec-a469-5997b7522014
+
+
+ INCIDENT_LINK
+ 1657132329
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1bb3fa0-fd59-11ec-a469-5997b7522014
+
+
+
diff --git a/graph/incidents_graphml/f/f1bb7e80-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/f/f1bb7e80-9172-11ee-94be-75b251a8fc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0781dce69582e7649d50fcb445f2b6b3b5c11f78
--- /dev/null
+++ b/graph/incidents_graphml/f/f1bb7e80-9172-11ee-94be-75b251a8fc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.68
+ 100.64.35.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701563336
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1bb7e80-9172-11ee-94be-75b251a8fc8a
+
+
+
diff --git a/graph/incidents_graphml/f/f1bc8320-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1bc8320-1c9d-11ed-822a-cb7c4e632a4f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0525353665c12436924e2600d878873b4b5d71c
--- /dev/null
+++ b/graph/incidents_graphml/f/f1bc8320-1c9d-11ed-822a-cb7c4e632a4f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.45
+ 100.64.76.45
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660570020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f1bc8320-1c9d-11ed-822a-cb7c4e632a4f
+
+
+
diff --git a/graph/incidents_graphml/f/f1bd1960-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f1bd1960-9268-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0133da1d05c47e57a87958ea6067c1db363937f2
--- /dev/null
+++ b/graph/incidents_graphml/f/f1bd1960-9268-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.189
+ 100.64.65.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701668992
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1bd1960-9268-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/f/f1bdb130-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f1bdb130-0cc7-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8c71c06dc92592db7f2477ff4d3da635f557854
--- /dev/null
+++ b/graph/incidents_graphml/f/f1bdb130-0cc7-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.47
+ 100.64.8.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686976339
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1bdb130-0cc7-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/f/f1be96e0-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/f/f1be96e0-6861-11ee-864e-0fda06c5b459.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..883207c3ce0883b9697c010e0d870ce31facba55
--- /dev/null
+++ b/graph/incidents_graphml/f/f1be96e0-6861-11ee-864e-0fda06c5b459.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.231
+ 100.64.53.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697048037
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1be96e0-6861-11ee-864e-0fda06c5b459
+
+
+
diff --git a/graph/incidents_graphml/f/f1c7fc00-fd11-11ed-a4b5-cd7044d3b555.graphml b/graph/incidents_graphml/f/f1c7fc00-fd11-11ed-a4b5-cd7044d3b555.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52f8b7b578c08b57e502a03119ea0bbc97dd483a
--- /dev/null
+++ b/graph/incidents_graphml/f/f1c7fc00-fd11-11ed-a4b5-cd7044d3b555.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f1c7fc00-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f1c7fc00-fd11-11ed-a4b5-cd7044d3b555
+
+
+
diff --git a/graph/incidents_graphml/f/f1cb6ca0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1cb6ca0-367c-11ef-9a96-43590930a20f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b1b7f7c5b44416549038e473f6a6a61a233353a
--- /dev/null
+++ b/graph/incidents_graphml/f/f1cb6ca0-367c-11ef-9a96-43590930a20f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.253.225.145
+ 10.253.225.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.177
+ 100.64.83.177
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1719709573
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1cb6ca0-367c-11ef-9a96-43590930a20f
+
+
+
diff --git a/graph/incidents_graphml/f/f1ccade0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f1ccade0-75d9-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7062213e03d21d7ecd8ef42367a446eeca1e5992
--- /dev/null
+++ b/graph/incidents_graphml/f/f1ccade0-75d9-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.147
+ 100.64.45.147
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698528942
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1ccade0-75d9-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f1d2ca40-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1d2ca40-1c9d-11ed-822a-cb7c4e632a4f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6023d8ff03cecdfcec6e9c1b902f97701e5ae722
--- /dev/null
+++ b/graph/incidents_graphml/f/f1d2ca40-1c9d-11ed-822a-cb7c4e632a4f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.47
+ 100.64.76.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1d2ca40-1c9d-11ed-822a-cb7c4e632a4f
+
+
+
diff --git a/graph/incidents_graphml/f/f1d72ca0-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f1d72ca0-0cc7-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..508e69b4bc93f04de3d9ba1e85368e9550e86451
--- /dev/null
+++ b/graph/incidents_graphml/f/f1d72ca0-0cc7-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.47
+ 100.64.8.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686976339
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1d72ca0-0cc7-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/f/f1d81360-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f1d81360-0fae-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea89243db9b1885b3e928c4bb8e14a4089e312b1
--- /dev/null
+++ b/graph/incidents_graphml/f/f1d81360-0fae-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.151
+ 100.64.75.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687295455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1d81360-0fae-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/f1d9f630-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1d9f630-1c9d-11ed-822a-cb7c4e632a4f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f942a99e23a9a4ec1d5dbbb8bdf3e47a06237f5e
--- /dev/null
+++ b/graph/incidents_graphml/f/f1d9f630-1c9d-11ed-822a-cb7c4e632a4f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.47
+ 100.64.76.47
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1d9f630-1c9d-11ed-822a-cb7c4e632a4f
+
+
+
diff --git a/graph/incidents_graphml/f/f1dbd8e0-a7f0-11ed-af31-070b715d9bbb.graphml b/graph/incidents_graphml/f/f1dbd8e0-a7f0-11ed-af31-070b715d9bbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05636b2829bb54a75496d6c9d6335e3bce4c0623
--- /dev/null
+++ b/graph/incidents_graphml/f/f1dbd8e0-a7f0-11ed-af31-070b715d9bbb.graphml
@@ -0,0 +1,775 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.243
+ 100.64.87.243
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.244
+ 100.64.87.244
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.245
+ 100.64.87.245
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.218
+ 100.64.87.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.246
+ 100.64.87.246
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.247
+ 100.64.87.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.248
+ 100.64.87.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.249
+ 100.64.87.249
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.250
+ 100.64.87.250
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.211
+ 100.64.87.211
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.251
+ 100.64.87.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.217
+ 100.64.39.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.252
+ 100.64.87.252
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.253
+ 100.64.87.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.254
+ 100.64.87.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.255
+ 100.64.87.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.1
+ 100.64.88.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.1
+ 100.64.88.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888881
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1dbd8e0-a7f0-11ed-af31-070b715d9bbb
+
+
+
diff --git a/graph/incidents_graphml/f/f1ddc6c0-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1ddc6c0-1c9d-11ed-822a-cb7c4e632a4f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06fd2aed7507f4c985c8462e63e232df02c82a50
--- /dev/null
+++ b/graph/incidents_graphml/f/f1ddc6c0-1c9d-11ed-822a-cb7c4e632a4f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.171
+ 100.64.71.171
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1ddc6c0-1c9d-11ed-822a-cb7c4e632a4f
+
+
+
diff --git a/graph/incidents_graphml/f/f1def4a0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1def4a0-367c-11ef-9a96-43590930a20f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1b653d63d368048dc0bd659af63d226d8556965
--- /dev/null
+++ b/graph/incidents_graphml/f/f1def4a0-367c-11ef-9a96-43590930a20f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.190
+ USER-0015-1951.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.253.225.145
+ 10.253.225.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1719709573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1def4a0-367c-11ef-9a96-43590930a20f
+
+
+
diff --git a/graph/incidents_graphml/f/f1e17770-fd11-11ed-a4b5-cd7044d3b555.graphml b/graph/incidents_graphml/f/f1e17770-fd11-11ed-a4b5-cd7044d3b555.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f97bca7a9613be25ee8400964aefdf72645690e9
--- /dev/null
+++ b/graph/incidents_graphml/f/f1e17770-fd11-11ed-a4b5-cd7044d3b555.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685248903
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e17770-fd11-11ed-a4b5-cd7044d3b555
+
+
+
diff --git a/graph/incidents_graphml/f/f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d.graphml b/graph/incidents_graphml/f/f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..725ac2a631496d7ba3b1acc5b8711760b0dc1db7
--- /dev/null
+++ b/graph/incidents_graphml/f/f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.165
+ 100.64.59.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.166
+ 100.64.59.166
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.167
+ 100.64.59.167
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.55
+ 100.64.16.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.168
+ 100.64.59.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.79
+ 100.64.23.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990810
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d
+
+
+
diff --git a/graph/incidents_graphml/f/f1e6e070-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f1e6e070-0fae-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77941cccdda64b9b2978ee61ed3a125f84682fd2
--- /dev/null
+++ b/graph/incidents_graphml/f/f1e6e070-0fae-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.151
+ 100.64.75.151
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687295455
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1e6e070-0fae-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/f1ed0900-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1ed0900-1c9d-11ed-822a-cb7c4e632a4f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..345205acaa7e0abbc1e79cf2743ba69a2583e5e6
--- /dev/null
+++ b/graph/incidents_graphml/f/f1ed0900-1c9d-11ed-822a-cb7c4e632a4f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.171
+ 100.64.71.171
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1ed0900-1c9d-11ed-822a-cb7c4e632a4f
+
+
+
diff --git a/graph/incidents_graphml/f/f1ede8c0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1ede8c0-367c-11ef-9a96-43590930a20f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c42149f86c765f876e23520c68129d599cc97df2
--- /dev/null
+++ b/graph/incidents_graphml/f/f1ede8c0-367c-11ef-9a96-43590930a20f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.253.225.145
+ 10.253.225.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.7.190
+ USER-0015-1951.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1719709573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f1ede8c0-367c-11ef-9a96-43590930a20f
+
+
+
diff --git a/graph/incidents_graphml/f/f1f1eb00-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1f1eb00-1c9d-11ed-822a-cb7c4e632a4f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f17f145aaf53598934d3d0ef3e42182e7888d2fa
--- /dev/null
+++ b/graph/incidents_graphml/f/f1f1eb00-1c9d-11ed-822a-cb7c4e632a4f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.48
+ USER-0015-1730.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1f1eb00-1c9d-11ed-822a-cb7c4e632a4f
+
+
+
diff --git a/graph/incidents_graphml/f/f1f36390-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f1f36390-0fae-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..694ac5dcea699e8d36f9edfddf98a87ff0ade20f
--- /dev/null
+++ b/graph/incidents_graphml/f/f1f36390-0fae-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.233
+ 100.64.82.233
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687295455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f1f36390-0fae-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/f1f8efe0-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1f8efe0-1c9d-11ed-822a-cb7c4e632a4f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da346a52c6faec67048a1b9c9f637488f89e4f61
--- /dev/null
+++ b/graph/incidents_graphml/f/f1f8efe0-1c9d-11ed-822a-cb7c4e632a4f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.48
+ USER-0015-1730.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f1f8efe0-1c9d-11ed-822a-cb7c4e632a4f
+
+
+
diff --git a/graph/incidents_graphml/f/f204a1a0-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f204a1a0-0fae-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6ffc8f809fe3a3037f8fa90b3f4c50476a0d0e8
--- /dev/null
+++ b/graph/incidents_graphml/f/f204a1a0-0fae-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.233
+ 100.64.82.233
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687295455
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f204a1a0-0fae-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/f/f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49b1b718361a6e09de278eaeef14fcdf16c41bac
--- /dev/null
+++ b/graph/incidents_graphml/f/f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.111
+ 100.64.73.111
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.212
+ 100.64.72.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.154
+ 100.64.78.154
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656519867
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519867
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519867
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519867
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+
diff --git a/graph/incidents_graphml/f/f20e41d0-a8bd-11ee-be75-9d7de56126cf.graphml b/graph/incidents_graphml/f/f20e41d0-a8bd-11ee-be75-9d7de56126cf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49169e2fac50b2fc18c8d9b3590d9424a8e2cb4b
--- /dev/null
+++ b/graph/incidents_graphml/f/f20e41d0-a8bd-11ee-be75-9d7de56126cf.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.169
+ 100.64.31.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.170
+ 100.64.31.170
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.171
+ USER-0015-1289.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.172
+ 100.64.31.172
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.105
+ 100.64.17.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.173
+ 100.64.31.173
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.174
+ 100.64.31.174
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.175
+ 100.64.31.175
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.176
+ 100.64.31.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.177
+ 100.64.31.177
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.178
+ 100.64.31.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.29
+ 100.64.23.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.179
+ 100.64.31.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.246
+ 100.64.13.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.38
+ USER-0015-1290.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.180
+ 100.64.31.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.181
+ 100.64.31.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124425
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f20e41d0-a8bd-11ee-be75-9d7de56126cf
+
+
+
diff --git a/graph/incidents_graphml/f/f213d050-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f213d050-d360-11ee-82a4-572767498e98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2bd7288cfb27f1c6559acd92d4b7610def16e39
--- /dev/null
+++ b/graph/incidents_graphml/f/f213d050-d360-11ee-82a4-572767498e98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.238
+ 100.64.8.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708812382
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f213d050-d360-11ee-82a4-572767498e98
+
+
+
diff --git a/graph/incidents_graphml/f/f214f550-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f214f550-0fae-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6002a4cf333f3c8607686489369e7cf7fc68a277
--- /dev/null
+++ b/graph/incidents_graphml/f/f214f550-0fae-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.8
+ 100.64.75.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687295455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f214f550-0fae-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/f21acfc0-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f21acfc0-1c9d-11ed-822a-cb7c4e632a4f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6be2df581a0565ae7f252d9281c79a5dcd0f47d1
--- /dev/null
+++ b/graph/incidents_graphml/f/f21acfc0-1c9d-11ed-822a-cb7c4e632a4f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.49
+ 100.64.76.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f21acfc0-1c9d-11ed-822a-cb7c4e632a4f
+
+
+
diff --git a/graph/incidents_graphml/f/f222e610-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f222e610-1c9d-11ed-822a-cb7c4e632a4f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d7ccac0e72e0bf874118e82ceb2607b3767866f
--- /dev/null
+++ b/graph/incidents_graphml/f/f222e610-1c9d-11ed-822a-cb7c4e632a4f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.49
+ 100.64.76.49
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f222e610-1c9d-11ed-822a-cb7c4e632a4f
+
+
+
diff --git a/graph/incidents_graphml/f/f22521f0-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f22521f0-0fae-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d32d4532ee9f001b18f589af661c0d6b0d52b348
--- /dev/null
+++ b/graph/incidents_graphml/f/f22521f0-0fae-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.8
+ 100.64.75.8
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687295455
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f22521f0-0fae-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/f2253000-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f2253000-1c9d-11ed-822a-cb7c4e632a4f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c68aa254315f37b7e2f66f1c8c53f7ae7a43b5e3
--- /dev/null
+++ b/graph/incidents_graphml/f/f2253000-1c9d-11ed-822a-cb7c4e632a4f.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.139
+ 100.64.36.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.172
+ 100.64.75.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.51
+ 100.64.76.51
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.52
+ 100.64.76.52
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.20.30
+ 100.64.20.30
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.232
+ 100.64.71.232
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.53
+ 100.64.76.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.54
+ 100.64.76.54
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.217
+ 100.64.71.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.55
+ 100.64.76.55
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.248
+ 100.64.70.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.42
+ 100.64.76.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.56
+ 100.64.76.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.57
+ 100.64.76.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.137
+ 100.64.72.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.58
+ 100.64.76.58
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.25
+ 100.64.1.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.59
+ 100.64.76.59
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.17.5
+ 100.64.17.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.63
+ USER-0015-1731.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.60
+ 100.64.76.60
+ ["Exploiting Target"]
+ 0.68359375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+ INCIDENT_LINK
+ 1660570021
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2253000-1c9d-11ed-822a-cb7c4e632a4f
+
+
+
diff --git a/graph/incidents_graphml/f/f2420a70-2d97-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/f/f2420a70-2d97-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4df1bbc0bd3a60110c047c9aaf405e402ab13b60
--- /dev/null
+++ b/graph/incidents_graphml/f/f2420a70-2d97-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,811 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.129
+ 100.64.17.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.16
+ 100.64.9.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.96
+ USER-0015-1316.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.254
+ 100.64.52.254
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ HOST-2906
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.255
+ 100.64.52.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.130
+ 100.64.14.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.167
+ 100.64.45.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.203
+ 100.64.23.203
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.1
+ USER-0015-1397.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.1
+ USER-0015-1398.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.166
+ 100.64.42.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.151
+ 100.64.52.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.243
+ 100.64.40.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.175
+ 100.64.12.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.195
+ 100.64.6.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.34
+ 100.64.43.34
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.60
+ 100.64.18.60
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+ INCIDENT_LINK
+ 1690584112
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2420a70-2d97-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/f/f251acc0-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f251acc0-eb51-11ec-8162-f7a03e680dde.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8695586c362cf90dc7b704fba00e8198da6fa09d
--- /dev/null
+++ b/graph/incidents_graphml/f/f251acc0-eb51-11ec-8162-f7a03e680dde.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.251
+ USER-0015-1815.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655149773
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f251acc0-eb51-11ec-8162-f7a03e680dde
+
+
+
diff --git a/graph/incidents_graphml/f/f258dc20-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f258dc20-0fae-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ddc0759858c32a90f9bf1bc3ff283d546aaf333
--- /dev/null
+++ b/graph/incidents_graphml/f/f258dc20-0fae-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.209
+ 100.64.72.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687295456
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f258dc20-0fae-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/f2646650-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f2646650-efc3-11ec-9799-0176ac54cf1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d818461c090259316731368a3322beb1e4cff97
--- /dev/null
+++ b/graph/incidents_graphml/f/f2646650-efc3-11ec-9799-0176ac54cf1b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.76
+ 100.64.50.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.255
+ 100.64.73.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655638540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f2646650-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f2646650-efc3-11ec-9799-0176ac54cf1b
+
+
+
diff --git a/graph/incidents_graphml/f/f26fff10-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f26fff10-efc3-11ec-9799-0176ac54cf1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..849369ddfa063a239fcb624da9a2560bd0bd2f0a
--- /dev/null
+++ b/graph/incidents_graphml/f/f26fff10-efc3-11ec-9799-0176ac54cf1b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.162
+ 100.64.80.162
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.17
+ USER-0015-1842.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655638540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f26fff10-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f26fff10-efc3-11ec-9799-0176ac54cf1b
+
+
+
diff --git a/graph/incidents_graphml/f/f2759cd0-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f2759cd0-5b66-11ee-a387-a18350d70540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..101b93e0ed11e335b19933e4b0cab03fbda10031
--- /dev/null
+++ b/graph/incidents_graphml/f/f2759cd0-5b66-11ee-a387-a18350d70540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.122
+ 100.64.35.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695620820
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f2759cd0-5b66-11ee-a387-a18350d70540
+
+
+
diff --git a/graph/incidents_graphml/f/f27cf550-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f27cf550-06ef-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..956d507dd55f778f348893758d94f01ea81fde6c
--- /dev/null
+++ b/graph/incidents_graphml/f/f27cf550-06ef-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.166
+ 100.64.46.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686333813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f27cf550-06ef-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/f/f2829630-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f2829630-2ea5-11ee-a61f-7552bb17f553.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cafdbb7eb1ae55d23f02f968590bbaddaba5367
--- /dev/null
+++ b/graph/incidents_graphml/f/f2829630-2ea5-11ee-a61f-7552bb17f553.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.37
+ 100.64.33.37
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690700076
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2829630-2ea5-11ee-a61f-7552bb17f553
+
+
+
diff --git a/graph/incidents_graphml/f/f28442d0-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f28442d0-5b66-11ee-a387-a18350d70540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83159e473b576403b7e0004c87b7a326f45234ee
--- /dev/null
+++ b/graph/incidents_graphml/f/f28442d0-5b66-11ee-a387-a18350d70540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.122
+ 100.64.35.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695620820
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f28442d0-5b66-11ee-a387-a18350d70540
+
+
+
diff --git a/graph/incidents_graphml/f/f28b5a60-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f28b5a60-eb51-11ec-8162-f7a03e680dde.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..afb875e8ab4edd8307605f861fa2085b0f42cb13
--- /dev/null
+++ b/graph/incidents_graphml/f/f28b5a60-eb51-11ec-8162-f7a03e680dde.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.251
+ USER-0015-1815.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655149773
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f28b5a60-eb51-11ec-8162-f7a03e680dde
+
+
+
diff --git a/graph/incidents_graphml/f/f28ce210-1403-11ed-91bb-5f4a5e1f0902.graphml b/graph/incidents_graphml/f/f28ce210-1403-11ed-91bb-5f4a5e1f0902.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4de8a9d836f1e198a3917d57f74f15b329658e38
--- /dev/null
+++ b/graph/incidents_graphml/f/f28ce210-1403-11ed-91bb-5f4a5e1f0902.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.104
+ 100.64.73.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.4
+ 100.64.76.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659624270
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f28ce210-1403-11ed-91bb-5f4a5e1f0902
+
+
+ INCIDENT_LINK
+ 1659624270
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f28ce210-1403-11ed-91bb-5f4a5e1f0902
+
+
+
diff --git a/graph/incidents_graphml/f/f290b5d0-0f7e-11ee-a9d1-514a3be7d931.graphml b/graph/incidents_graphml/f/f290b5d0-0f7e-11ee-a9d1-514a3be7d931.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bff9d65dd521a214ba8e4478c7c19bcaa27afe9c
--- /dev/null
+++ b/graph/incidents_graphml/f/f290b5d0-0f7e-11ee-a9d1-514a3be7d931.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.136
+ 100.64.43.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687274840
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f290b5d0-0f7e-11ee-a9d1-514a3be7d931
+
+
+
diff --git a/graph/incidents_graphml/f/f2916230-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f2916230-5b66-11ee-a387-a18350d70540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d4e6323aa10081a8a4a51ef108d71995a055149
--- /dev/null
+++ b/graph/incidents_graphml/f/f2916230-5b66-11ee-a387-a18350d70540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.124
+ 100.64.35.124
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695620821
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f2916230-5b66-11ee-a387-a18350d70540
+
+
+
diff --git a/graph/incidents_graphml/f/f2981e70-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f2981e70-06ef-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5df949280a68acddea3e182f2fcb9390d8f26ca
--- /dev/null
+++ b/graph/incidents_graphml/f/f2981e70-06ef-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.166
+ 100.64.46.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686333813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f2981e70-06ef-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/f/f29a63f0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f29a63f0-2ea5-11ee-a61f-7552bb17f553.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf35aca6f24b52c4c9b4ee4df7a9dba8e05bc7d4
--- /dev/null
+++ b/graph/incidents_graphml/f/f29a63f0-2ea5-11ee-a61f-7552bb17f553.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.37
+ 100.64.33.37
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690700077
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f29a63f0-2ea5-11ee-a61f-7552bb17f553
+
+
+
diff --git a/graph/incidents_graphml/f/f29e3ce0-77d5-11ee-9835-15031a37be5d.graphml b/graph/incidents_graphml/f/f29e3ce0-77d5-11ee-9835-15031a37be5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5117608e396cfa9f30d50e76c2a0d1d97e64b6ff
--- /dev/null
+++ b/graph/incidents_graphml/f/f29e3ce0-77d5-11ee-9835-15031a37be5d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.241
+ 100.64.23.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698747127
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f29e3ce0-77d5-11ee-9835-15031a37be5d
+
+
+
diff --git a/graph/incidents_graphml/f/f2a1b5e0-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f2a1b5e0-5b66-11ee-a387-a18350d70540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff597c431801bb655a66f31af1a1e3ac666cd7fa
--- /dev/null
+++ b/graph/incidents_graphml/f/f2a1b5e0-5b66-11ee-a387-a18350d70540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.124
+ 100.64.35.124
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695620821
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f2a1b5e0-5b66-11ee-a387-a18350d70540
+
+
+
diff --git a/graph/incidents_graphml/f/f2b34790-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f2b34790-06ef-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8fe11422f0ab0c3700767bb3dd5d7b0e3261b65
--- /dev/null
+++ b/graph/incidents_graphml/f/f2b34790-06ef-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.168
+ 100.64.46.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686333813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f2b34790-06ef-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/f/f2ba52d0-10bb-11ee-a3c2-a9ac98626f62.graphml b/graph/incidents_graphml/f/f2ba52d0-10bb-11ee-a3c2-a9ac98626f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..604da40bd8cb26c33a3add84d73ee5166563c034
--- /dev/null
+++ b/graph/incidents_graphml/f/f2ba52d0-10bb-11ee-a3c2-a9ac98626f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.255
+ 100.64.18.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687410991
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f2ba52d0-10bb-11ee-a3c2-a9ac98626f62
+
+
+
diff --git a/graph/incidents_graphml/f/f2ba9e80-77d5-11ee-9835-15031a37be5d.graphml b/graph/incidents_graphml/f/f2ba9e80-77d5-11ee-9835-15031a37be5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf6a05cf71210781bcd5e2a149e6fcf0488bf4ab
--- /dev/null
+++ b/graph/incidents_graphml/f/f2ba9e80-77d5-11ee-9835-15031a37be5d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.10
+ 100.64.12.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698747127
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f2ba9e80-77d5-11ee-9835-15031a37be5d
+
+
+
diff --git a/graph/incidents_graphml/f/f2bb1040-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f2bb1040-452b-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72ec8b15f00e7072b6b84982cb07ecd351dd3969
--- /dev/null
+++ b/graph/incidents_graphml/f/f2bb1040-452b-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.84
+ 100.64.16.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176555
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f2bb1040-452b-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/f/f2c1d0c0-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f2c1d0c0-1911-11ed-9439-83188f456eb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bae7f945b92238e43b40a07b5db0c3be8b69ce0
--- /dev/null
+++ b/graph/incidents_graphml/f/f2c1d0c0-1911-11ed-9439-83188f456eb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.79
+ 100.64.78.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.248
+ 100.64.70.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660180039
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2c1d0c0-1911-11ed-9439-83188f456eb5
+
+
+
diff --git a/graph/incidents_graphml/f/f2c992a0-77d5-11ee-9835-15031a37be5d.graphml b/graph/incidents_graphml/f/f2c992a0-77d5-11ee-9835-15031a37be5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53e2e098d0b9b7e9546d94111263c7477c5078bf
--- /dev/null
+++ b/graph/incidents_graphml/f/f2c992a0-77d5-11ee-9835-15031a37be5d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.10
+ 100.64.12.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698747128
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f2c992a0-77d5-11ee-9835-15031a37be5d
+
+
+
diff --git a/graph/incidents_graphml/f/f2d37a40-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f2d37a40-452b-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..102bcad82d3453414c59296bc811343681f3c8a1
--- /dev/null
+++ b/graph/incidents_graphml/f/f2d37a40-452b-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.84
+ 100.64.16.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176555
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f2d37a40-452b-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/f/f2d52b60-77d5-11ee-9835-15031a37be5d.graphml b/graph/incidents_graphml/f/f2d52b60-77d5-11ee-9835-15031a37be5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfc50d21069550b2abed17bdef47ea2c064289c0
--- /dev/null
+++ b/graph/incidents_graphml/f/f2d52b60-77d5-11ee-9835-15031a37be5d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.116
+ 100.64.50.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698747128
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f2d52b60-77d5-11ee-9835-15031a37be5d
+
+
+
diff --git a/graph/incidents_graphml/f/f2d69430-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f2d69430-eb51-11ec-8162-f7a03e680dde.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..245f754f6ca3f9b7be823022bb5a08e39e0d97e1
--- /dev/null
+++ b/graph/incidents_graphml/f/f2d69430-eb51-11ec-8162-f7a03e680dde.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.111
+ 100.64.71.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.157
+ 100.64.79.157
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655149774
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2d69430-eb51-11ec-8162-f7a03e680dde
+
+
+ INCIDENT_LINK
+ 1655149774
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2d69430-eb51-11ec-8162-f7a03e680dde
+
+
+
diff --git a/graph/incidents_graphml/f/f2d6ae10-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f2d6ae10-06ef-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef409ec6ede7a06c233e06bad5faf032e1cfe2f8
--- /dev/null
+++ b/graph/incidents_graphml/f/f2d6ae10-06ef-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.168
+ 100.64.46.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686333813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f2d6ae10-06ef-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/f/f2e02090-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/f/f2e02090-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f62d569375e4e67719c62d8eda9669d3d5d31dd
--- /dev/null
+++ b/graph/incidents_graphml/f/f2e02090-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.152
+ 100.64.7.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.196
+ USER-0015-1786.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656519868
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2e02090-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519868
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2e02090-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+
diff --git a/graph/incidents_graphml/f/f2e63df0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f2e63df0-a1fc-11ee-b2e6-711be6db0b61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11d55dc37eaa5141e8397c532925614e058d2a7c
--- /dev/null
+++ b/graph/incidents_graphml/f/f2e63df0-a1fc-11ee-b2e6-711be6db0b61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.114
+ 100.64.49.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703381827
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f2e63df0-a1fc-11ee-b2e6-711be6db0b61
+
+
+
diff --git a/graph/incidents_graphml/f/f2f02980-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f2f02980-06ef-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea0fdbe7b13ceb77594e2208fee8b21e8bc9b7b9
--- /dev/null
+++ b/graph/incidents_graphml/f/f2f02980-06ef-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686333813
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f2f02980-06ef-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/f/f2f13ee0-77d5-11ee-9835-15031a37be5d.graphml b/graph/incidents_graphml/f/f2f13ee0-77d5-11ee-9835-15031a37be5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed28f57c083e24a93de4dce3c9b14af2e5f84f99
--- /dev/null
+++ b/graph/incidents_graphml/f/f2f13ee0-77d5-11ee-9835-15031a37be5d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.110
+ 100.64.48.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698747128
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f2f13ee0-77d5-11ee-9835-15031a37be5d
+
+
+
diff --git a/graph/incidents_graphml/f/f2f4e3f0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f2f4e3f0-a1fc-11ee-b2e6-711be6db0b61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7490a9d989432a08004d302f797ae562346c89d2
--- /dev/null
+++ b/graph/incidents_graphml/f/f2f4e3f0-a1fc-11ee-b2e6-711be6db0b61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.114
+ 100.64.49.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703381827
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f2f4e3f0-a1fc-11ee-b2e6-711be6db0b61
+
+
+
diff --git a/graph/incidents_graphml/f/f2fb0930-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f2fb0930-1911-11ed-9439-83188f456eb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57220ac770e2006df9aaa0d9a7823aeb13b86877
--- /dev/null
+++ b/graph/incidents_graphml/f/f2fb0930-1911-11ed-9439-83188f456eb5.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.80
+ 100.64.78.80
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.90
+ 100.64.71.90
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660180040
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2fb0930-1911-11ed-9439-83188f456eb5
+
+
+ INCIDENT_LINK
+ 1660180040
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2fb0930-1911-11ed-9439-83188f456eb5
+
+
+
diff --git a/graph/incidents_graphml/f/f2fdbb80-fcd2-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/f/f2fdbb80-fcd2-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90c8451388fa8be4430da2de70cc0bccc2c30ff6
--- /dev/null
+++ b/graph/incidents_graphml/f/f2fdbb80-fcd2-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.123
+ 100.64.13.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.13.124
+ 100.64.13.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685221846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2fdbb80-fcd2-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685221846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2fdbb80-fcd2-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685221846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2fdbb80-fcd2-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685221846
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2fdbb80-fcd2-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/f/f2ffc420-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f2ffc420-1911-11ed-9439-83188f456eb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e10a5a5e98e3257c86c304975e43f5c1ffee6ed3
--- /dev/null
+++ b/graph/incidents_graphml/f/f2ffc420-1911-11ed-9439-83188f456eb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.129
+ 100.64.11.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.69
+ 100.64.72.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660180040
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f2ffc420-1911-11ed-9439-83188f456eb5
+
+
+
diff --git a/graph/incidents_graphml/f/f3035530-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3035530-7541-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f09e923e8a66e32ead6401288c50f9b4312997e2
--- /dev/null
+++ b/graph/incidents_graphml/f/f3035530-7541-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.99
+ 100.64.29.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698463660
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f3035530-7541-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f304f440-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f304f440-1911-11ed-9439-83188f456eb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0adca6225c0b449d9e4c32f9a973b5c4013e83eb
--- /dev/null
+++ b/graph/incidents_graphml/f/f304f440-1911-11ed-9439-83188f456eb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.88
+ 100.64.76.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.152
+ 100.64.72.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660180040
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f304f440-1911-11ed-9439-83188f456eb5
+
+
+
diff --git a/graph/incidents_graphml/f/f30a8f50-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f30a8f50-06ef-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa30635f153b31fe4bf545624291f773a0f3dbf2
--- /dev/null
+++ b/graph/incidents_graphml/f/f30a8f50-06ef-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686333814
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f30a8f50-06ef-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/f/f312be80-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f312be80-7541-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4687db3d9c0a4e9fd2df9477bae913bedee10ee
--- /dev/null
+++ b/graph/incidents_graphml/f/f312be80-7541-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.101
+ 100.64.29.101
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698463660
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f312be80-7541-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f312d6f0-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f312d6f0-1911-11ed-9439-83188f456eb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab9b20d62d3ff49abf9a3ff8083fe281693f0336
--- /dev/null
+++ b/graph/incidents_graphml/f/f312d6f0-1911-11ed-9439-83188f456eb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.152
+ 100.64.72.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.88
+ 100.64.76.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660180040
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f312d6f0-1911-11ed-9439-83188f456eb5
+
+
+
diff --git a/graph/incidents_graphml/f/f313c440-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f313c440-eb51-11ec-8162-f7a03e680dde.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3128088eb0d2adb17e50da72e795058fe375068
--- /dev/null
+++ b/graph/incidents_graphml/f/f313c440-eb51-11ec-8162-f7a03e680dde.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.166
+ USER-0015-1816.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655149774
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f313c440-eb51-11ec-8162-f7a03e680dde
+
+
+
diff --git a/graph/incidents_graphml/f/f320a130-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f320a130-7541-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f55fc986a93acaee4d25aff6178cb26b2ccabd01
--- /dev/null
+++ b/graph/incidents_graphml/f/f320a130-7541-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.101
+ 100.64.29.101
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698463660
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f320a130-7541-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f3245e20-eb97-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/f/f3245e20-eb97-11ee-8f3a-6b2412cfa52f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d2d9464761579b61affa2acf1c85ff545e85743
--- /dev/null
+++ b/graph/incidents_graphml/f/f3245e20-eb97-11ee-8f3a-6b2412cfa52f.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.144.11.175
+ 10.144.11.175
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","PAN NGFW","Windows Active Directory"]
+
+
+ HOST
+ 100.64.70.45
+ 100.64.70.45
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.44
+ 100.64.70.44
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.50
+ 100.64.70.50
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.51
+ 100.64.70.51
+ ["Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.52
+ 100.64.70.52
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.53
+ 100.64.70.53
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.54
+ 100.64.70.54
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.55
+ 100.64.70.55
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.56
+ 100.64.70.56
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.57
+ 100.64.70.57
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.98
+ 100.64.68.98
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.58
+ USER-0015-1565.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.59
+ 100.64.70.59
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.155
+ 100.64.69.155
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.43
+ 100.64.70.43
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.60
+ 100.64.70.60
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.61
+ 100.64.70.61
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.62
+ 100.64.70.62
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.63
+ 100.64.70.63
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.64
+ 100.64.70.64
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474834
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3245e20-eb97-11ee-8f3a-6b2412cfa52f
+
+
+
diff --git a/graph/incidents_graphml/f/f325c870-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f325c870-1bdf-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3daae1d5ec34152fe3e9260a0ad320072dccc9fb
--- /dev/null
+++ b/graph/incidents_graphml/f/f325c870-1bdf-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.90.18
+ 100.64.90.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660488418
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f325c870-1bdf-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/f32d2450-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f32d2450-7541-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d857e2041ebca4cbf7a4b6cd0445a9cd568fd8cf
--- /dev/null
+++ b/graph/incidents_graphml/f/f32d2450-7541-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.103
+ 100.64.29.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698463660
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f32d2450-7541-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f32e05d0-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f32e05d0-1bdf-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6fab3cd5260af372bd2e1e8f49a503fc655ae444
--- /dev/null
+++ b/graph/incidents_graphml/f/f32e05d0-1bdf-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.18
+ 100.64.90.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660488419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f32e05d0-1bdf-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/f334ac10-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f334ac10-a1fc-11ee-b2e6-711be6db0b61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df17dbf5fb3cb9167e24e0ed1a7e9bca36d90482
--- /dev/null
+++ b/graph/incidents_graphml/f/f334ac10-a1fc-11ee-b2e6-711be6db0b61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.250
+ 100.64.26.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703381828
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f334ac10-a1fc-11ee-b2e6-711be6db0b61
+
+
+
diff --git a/graph/incidents_graphml/f/f33531c0-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f33531c0-1bdf-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d19da42a311481f0446fb18739b8c3c9cfebc5aa
--- /dev/null
+++ b/graph/incidents_graphml/f/f33531c0-1bdf-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.90.19
+ 100.64.90.19
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660488419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f33531c0-1bdf-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/f337a0a0-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/f/f337a0a0-6232-11ee-a972-e59ec7ee05b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a059865b4494a5db65be7d5ed12636599f7dee4
--- /dev/null
+++ b/graph/incidents_graphml/f/f337a0a0-6232-11ee-a972-e59ec7ee05b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.37
+ 100.64.23.37
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696368146
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f337a0a0-6232-11ee-a972-e59ec7ee05b9
+
+
+
diff --git a/graph/incidents_graphml/f/f33a91d0-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f33a91d0-7541-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1ad881d316f535177843b440077d7d1c65e13c3
--- /dev/null
+++ b/graph/incidents_graphml/f/f33a91d0-7541-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.103
+ 100.64.29.103
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698463660
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f33a91d0-7541-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f33e5980-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f33e5980-1bdf-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a259c7b716910cbaaba976cd6a05d0604e1b1cab
--- /dev/null
+++ b/graph/incidents_graphml/f/f33e5980-1bdf-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.19
+ 100.64.90.19
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660488419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f33e5980-1bdf-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/f3538c60-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f3538c60-eb51-11ec-8162-f7a03e680dde.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e8e978d746f949d524c436a22656ad70756e64c
--- /dev/null
+++ b/graph/incidents_graphml/f/f3538c60-eb51-11ec-8162-f7a03e680dde.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.166
+ USER-0015-1816.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655149774
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f3538c60-eb51-11ec-8162-f7a03e680dde
+
+
+
diff --git a/graph/incidents_graphml/f/f35a4ca0-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/f/f35a4ca0-0ea8-11ee-ac51-1fc12cdb93ff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..156eb05f1e41de3cf693d62b9323e109509dbd2a
--- /dev/null
+++ b/graph/incidents_graphml/f/f35a4ca0-0ea8-11ee-ac51-1fc12cdb93ff.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.2
+ USER-0015-1239.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687182929
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f35a4ca0-0ea8-11ee-ac51-1fc12cdb93ff
+
+
+ INCIDENT_LINK
+ 1687182929
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f35a4ca0-0ea8-11ee-ac51-1fc12cdb93ff
+
+
+
diff --git a/graph/incidents_graphml/f/f35d8ce0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f35d8ce0-2ea5-11ee-a61f-7552bb17f553.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3366675841d82fc6370e3c1e0ca6f50421120bbc
--- /dev/null
+++ b/graph/incidents_graphml/f/f35d8ce0-2ea5-11ee-a61f-7552bb17f553.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.39
+ 100.64.33.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690700078
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f35d8ce0-2ea5-11ee-a61f-7552bb17f553
+
+
+
diff --git a/graph/incidents_graphml/f/f3628c30-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3628c30-7541-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..acf908a00591e722ba402cffc0e13222e367137b
--- /dev/null
+++ b/graph/incidents_graphml/f/f3628c30-7541-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.84
+ 100.64.16.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698463661
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3628c30-7541-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f36bb940-7afa-11ee-b62a-83f597088d9e.graphml b/graph/incidents_graphml/f/f36bb940-7afa-11ee-b62a-83f597088d9e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0bb3748b4337157e1d077d59ebb630ea3a6f6a4
--- /dev/null
+++ b/graph/incidents_graphml/f/f36bb940-7afa-11ee-b62a-83f597088d9e.graphml
@@ -0,0 +1,287 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.14
+ 100.64.38.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.15
+ 100.64.38.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.161
+ 100.64.32.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.104
+ 100.64.11.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.16
+ 100.64.38.16
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.17
+ 100.64.38.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f36bb940-7afa-11ee-b62a-83f597088d9e
+
+
+
diff --git a/graph/incidents_graphml/f/f36fb940-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f36fb940-a1fc-11ee-b2e6-711be6db0b61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..faec11501fa0a1e327e6e071deeaa77fd58dcee0
--- /dev/null
+++ b/graph/incidents_graphml/f/f36fb940-a1fc-11ee-b2e6-711be6db0b61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.99
+ 100.64.11.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703381828
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f36fb940-a1fc-11ee-b2e6-711be6db0b61
+
+
+
diff --git a/graph/incidents_graphml/f/f3710b20-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3710b20-7541-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..adc131cc26e05627da9e26b1e21aa83a8b7cbca2
--- /dev/null
+++ b/graph/incidents_graphml/f/f3710b20-7541-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.84
+ 100.64.16.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698463661
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f3710b20-7541-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f3766020-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/f/f3766020-0ea8-11ee-ac51-1fc12cdb93ff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e954c65019f5163b83d83839106a7d4043913b1
--- /dev/null
+++ b/graph/incidents_graphml/f/f3766020-0ea8-11ee-ac51-1fc12cdb93ff.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.2
+ USER-0015-1239.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687182929
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f3766020-0ea8-11ee-ac51-1fc12cdb93ff
+
+
+
diff --git a/graph/incidents_graphml/f/f378d8a0-7afa-11ee-b62a-83f597088d9e.graphml b/graph/incidents_graphml/f/f378d8a0-7afa-11ee-b62a-83f597088d9e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58a30bfd72e9f1063245b59fc1056911dafe3c43
--- /dev/null
+++ b/graph/incidents_graphml/f/f378d8a0-7afa-11ee-b62a-83f597088d9e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.14
+ 100.64.38.14
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f378d8a0-7afa-11ee-b62a-83f597088d9e
+
+
+
diff --git a/graph/incidents_graphml/f/f37afff0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f37afff0-2ea5-11ee-a61f-7552bb17f553.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bca471359eb943e8567183eb90c2e226d3c9f3df
--- /dev/null
+++ b/graph/incidents_graphml/f/f37afff0-2ea5-11ee-a61f-7552bb17f553.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.39
+ 100.64.33.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690700078
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f37afff0-2ea5-11ee-a61f-7552bb17f553
+
+
+
diff --git a/graph/incidents_graphml/f/f3802650-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3802650-7541-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..920f43beb41b8098098aebe451b2ca7d59a139cd
--- /dev/null
+++ b/graph/incidents_graphml/f/f3802650-7541-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.70
+ 100.64.13.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698463661
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3802650-7541-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f3813610-eb95-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/f/f3813610-eb95-11ee-8f3a-6b2412cfa52f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca4d073026bee615decb1031f1da1ba59ad41a00
--- /dev/null
+++ b/graph/incidents_graphml/f/f3813610-eb95-11ee-8f3a-6b2412cfa52f.graphml
@@ -0,0 +1,653 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.240
+ 100.64.9.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.31.242
+ 100.64.31.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.8576171875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.70.9
+ 100.64.70.9
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.68.241
+ 100.64.68.241
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.59.184
+ 100.64.59.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.37.76
+ 100.64.37.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.214
+ 100.64.68.214
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]
+
+
+ HOST
+ 100.64.70.10
+ 100.64.70.10
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.24.143
+ 100.64.24.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473976
+ malicious
+ 0.8576171875
+ 0.8576171875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3813610-eb95-11ee-8f3a-6b2412cfa52f
+
+
+
diff --git a/graph/incidents_graphml/f/f3842c50-5c87-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/f/f3842c50-5c87-11ee-8e0e-93298c809ccb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e113d126c5935fef724891f6f65678e2c9d6585
--- /dev/null
+++ b/graph/incidents_graphml/f/f3842c50-5c87-11ee-8e0e-93298c809ccb.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.82
+ 100.64.69.82
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.83
+ 100.64.69.83
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.84
+ 100.64.69.84
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.169
+ 100.64.68.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695744947
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3842c50-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744947
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3842c50-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744947
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3842c50-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744947
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3842c50-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744947
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3842c50-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744947
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3842c50-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744947
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3842c50-5c87-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695744947
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3842c50-5c87-11ee-8e0e-93298c809ccb
+
+
+
diff --git a/graph/incidents_graphml/f/f38d8820-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f38d8820-eb51-11ec-8162-f7a03e680dde.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cca980c381349c5de4dc0613bea00cef085aac61
--- /dev/null
+++ b/graph/incidents_graphml/f/f38d8820-eb51-11ec-8162-f7a03e680dde.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.26
+ USER-0015-1817.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655149775
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f38d8820-eb51-11ec-8162-f7a03e680dde
+
+
+
diff --git a/graph/incidents_graphml/f/f38e1440-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f38e1440-d360-11ee-82a4-572767498e98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc840037d971b397cd5e627fdfbf2e3424697c34
--- /dev/null
+++ b/graph/incidents_graphml/f/f38e1440-d360-11ee-82a4-572767498e98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.240
+ 100.64.8.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708812385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f38e1440-d360-11ee-82a4-572767498e98
+
+
+
diff --git a/graph/incidents_graphml/f/f3924ec0-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3924ec0-7541-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..041eba045afb1aad8ad83c84c1b126396c4212ee
--- /dev/null
+++ b/graph/incidents_graphml/f/f3924ec0-7541-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.70
+ 100.64.13.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698463661
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f3924ec0-7541-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f399b2b0-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f399b2b0-e53f-11ed-b729-bb6ecc5516ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..882afa5e4bd6fbee306595c1a581b7492c442acc
--- /dev/null
+++ b/graph/incidents_graphml/f/f399b2b0-e53f-11ed-b729-bb6ecc5516ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.68.113
+ 100.64.68.113
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1682629835
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f399b2b0-e53f-11ed-b729-bb6ecc5516ca
+
+
+
diff --git a/graph/incidents_graphml/f/f3a12120-7afa-11ee-b62a-83f597088d9e.graphml b/graph/incidents_graphml/f/f3a12120-7afa-11ee-b62a-83f597088d9e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3aee9dbd81932a75e8dbe735837021f5b4007582
--- /dev/null
+++ b/graph/incidents_graphml/f/f3a12120-7afa-11ee-b62a-83f597088d9e.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.22
+ 100.64.38.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.23
+ 100.64.38.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3a12120-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3a12120-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3a12120-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3a12120-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3a12120-7afa-11ee-b62a-83f597088d9e
+
+
+ INCIDENT_LINK
+ 1699092874
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3a12120-7afa-11ee-b62a-83f597088d9e
+
+
+
diff --git a/graph/incidents_graphml/f/f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/f/f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71ae05991856c19d2294c90e504543520a2ac043
--- /dev/null
+++ b/graph/incidents_graphml/f/f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.155
+ 100.64.78.155
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.2
+ 100.64.77.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.156
+ 100.64.78.156
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.75
+ 100.64.73.75
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.72
+ 100.64.73.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.51
+ 100.64.72.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.243
+ 100.64.71.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.33.134
+ 100.64.33.134
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.157
+ 100.64.78.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.17.47
+ 100.64.17.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.158
+ 100.64.78.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519869
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+
diff --git a/graph/incidents_graphml/f/f3a6c770-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/f/f3a6c770-4efd-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27221bab8fe18d74f5efa62ea681960dbe4e771a
--- /dev/null
+++ b/graph/incidents_graphml/f/f3a6c770-4efd-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.98
+ 100.64.17.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694256311
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3a6c770-4efd-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/f/f3a8a0b0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/f/f3a8a0b0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cb67254ede0e41382b33da0a5a81d0a33feedab
--- /dev/null
+++ b/graph/incidents_graphml/f/f3a8a0b0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.121
+ 100.64.77.121
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.167
+ 100.64.72.167
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656519870
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a8a0b0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+ INCIDENT_LINK
+ 1656519870
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a8a0b0-f7c7-11ec-bee1-ad5b1c4e4be8
+
+
+
diff --git a/graph/incidents_graphml/f/f3a9cd60-5ce2-11ee-888f-c5a21ae2b888.graphml b/graph/incidents_graphml/f/f3a9cd60-5ce2-11ee-888f-c5a21ae2b888.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a2ddeb63530f478da13ce89b13a15c98383bae9
--- /dev/null
+++ b/graph/incidents_graphml/f/f3a9cd60-5ce2-11ee-888f-c5a21ae2b888.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.3
+ 100.64.15.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.73
+ 100.64.44.73
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.74
+ 100.64.44.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.74
+ 100.64.14.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.75
+ 100.64.44.75
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.76
+ 100.64.44.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3a9cd60-5ce2-11ee-888f-c5a21ae2b888
+
+
+
diff --git a/graph/incidents_graphml/f/f3ab1220-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f3ab1220-d360-11ee-82a4-572767498e98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f21877e24a37edca1e182c28416d8c6b0f894cb
--- /dev/null
+++ b/graph/incidents_graphml/f/f3ab1220-d360-11ee-82a4-572767498e98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.240
+ 100.64.8.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708812385
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f3ab1220-d360-11ee-82a4-572767498e98
+
+
+
diff --git a/graph/incidents_graphml/f/f3b7bec0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f3b7bec0-a1fc-11ee-b2e6-711be6db0b61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..047abc42115c736457565fa302b9b666fb2fc1f0
--- /dev/null
+++ b/graph/incidents_graphml/f/f3b7bec0-a1fc-11ee-b2e6-711be6db0b61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.95
+ 100.64.33.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703381828
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3b7bec0-a1fc-11ee-b2e6-711be6db0b61
+
+
+
diff --git a/graph/incidents_graphml/f/f3c55f60-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/f3c55f60-a05b-11ed-9aec-656149dc5369.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66c18d080d45347c1f622c195051438bbac1f56d
--- /dev/null
+++ b/graph/incidents_graphml/f/f3c55f60-a05b-11ed-9aec-656149dc5369.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.14
+ 100.64.91.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675055231
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f3c55f60-a05b-11ed-9aec-656149dc5369
+
+
+
diff --git a/graph/incidents_graphml/f/f3c77630-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f3c77630-a1fc-11ee-b2e6-711be6db0b61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16d68fd335a384968f5e8ae303061d20558e3a1a
--- /dev/null
+++ b/graph/incidents_graphml/f/f3c77630-a1fc-11ee-b2e6-711be6db0b61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.95
+ 100.64.33.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703381828
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f3c77630-a1fc-11ee-b2e6-711be6db0b61
+
+
+
diff --git a/graph/incidents_graphml/f/f3c7c550-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f3c7c550-452b-11ee-8b8f-a1a07f616025.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b164629f0b7da659119b8e7c335bf9aa72d2b00f
--- /dev/null
+++ b/graph/incidents_graphml/f/f3c7c550-452b-11ee-8b8f-a1a07f616025.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.225
+ 100.64.5.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176557
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3c7c550-452b-11ee-8b8f-a1a07f616025
+
+
+ INCIDENT_LINK
+ 1693176557
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3c7c550-452b-11ee-8b8f-a1a07f616025
+
+
+
diff --git a/graph/incidents_graphml/f/f3cac040-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f3cac040-f4ab-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d66126553dd3e704cb41df79381ded09c76dd60c
--- /dev/null
+++ b/graph/incidents_graphml/f/f3cac040-f4ab-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.127
+ 100.64.65.127
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712472986
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3cac040-f4ab-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/f/f3cd5b40-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f3cd5b40-11e8-11ed-97d5-3360f7274b74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b075b2cc7cf209346b87dd28b208a5e4e94ed07f
--- /dev/null
+++ b/graph/incidents_graphml/f/f3cd5b40-11e8-11ed-97d5-3360f7274b74.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.138
+ 100.64.77.138
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.221
+ 100.64.71.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659392773
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3cd5b40-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392773
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3cd5b40-11e8-11ed-97d5-3360f7274b74
+
+
+
diff --git a/graph/incidents_graphml/f/f3d6ed30-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f3d6ed30-eb51-11ec-8162-f7a03e680dde.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d21dd93517322ef6f3fe8308ea8b25f4bfa8293
--- /dev/null
+++ b/graph/incidents_graphml/f/f3d6ed30-eb51-11ec-8162-f7a03e680dde.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.26
+ USER-0015-1817.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655149775
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f3d6ed30-eb51-11ec-8162-f7a03e680dde
+
+
+
diff --git a/graph/incidents_graphml/f/f3d86620-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f3d86620-a1fc-11ee-b2e6-711be6db0b61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6defb696c92fad165654836403bdf3a14e0b32f2
--- /dev/null
+++ b/graph/incidents_graphml/f/f3d86620-a1fc-11ee-b2e6-711be6db0b61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.116
+ 100.64.49.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703381829
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f3d86620-a1fc-11ee-b2e6-711be6db0b61
+
+
+
diff --git a/graph/incidents_graphml/f/f3dc5010-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3dc5010-7541-11ee-8b17-61801d88c129.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..feddf2b936685869cde57032c7c9c0d9d88ad3ca
--- /dev/null
+++ b/graph/incidents_graphml/f/f3dc5010-7541-11ee-8b17-61801d88c129.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.105
+ 100.64.29.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698463662
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3dc5010-7541-11ee-8b17-61801d88c129
+
+
+
diff --git a/graph/incidents_graphml/f/f3e09230-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f3e09230-f4ab-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec08dd14fe269bffd5bbb49b28b6d546616cf8d3
--- /dev/null
+++ b/graph/incidents_graphml/f/f3e09230-f4ab-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.127
+ 100.64.65.127
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712472986
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f3e09230-f4ab-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/f/f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6.graphml b/graph/incidents_graphml/f/f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc924fcc65fc1b8897e7c8fe114f99597223b375
--- /dev/null
+++ b/graph/incidents_graphml/f/f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.19
+ 100.64.25.19
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Azure Security"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.182
+ 100.64.40.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.162
+ 100.64.9.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.49
+ 100.64.23.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.97
+ 100.64.38.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.183
+ 100.64.40.183
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.152
+ 100.64.10.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597997
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+
diff --git a/graph/incidents_graphml/f/f3e68310-1145-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f3e68310-1145-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6590c201bf08fd4cbc6089e38b3d79eb9aa3271
--- /dev/null
+++ b/graph/incidents_graphml/f/f3e68310-1145-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.189
+ 100.64.18.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.151
+ 100.64.71.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687470263
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3e68310-1145-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687470263
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3e68310-1145-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/f3e844a0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f3e844a0-a1fc-11ee-b2e6-711be6db0b61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9bb82d1c5537e01b622d99fcb677c121db3fdc6a
--- /dev/null
+++ b/graph/incidents_graphml/f/f3e844a0-a1fc-11ee-b2e6-711be6db0b61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.66
+ 100.64.36.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703381829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f3e844a0-a1fc-11ee-b2e6-711be6db0b61
+
+
+
diff --git a/graph/incidents_graphml/f/f3e86e40-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f3e86e40-efc3-11ec-9799-0176ac54cf1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7090bc4e3c4a1e43ac65d358ea001b36f435ab3
--- /dev/null
+++ b/graph/incidents_graphml/f/f3e86e40-efc3-11ec-9799-0176ac54cf1b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.40
+ USER-0015-1612.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655638543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3e86e40-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3e86e40-efc3-11ec-9799-0176ac54cf1b
+
+
+
diff --git a/graph/incidents_graphml/f/f3f21e60-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f3f21e60-f4ab-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..993df8098737cab422ae286d29a2b951a3154c4a
--- /dev/null
+++ b/graph/incidents_graphml/f/f3f21e60-f4ab-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.219
+ 100.64.35.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712472986
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3f21e60-f4ab-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/f/f3f52e20-179d-11ee-9bde-a75d9ab1122d.graphml b/graph/incidents_graphml/f/f3f52e20-179d-11ee-9bde-a75d9ab1122d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a38b0d2782af7eba2ab9554681e5aa73a1767dd4
--- /dev/null
+++ b/graph/incidents_graphml/f/f3f52e20-179d-11ee-9bde-a75d9ab1122d.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.15
+ 100.64.82.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.234
+ 100.64.71.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.16
+ 100.64.82.16
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.43.118
+ 100.64.43.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688167766
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3f52e20-179d-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167766
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3f52e20-179d-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167766
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3f52e20-179d-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167766
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3f52e20-179d-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167766
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3f52e20-179d-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167766
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f3f52e20-179d-11ee-9bde-a75d9ab1122d
+
+
+
diff --git a/graph/incidents_graphml/f/f3f786e0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f3f786e0-a1fc-11ee-b2e6-711be6db0b61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b5cb71bae7dfb1da5283aa65bf5e13c95e040a4
--- /dev/null
+++ b/graph/incidents_graphml/f/f3f786e0-a1fc-11ee-b2e6-711be6db0b61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.66
+ 100.64.36.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703381829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f3f786e0-a1fc-11ee-b2e6-711be6db0b61
+
+
+
diff --git a/graph/incidents_graphml/f/f4033560-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f4033560-f4ab-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f0ea23eae1f240aafcfc1e573754b8840302fd7
--- /dev/null
+++ b/graph/incidents_graphml/f/f4033560-f4ab-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.219
+ 100.64.35.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712472986
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4033560-f4ab-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/f/f40590a0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f40590a0-a1fc-11ee-b2e6-711be6db0b61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..612e9cf7df550b4dd7edb8701bd5e43d54507335
--- /dev/null
+++ b/graph/incidents_graphml/f/f40590a0-a1fc-11ee-b2e6-711be6db0b61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.117
+ 100.64.49.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703381829
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f40590a0-a1fc-11ee-b2e6-711be6db0b61
+
+
+
diff --git a/graph/incidents_graphml/f/f40ce6d0-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/f40ce6d0-1948-11ee-8b71-f9525f65ac72.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70f1515ef9033764a7f60f9014d11c46a983aab5
--- /dev/null
+++ b/graph/incidents_graphml/f/f40ce6d0-1948-11ee-8b71-f9525f65ac72.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.97
+ 100.64.74.97
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688351161
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f40ce6d0-1948-11ee-8b71-f9525f65ac72
+
+
+
diff --git a/graph/incidents_graphml/f/f40ec610-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f40ec610-eb51-11ec-8162-f7a03e680dde.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..424c3bf322e9caffbfd49ff2b7a35e06a69bb1c9
--- /dev/null
+++ b/graph/incidents_graphml/f/f40ec610-eb51-11ec-8162-f7a03e680dde.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.194
+ USER-0015-1818.example.internal
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.158
+ USER-0015-1819.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655149776
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f40ec610-eb51-11ec-8162-f7a03e680dde
+
+
+ INCIDENT_LINK
+ 1655149776
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f40ec610-eb51-11ec-8162-f7a03e680dde
+
+
+ INCIDENT_LINK
+ 1655149776
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f40ec610-eb51-11ec-8162-f7a03e680dde
+
+
+ INCIDENT_LINK
+ 1655149776
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f40ec610-eb51-11ec-8162-f7a03e680dde
+
+
+
diff --git a/graph/incidents_graphml/f/f428ac40-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f428ac40-e53f-11ed-b729-bb6ecc5516ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..966c76bb200725fdd34b88272d25a4d87474850d
--- /dev/null
+++ b/graph/incidents_graphml/f/f428ac40-e53f-11ed-b729-bb6ecc5516ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.68.114
+ 100.64.68.114
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1682629836
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f428ac40-e53f-11ed-b729-bb6ecc5516ca
+
+
+
diff --git a/graph/incidents_graphml/f/f435a480-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/f435a480-1948-11ee-8b71-f9525f65ac72.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4821a3108b9cc9d9e0721e832085d45a26f0bb59
--- /dev/null
+++ b/graph/incidents_graphml/f/f435a480-1948-11ee-8b71-f9525f65ac72.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.97
+ 100.64.74.97
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688351162
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f435a480-1948-11ee-8b71-f9525f65ac72
+
+
+
diff --git a/graph/incidents_graphml/f/f435eeb0-0a0a-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/f/f435eeb0-0a0a-11ee-9aea-c52880a9cb1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f71ebd8c2680433f7954d9fc389d1d254cd025cd
--- /dev/null
+++ b/graph/incidents_graphml/f/f435eeb0-0a0a-11ee-9aea-c52880a9cb1e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.235
+ 100.64.11.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.123
+ 100.64.71.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686675265
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f435eeb0-0a0a-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675265
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f435eeb0-0a0a-11ee-9aea-c52880a9cb1e
+
+
+
diff --git a/graph/incidents_graphml/f/f43ce6d0-29b7-11ee-b86f-6b6c9ebf54e6.graphml b/graph/incidents_graphml/f/f43ce6d0-29b7-11ee-b86f-6b6c9ebf54e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5bde26acfd17332eb215938536a3773b1b51d91
--- /dev/null
+++ b/graph/incidents_graphml/f/f43ce6d0-29b7-11ee-b86f-6b6c9ebf54e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.43
+ 100.64.28.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690158054
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f43ce6d0-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+
diff --git a/graph/incidents_graphml/f/f4461b60-fd11-11ed-a4b5-cd7044d3b555.graphml b/graph/incidents_graphml/f/f4461b60-fd11-11ed-a4b5-cd7044d3b555.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36cb09efe6bf6e4c802f3b2744e20f95368080f2
--- /dev/null
+++ b/graph/incidents_graphml/f/f4461b60-fd11-11ed-a4b5-cd7044d3b555.graphml
@@ -0,0 +1,785 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.142
+ 100.64.41.142
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.162
+ 100.64.41.162
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.163
+ 100.64.41.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.223
+ 100.64.19.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.34
+ 100.64.7.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.164
+ 100.64.41.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.144
+ 100.64.41.144
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.165
+ 100.64.41.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.23
+ 100.64.12.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.206
+ 100.64.6.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.235
+ 100.64.10.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.166
+ 100.64.41.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.167
+ 100.64.41.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.168
+ 100.64.41.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.169
+ 100.64.41.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.13.133
+ 100.64.13.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.12
+ 100.64.19.12
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4461b60-fd11-11ed-a4b5-cd7044d3b555
+
+
+
diff --git a/graph/incidents_graphml/f/f4598ab0-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f4598ab0-eb51-11ec-8162-f7a03e680dde.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..876bb03289f3d9c42c1b5ca3039586fa1fb97120
--- /dev/null
+++ b/graph/incidents_graphml/f/f4598ab0-eb51-11ec-8162-f7a03e680dde.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.156
+ USER-0015-1820.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655149776
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4598ab0-eb51-11ec-8162-f7a03e680dde
+
+
+
diff --git a/graph/incidents_graphml/f/f466e9d0-fd11-11ed-a4b5-cd7044d3b555.graphml b/graph/incidents_graphml/f/f466e9d0-fd11-11ed-a4b5-cd7044d3b555.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc469cd7bb2abf7458095b832e704f94b84f4b13
--- /dev/null
+++ b/graph/incidents_graphml/f/f466e9d0-fd11-11ed-a4b5-cd7044d3b555.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.180
+ 100.64.41.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685248907
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f466e9d0-fd11-11ed-a4b5-cd7044d3b555
+
+
+
diff --git a/graph/incidents_graphml/f/f476bd60-0d84-11ed-9b08-71b0edc527ac.graphml b/graph/incidents_graphml/f/f476bd60-0d84-11ed-9b08-71b0edc527ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d83d9b5341e4d95f3d9cbbf25940ac240aa5ec6e
--- /dev/null
+++ b/graph/incidents_graphml/f/f476bd60-0d84-11ed-9b08-71b0edc527ac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.247
+ 100.64.77.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1658910020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f476bd60-0d84-11ed-9b08-71b0edc527ac
+
+
+
diff --git a/graph/incidents_graphml/f/f47d4d10-0d84-11ed-9b08-71b0edc527ac.graphml b/graph/incidents_graphml/f/f47d4d10-0d84-11ed-9b08-71b0edc527ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9cc70592a07ace69fa68049b8f5051cabf1805b
--- /dev/null
+++ b/graph/incidents_graphml/f/f47d4d10-0d84-11ed-9b08-71b0edc527ac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.247
+ 100.64.77.247
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658910020
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f47d4d10-0d84-11ed-9b08-71b0edc527ac
+
+
+
diff --git a/graph/incidents_graphml/f/f480f690-0d84-11ed-9b08-71b0edc527ac.graphml b/graph/incidents_graphml/f/f480f690-0d84-11ed-9b08-71b0edc527ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2dba5d58aa32f249c2cb91390034743c214d0c4
--- /dev/null
+++ b/graph/incidents_graphml/f/f480f690-0d84-11ed-9b08-71b0edc527ac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.57
+ 100.64.74.57
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1658910020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f480f690-0d84-11ed-9b08-71b0edc527ac
+
+
+
diff --git a/graph/incidents_graphml/f/f4816d70-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/f4816d70-908f-11ee-8556-17eb2ccba952.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9dcb43d5f05eba5ef70233645ebfc54c71e963e
--- /dev/null
+++ b/graph/incidents_graphml/f/f4816d70-908f-11ee-8556-17eb2ccba952.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.202
+ 100.64.6.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.983125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701465845
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4816d70-908f-11ee-8556-17eb2ccba952
+
+
+ INCIDENT_LINK
+ 1701465845
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4816d70-908f-11ee-8556-17eb2ccba952
+
+
+
diff --git a/graph/incidents_graphml/f/f483f210-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f483f210-6106-11ee-bc15-ebbbf2eb09b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4a6d914ace49b2f75c949321adca4ee1e2a2e75
--- /dev/null
+++ b/graph/incidents_graphml/f/f483f210-6106-11ee-bc15-ebbbf2eb09b5.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.12
+ 100.64.30.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696239299
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f483f210-6106-11ee-bc15-ebbbf2eb09b5
+
+
+ INCIDENT_LINK
+ 1696239299
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f483f210-6106-11ee-bc15-ebbbf2eb09b5
+
+
+
diff --git a/graph/incidents_graphml/f/f483f740-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f483f740-7e40-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..acdf844b7e6a4d496f05c689074aae4ce41564ea
--- /dev/null
+++ b/graph/incidents_graphml/f/f483f740-7e40-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.68
+ 100.64.46.68
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699452794
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f483f740-7e40-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/f/f487e6a0-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f487e6a0-0a07-11ee-9f50-eb86987e1788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95d9f40c069aa47baa7a74763217bc2ec530b729
--- /dev/null
+++ b/graph/incidents_graphml/f/f487e6a0-0a07-11ee-9f50-eb86987e1788.graphml
@@ -0,0 +1,755 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.11
+ 100.64.29.11
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.33
+ 100.64.11.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.12
+ 100.64.29.12
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.13
+ 100.64.29.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.114
+ USER-0015-1204.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.14
+ 100.64.29.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.15
+ 100.64.29.15
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.150
+ 100.64.19.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.926875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.16
+ 100.64.29.16
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.17
+ 100.64.29.17
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.129
+ 100.64.25.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.18
+ 100.64.29.18
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.19
+ 100.64.29.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.20
+ USER-0015-1277.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673977
+ malicious
+ 0.926875
+ 0.926875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f487e6a0-0a07-11ee-9f50-eb86987e1788
+
+
+
diff --git a/graph/incidents_graphml/f/f4882280-0d84-11ed-9b08-71b0edc527ac.graphml b/graph/incidents_graphml/f/f4882280-0d84-11ed-9b08-71b0edc527ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c0686d3ae2eafeb042daf06b08834d1d0985803
--- /dev/null
+++ b/graph/incidents_graphml/f/f4882280-0d84-11ed-9b08-71b0edc527ac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.57
+ 100.64.74.57
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1658910020
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4882280-0d84-11ed-9b08-71b0edc527ac
+
+
+
diff --git a/graph/incidents_graphml/f/f48b28c0-9200-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/f/f48b28c0-9200-11ee-ac87-cff3005068fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88f50db717b77d4ffe67406c4d64433abb2b43e2
--- /dev/null
+++ b/graph/incidents_graphml/f/f48b28c0-9200-11ee-ac87-cff3005068fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.144
+ 100.64.10.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701624329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f48b28c0-9200-11ee-ac87-cff3005068fb
+
+
+
diff --git a/graph/incidents_graphml/f/f4958370-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f4958370-7e40-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84969b03984609d800a140c91d34c13ee5e6aa52
--- /dev/null
+++ b/graph/incidents_graphml/f/f4958370-7e40-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.68
+ 100.64.46.68
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699452794
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4958370-7e40-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/f/f4981340-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f4981340-0a07-11ee-9f50-eb86987e1788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..631fdf28874fec0d016d01fe381651099390b052
--- /dev/null
+++ b/graph/incidents_graphml/f/f4981340-0a07-11ee-9f50-eb86987e1788.graphml
@@ -0,0 +1,747 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.31
+ 100.64.29.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.192
+ 100.64.14.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.32
+ 100.64.29.32
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.20.74
+ 172.24.20.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.33
+ 100.64.29.33
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.5
+ 100.64.19.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.34
+ USER-0015-1278.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.35
+ 100.64.29.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.19
+ 100.64.9.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.36
+ 100.64.29.36
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.37
+ 100.64.29.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.75
+ 100.64.21.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.38
+ 100.64.29.38
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.100
+ 100.64.24.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.113
+ 100.64.11.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.39
+ 100.64.29.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.209
+ 100.64.14.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4981340-0a07-11ee-9f50-eb86987e1788
+
+
+
diff --git a/graph/incidents_graphml/f/f49abd60-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f49abd60-11e8-11ed-97d5-3360f7274b74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f5124e0be3d420dedec68bde304eed54d7d4c85
--- /dev/null
+++ b/graph/incidents_graphml/f/f49abd60-11e8-11ed-97d5-3360f7274b74.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.172
+ 100.64.72.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.23.247
+ 100.64.23.247
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.139
+ 100.64.77.139
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.12
+ 100.64.77.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.2.213
+ 100.64.2.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.140
+ 100.64.77.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.141
+ 100.64.77.141
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f49abd60-11e8-11ed-97d5-3360f7274b74
+
+
+
diff --git a/graph/incidents_graphml/f/f4a1a6d0-9c9c-11ee-b60c-751684393f5d.graphml b/graph/incidents_graphml/f/f4a1a6d0-9c9c-11ee-b60c-751684393f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ee4d7629df1fc6d767d528284a5572708f29865
--- /dev/null
+++ b/graph/incidents_graphml/f/f4a1a6d0-9c9c-11ee-b60c-751684393f5d.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.124
+ 100.64.68.124
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.125
+ 100.64.68.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1702790842
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4a1a6d0-9c9c-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702790842
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4a1a6d0-9c9c-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702790842
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4a1a6d0-9c9c-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702790842
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4a1a6d0-9c9c-11ee-b60c-751684393f5d
+
+
+
diff --git a/graph/incidents_graphml/f/f4a592d0-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f4a592d0-11e8-11ed-97d5-3360f7274b74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b64f5d9f6bf7ee4ca0ffabc43c0f614aa96283e8
--- /dev/null
+++ b/graph/incidents_graphml/f/f4a592d0-11e8-11ed-97d5-3360f7274b74.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.201
+ 100.64.13.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.2
+ 100.64.77.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4a592d0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392775
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4a592d0-11e8-11ed-97d5-3360f7274b74
+
+
+
diff --git a/graph/incidents_graphml/f/f4b00810-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f4b00810-0a07-11ee-9f50-eb86987e1788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04c15733cdf8945971f2a0bac57f27a622b7216b
--- /dev/null
+++ b/graph/incidents_graphml/f/f4b00810-0a07-11ee-9f50-eb86987e1788.graphml
@@ -0,0 +1,817 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.49
+ 100.64.29.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.153
+ 100.64.3.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ HOST-2906
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.50
+ 100.64.29.50
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.143
+ 100.64.10.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.14
+ 100.64.5.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.51
+ 100.64.29.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.52
+ 100.64.29.52
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.53
+ 100.64.29.53
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.73
+ 100.64.27.73
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.54
+ 100.64.29.54
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4b00810-0a07-11ee-9f50-eb86987e1788
+
+
+
diff --git a/graph/incidents_graphml/f/f4b89340-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4b89340-14d5-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8da9d9a3580f23b3220191ad009abc6852bd8720
--- /dev/null
+++ b/graph/incidents_graphml/f/f4b89340-14d5-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.223
+ 100.64.88.223
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1659714468
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4b89340-14d5-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/f/f4c0d0a0-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4c0d0a0-14d5-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7dc1bf6d59e23161fc7acd0a7b80258baa3014b0
--- /dev/null
+++ b/graph/incidents_graphml/f/f4c0d0a0-14d5-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.223
+ 100.64.88.223
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659714468
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4c0d0a0-14d5-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/f/f4c447c0-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f4c447c0-5b66-11ee-a387-a18350d70540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9bb797721d84df53e8c1afae0671c8e82f70557a
--- /dev/null
+++ b/graph/incidents_graphml/f/f4c447c0-5b66-11ee-a387-a18350d70540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.217
+ 100.64.5.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4c447c0-5b66-11ee-a387-a18350d70540
+
+
+
diff --git a/graph/incidents_graphml/f/f4c45310-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4c45310-14d5-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f622a78ab44ee14ae87e3192ee53c3e2ceb18777
--- /dev/null
+++ b/graph/incidents_graphml/f/f4c45310-14d5-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.227
+ 100.64.88.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1659714468
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4c45310-14d5-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/f/f4c48d20-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f4c48d20-4ef5-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41c2b7ad2c259b1041d889a076748dd0d496c674
--- /dev/null
+++ b/graph/incidents_graphml/f/f4c48d20-4ef5-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.59
+ 100.64.27.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694252877
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4c48d20-4ef5-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/f/f4ca4680-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4ca4680-14d5-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b38fcbca85c7cf44c41c574b03c7d9c38f8569f8
--- /dev/null
+++ b/graph/incidents_graphml/f/f4ca4680-14d5-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.227
+ 100.64.88.227
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659714468
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4ca4680-14d5-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/f/f4caae40-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/f4caae40-003e-11ee-a334-5be386c18109.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa4eb8f3ce4f323a9d9e73b3ce5eeda0758b5fd0
--- /dev/null
+++ b/graph/incidents_graphml/f/f4caae40-003e-11ee-a334-5be386c18109.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.61
+ 100.64.16.61
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685598089
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4caae40-003e-11ee-a334-5be386c18109
+
+
+
diff --git a/graph/incidents_graphml/f/f4cf93f0-176e-11ee-a7dc-57e99513cc0a.graphml b/graph/incidents_graphml/f/f4cf93f0-176e-11ee-a7dc-57e99513cc0a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05b02757c09adeed533f67a48cc9c8750f96d135
--- /dev/null
+++ b/graph/incidents_graphml/f/f4cf93f0-176e-11ee-a7dc-57e99513cc0a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.71
+ 100.64.68.71
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1688147581
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4cf93f0-176e-11ee-a7dc-57e99513cc0a
+
+
+
diff --git a/graph/incidents_graphml/f/f4d2aaf0-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4d2aaf0-14d5-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f434c906b3a3bf362dbc0f23e19fe88a10a45d46
--- /dev/null
+++ b/graph/incidents_graphml/f/f4d2aaf0-14d5-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.3.104
+ 100.64.3.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659714468
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4d2aaf0-14d5-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/f/f4d93af0-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f4d93af0-0a07-11ee-9f50-eb86987e1788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc5e3e9a120903c3020232b2ed038146f1110c58
--- /dev/null
+++ b/graph/incidents_graphml/f/f4d93af0-0a07-11ee-9f50-eb86987e1788.graphml
@@ -0,0 +1,509 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.61
+ 100.64.29.61
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.51
+ 100.64.18.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.13
+ 100.64.11.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.176
+ 100.64.5.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.246
+ 100.64.28.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.62
+ 100.64.29.62
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.63
+ 100.64.29.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.64
+ 100.64.29.64
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.65
+ 100.64.29.65
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.66
+ 100.64.29.66
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673978
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d93af0-0a07-11ee-9f50-eb86987e1788
+
+
+
diff --git a/graph/incidents_graphml/f/f4d961b0-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4d961b0-14d5-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb66a2f0926607f70309223ee46a78a786061491
--- /dev/null
+++ b/graph/incidents_graphml/f/f4d961b0-14d5-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.228
+ 100.64.88.228
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1659714468
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4d961b0-14d5-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/f/f4db5230-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f4db5230-5b66-11ee-a387-a18350d70540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18b93102cbccdd7dfdf70ad01fde94ef37ce1b2d
--- /dev/null
+++ b/graph/incidents_graphml/f/f4db5230-5b66-11ee-a387-a18350d70540.graphml
@@ -0,0 +1,655 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.85
+ 100.64.3.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.18
+ 100.64.12.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.15
+ 100.64.31.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.126
+ 100.64.35.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.123
+ 100.64.28.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.48
+ 100.64.19.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.151
+ 100.64.10.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.127
+ 100.64.35.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.173
+ 100.64.26.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.148
+ 100.64.8.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.128
+ 100.64.35.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.129
+ 100.64.35.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.79
+ 100.64.11.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.130
+ 100.64.35.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.131
+ 100.64.35.131
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4db5230-5b66-11ee-a387-a18350d70540
+
+
+
diff --git a/graph/incidents_graphml/f/f4dd1e30-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f4dd1e30-4ef5-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4e7cf03792065f0046351c74e86524f09974294
--- /dev/null
+++ b/graph/incidents_graphml/f/f4dd1e30-4ef5-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.164
+ 100.64.9.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694252877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f4dd1e30-4ef5-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/f/f4df1430-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f4df1430-eaea-11ec-aec0-8378f7a1d324.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4f3a438de931296e2cc67d58eb3026433ca1b72
--- /dev/null
+++ b/graph/incidents_graphml/f/f4df1430-eaea-11ec-aec0-8378f7a1d324.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.175
+ USER-0015-1788.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655105539
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4df1430-eaea-11ec-aec0-8378f7a1d324
+
+
+
diff --git a/graph/incidents_graphml/f/f4e01870-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4e01870-14d5-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9997be7b75052b24ecf22a274a9f9d1f2931c35f
--- /dev/null
+++ b/graph/incidents_graphml/f/f4e01870-14d5-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.228
+ 100.64.88.228
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659714468
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4e01870-14d5-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/f/f4e146b0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f4e146b0-2ea5-11ee-a61f-7552bb17f553.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2833502a556d4aeb3fb3c119a8d44d911a77800
--- /dev/null
+++ b/graph/incidents_graphml/f/f4e146b0-2ea5-11ee-a61f-7552bb17f553.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.41
+ 100.64.33.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690700080
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4e146b0-2ea5-11ee-a61f-7552bb17f553
+
+
+
diff --git a/graph/incidents_graphml/f/f4e60be0-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4e60be0-14d5-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..879bc28b94d79edf2c37bcd17f11de41f63bbed9
--- /dev/null
+++ b/graph/incidents_graphml/f/f4e60be0-14d5-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.229
+ 100.64.88.229
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1659714468
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4e60be0-14d5-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/f/f4ea94d0-a00c-11ee-a147-6d5e36330663.graphml b/graph/incidents_graphml/f/f4ea94d0-a00c-11ee-a147-6d5e36330663.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ba9dee3d05f8548fd7e64e0a0aa57866bbdeb73
--- /dev/null
+++ b/graph/incidents_graphml/f/f4ea94d0-a00c-11ee-a147-6d5e36330663.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.77
+ 100.64.41.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.234
+ 100.64.32.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.78
+ 100.64.41.78
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.79
+ 100.64.41.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.204
+ 100.64.34.204
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.125
+ 100.64.12.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.248
+ 100.64.33.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168800
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4ea94d0-a00c-11ee-a147-6d5e36330663
+
+
+
diff --git a/graph/incidents_graphml/f/f4eabb80-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f4eabb80-5b66-11ee-a387-a18350d70540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c47e9589914776e4f8980afcc6d43d7acfa24d83
--- /dev/null
+++ b/graph/incidents_graphml/f/f4eabb80-5b66-11ee-a387-a18350d70540.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.85
+ 100.64.3.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695620824
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4eabb80-5b66-11ee-a387-a18350d70540
+
+
+
diff --git a/graph/incidents_graphml/f/f4ee3bd0-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/f4ee3bd0-003e-11ee-a334-5be386c18109.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df0a207603ee1b97b7161773d31b47bf389d52f5
--- /dev/null
+++ b/graph/incidents_graphml/f/f4ee3bd0-003e-11ee-a334-5be386c18109.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.16.61
+ 100.64.16.61
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685598089
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f4ee3bd0-003e-11ee-a334-5be386c18109
+
+
+
diff --git a/graph/incidents_graphml/f/f4fbfaa0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f4fbfaa0-2ea5-11ee-a61f-7552bb17f553.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2291831721e1488762aa8549e3dc583270f290e1
--- /dev/null
+++ b/graph/incidents_graphml/f/f4fbfaa0-2ea5-11ee-a61f-7552bb17f553.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.41
+ 100.64.33.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690700081
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f4fbfaa0-2ea5-11ee-a61f-7552bb17f553
+
+
+
diff --git a/graph/incidents_graphml/f/f4fd5040-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f4fd5040-9268-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b96fe2e2c5851d88c997e2c90df9dbf2b56c775
--- /dev/null
+++ b/graph/incidents_graphml/f/f4fd5040-9268-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.151
+ 100.64.39.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701668998
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f4fd5040-9268-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/f/f5078d50-9b17-11ee-a7a5-af0e8425a262.graphml b/graph/incidents_graphml/f/f5078d50-9b17-11ee-a7a5-af0e8425a262.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b47791d44bd94803b0b5fffe60d0abad7c29fb66
--- /dev/null
+++ b/graph/incidents_graphml/f/f5078d50-9b17-11ee-a7a5-af0e8425a262.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.143
+ 100.64.31.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702623769
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f5078d50-9b17-11ee-a7a5-af0e8425a262
+
+
+
diff --git a/graph/incidents_graphml/f/f50e4030-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f50e4030-9268-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c271c933d1335cc5043b610db508653b20b82d83
--- /dev/null
+++ b/graph/incidents_graphml/f/f50e4030-9268-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.151
+ 100.64.39.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701668998
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f50e4030-9268-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/f/f5108a40-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f5108a40-4ef5-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc72ff49be065cf859ed9c7c3caa938250dfc57e
--- /dev/null
+++ b/graph/incidents_graphml/f/f5108a40-4ef5-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.164
+ 100.64.9.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694252878
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f5108a40-4ef5-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/f/f5116ed0-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f5116ed0-eaea-11ec-aec0-8378f7a1d324.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11c467d8c0d42354f643808f0c34140a27fed6a4
--- /dev/null
+++ b/graph/incidents_graphml/f/f5116ed0-eaea-11ec-aec0-8378f7a1d324.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.172
+ USER-0015-1789.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.60
+ 100.64.76.60
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655105539
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5116ed0-eaea-11ec-aec0-8378f7a1d324
+
+
+
diff --git a/graph/incidents_graphml/f/f5199af0-07d1-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/f/f5199af0-07d1-11ef-8107-af8140eb4c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..14203c40f16aa13cd14aef2d4190b7b3c50a0dfd
--- /dev/null
+++ b/graph/incidents_graphml/f/f5199af0-07d1-11ef-8107-af8140eb4c5b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.5
+ 100.64.87.5
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 172.16.46.208
+ 172.16.46.208
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714578381
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5199af0-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578381
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5199af0-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578381
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5199af0-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578381
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5199af0-07d1-11ef-8107-af8140eb4c5b
+
+
+
diff --git a/graph/incidents_graphml/f/f525b050-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/f/f525b050-1f1b-11ee-9e2e-57c890ee02a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7393d0aff2fb36323e4c475610eb3433690517e
--- /dev/null
+++ b/graph/incidents_graphml/f/f525b050-1f1b-11ee-9e2e-57c890ee02a2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.38
+ USER-0015-1290.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688991543
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f525b050-1f1b-11ee-9e2e-57c890ee02a2
+
+
+
diff --git a/graph/incidents_graphml/f/f52e2460-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f52e2460-4ef5-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb48330f484fd50cbd8d2c1c13f881ed4f8cb4cf
--- /dev/null
+++ b/graph/incidents_graphml/f/f52e2460-4ef5-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.204
+ 100.64.2.204
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694252878
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f52e2460-4ef5-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/f/f53664e0-3eff-11ef-a3c1-8be1e2d87500.graphml b/graph/incidents_graphml/f/f53664e0-3eff-11ef-a3c1-8be1e2d87500.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e514fc77758ba47791da3d5315effbce8bd2a94
--- /dev/null
+++ b/graph/incidents_graphml/f/f53664e0-3eff-11ef-a3c1-8be1e2d87500.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.100
+ 100.64.22.100
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720645452
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f53664e0-3eff-11ef-a3c1-8be1e2d87500
+
+
+
diff --git a/graph/incidents_graphml/f/f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6.graphml b/graph/incidents_graphml/f/f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9f626fb1fa02bfb4ce32852e98319f45e034414
--- /dev/null
+++ b/graph/incidents_graphml/f/f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.186
+ 100.64.40.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.187
+ 100.64.40.187
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.188
+ 100.64.40.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.44
+ 100.64.10.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.189
+ 100.64.40.189
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.190
+ 100.64.40.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.191
+ 100.64.40.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.194
+ 100.64.24.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.192
+ 100.64.40.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.193
+ 100.64.40.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.187
+ 100.64.4.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.192
+ 100.64.9.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.19
+ 100.64.9.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.194
+ 100.64.40.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.184
+ 100.64.33.184
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702597999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+
diff --git a/graph/incidents_graphml/f/f54498f0-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/f/f54498f0-4efd-11ee-81d4-670b4c6897d4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46ba8b1a2cf6f5c7f4b6b864c57ce58c54682bec
--- /dev/null
+++ b/graph/incidents_graphml/f/f54498f0-4efd-11ee-81d4-670b4c6897d4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.180
+ 100.64.25.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694256314
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f54498f0-4efd-11ee-81d4-670b4c6897d4
+
+
+
diff --git a/graph/incidents_graphml/f/f5480f30-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f5480f30-eaea-11ec-aec0-8378f7a1d324.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cca6118343d7ca86be47e795468fc8927fdbd41f
--- /dev/null
+++ b/graph/incidents_graphml/f/f5480f30-eaea-11ec-aec0-8378f7a1d324.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.45
+ USER-0015-1790.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655105540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5480f30-eaea-11ec-aec0-8378f7a1d324
+
+
+
diff --git a/graph/incidents_graphml/f/f54c6900-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f54c6900-06ef-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ae375d892faefb6157bd67d807bc4d23b8507d9
--- /dev/null
+++ b/graph/incidents_graphml/f/f54c6900-06ef-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.118
+ 100.64.21.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686333817
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f54c6900-06ef-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/f/f55348e0-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f55348e0-efc3-11ec-9799-0176ac54cf1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c78c4c10eefa9ce8d8ab7f25933c992d001f4ef5
--- /dev/null
+++ b/graph/incidents_graphml/f/f55348e0-efc3-11ec-9799-0176ac54cf1b.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.209
+ 100.64.72.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.127
+ USER-0015-1843.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.163
+ 100.64.80.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.95
+ 100.64.74.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655638545
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f55348e0-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638545
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f55348e0-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638545
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f55348e0-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638545
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f55348e0-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638545
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f55348e0-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638545
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f55348e0-efc3-11ec-9799-0176ac54cf1b
+
+
+
diff --git a/graph/incidents_graphml/f/f5561b30-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f5561b30-f4ab-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80b6d0ee2b1184c4217700bddc99ea77846296c7
--- /dev/null
+++ b/graph/incidents_graphml/f/f5561b30-f4ab-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.129
+ 100.64.65.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712472988
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5561b30-f4ab-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/f/f5622cb0-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f5622cb0-4ef5-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f894a1db3b2702837ec28392704938be4148552e
--- /dev/null
+++ b/graph/incidents_graphml/f/f5622cb0-4ef5-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694252878
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f5622cb0-4ef5-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/f/f5654830-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f5654830-06ef-11ee-a6b9-2fa958ecde6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d30a893e26f09bb949570c5b505994d1bb661e56
--- /dev/null
+++ b/graph/incidents_graphml/f/f5654830-06ef-11ee-a6b9-2fa958ecde6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.118
+ 100.64.21.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686333818
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5654830-06ef-11ee-a6b9-2fa958ecde6f
+
+
+
diff --git a/graph/incidents_graphml/f/f56ab4a0-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f56ab4a0-f4ab-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0b9070bccd6e7c87a8a721131c50493668c7b7b
--- /dev/null
+++ b/graph/incidents_graphml/f/f56ab4a0-f4ab-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.129
+ 100.64.65.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712472988
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f56ab4a0-f4ab-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/f/f56d9890-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f56d9890-eaea-11ec-aec0-8378f7a1d324.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43cc6c5f5860cebe65ba142691be112fde903eaa
--- /dev/null
+++ b/graph/incidents_graphml/f/f56d9890-eaea-11ec-aec0-8378f7a1d324.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.45
+ USER-0015-1790.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655105540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f56d9890-eaea-11ec-aec0-8378f7a1d324
+
+
+
diff --git a/graph/incidents_graphml/f/f570ab80-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f570ab80-9268-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a6ff3b603649c75106e77f2ca0a7f763e21198f
--- /dev/null
+++ b/graph/incidents_graphml/f/f570ab80-9268-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.208
+ 100.64.58.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701668998
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f570ab80-9268-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/f/f577d790-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f577d790-4ef5-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4187b0d50a73e180bdea99e60c06dfc00530bce
--- /dev/null
+++ b/graph/incidents_graphml/f/f577d790-4ef5-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.164
+ 100.64.9.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694252878
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f577d790-4ef5-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/f/f57b9210-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f57b9210-e53f-11ed-b729-bb6ecc5516ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cac8456127c1704926a0f07dee3a8468777159d8
--- /dev/null
+++ b/graph/incidents_graphml/f/f57b9210-e53f-11ed-b729-bb6ecc5516ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.115
+ 100.64.68.115
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"]
+
+
+ INCIDENT_LINK
+ 1682629838
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f57b9210-e53f-11ed-b729-bb6ecc5516ca
+
+
+
diff --git a/graph/incidents_graphml/f/f582abf0-179d-11ee-9bde-a75d9ab1122d.graphml b/graph/incidents_graphml/f/f582abf0-179d-11ee-9bde-a75d9ab1122d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59bd25fdda94fe82e78a15f338db193a7e9a31b3
--- /dev/null
+++ b/graph/incidents_graphml/f/f582abf0-179d-11ee-9bde-a75d9ab1122d.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.233
+ 100.64.19.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.121
+ 100.64.71.121
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.32.100
+ 100.64.32.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688167769
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f582abf0-179d-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167769
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f582abf0-179d-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167769
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f582abf0-179d-11ee-9bde-a75d9ab1122d
+
+
+ INCIDENT_LINK
+ 1688167769
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f582abf0-179d-11ee-9bde-a75d9ab1122d
+
+
+
diff --git a/graph/incidents_graphml/f/f5884420-285a-11ee-a03d-7b364f1dc27e.graphml b/graph/incidents_graphml/f/f5884420-285a-11ee-a03d-7b364f1dc27e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89f67cbf4889e2d25237f51716f9f496ef85061c
--- /dev/null
+++ b/graph/incidents_graphml/f/f5884420-285a-11ee-a03d-7b364f1dc27e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.171
+ 100.64.32.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690008162
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f5884420-285a-11ee-a03d-7b364f1dc27e
+
+
+
diff --git a/graph/incidents_graphml/f/f58c80e0-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f58c80e0-54af-11ee-b23a-419638593710.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35377de2c6a16e21043f03f3fc3222c12d673d00
--- /dev/null
+++ b/graph/incidents_graphml/f/f58c80e0-54af-11ee-b23a-419638593710.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.121
+ 100.64.7.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694882521
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f58c80e0-54af-11ee-b23a-419638593710
+
+
+
diff --git a/graph/incidents_graphml/f/f597dce0-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f597dce0-eaea-11ec-aec0-8378f7a1d324.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad71cea2d05c2f4c3fbec04d5d607680a926e6cf
--- /dev/null
+++ b/graph/incidents_graphml/f/f597dce0-eaea-11ec-aec0-8378f7a1d324.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.171
+ USER-0015-1791.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655105540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f597dce0-eaea-11ec-aec0-8378f7a1d324
+
+
+
diff --git a/graph/incidents_graphml/f/f59b1700-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f59b1700-4ef5-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a086e86a7f25988f0b807c3390fa32d270f1342
--- /dev/null
+++ b/graph/incidents_graphml/f/f59b1700-4ef5-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.75
+ 100.64.7.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694252879
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f59b1700-4ef5-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/f/f59d0d80-3825-11ee-b5a7-eb9164a8ca63.graphml b/graph/incidents_graphml/f/f59d0d80-3825-11ee-b5a7-eb9164a8ca63.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d003e3a4eabacce174c14f7d4a5e6d4eb7314f5
--- /dev/null
+++ b/graph/incidents_graphml/f/f59d0d80-3825-11ee-b5a7-eb9164a8ca63.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.140
+ 100.64.70.140
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1691744618
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f59d0d80-3825-11ee-b5a7-eb9164a8ca63
+
+
+ INCIDENT_LINK
+ 1691744618
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f59d0d80-3825-11ee-b5a7-eb9164a8ca63
+
+
+
diff --git a/graph/incidents_graphml/f/f59ef890-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f59ef890-e53f-11ed-b729-bb6ecc5516ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..127835ec6c65c4af6803ed4042d170128687538d
--- /dev/null
+++ b/graph/incidents_graphml/f/f59ef890-e53f-11ed-b729-bb6ecc5516ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.68.116
+ 100.64.68.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1682629838
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f59ef890-e53f-11ed-b729-bb6ecc5516ca
+
+
+
diff --git a/graph/incidents_graphml/f/f59fbac0-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f59fbac0-54af-11ee-b23a-419638593710.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a2024b2997c827b944e71b86ee499d7ac74ced6b
--- /dev/null
+++ b/graph/incidents_graphml/f/f59fbac0-54af-11ee-b23a-419638593710.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.121
+ 100.64.7.121
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694882521
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f59fbac0-54af-11ee-b23a-419638593710
+
+
+
diff --git a/graph/incidents_graphml/f/f5ad8d90-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f5ad8d90-4ef5-11ee-ad39-cfd1e51583fa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a80eec574f4a153fb5a9a1da3b1a9e6b707a3295
--- /dev/null
+++ b/graph/incidents_graphml/f/f5ad8d90-4ef5-11ee-ad39-cfd1e51583fa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.61
+ 100.64.27.61
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694252879
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f5ad8d90-4ef5-11ee-ad39-cfd1e51583fa
+
+
+
diff --git a/graph/incidents_graphml/f/f5b9bcc0-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f5b9bcc0-eaea-11ec-aec0-8378f7a1d324.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcfe91eb6916460ed34c210f7e3d05c8971f3084
--- /dev/null
+++ b/graph/incidents_graphml/f/f5b9bcc0-eaea-11ec-aec0-8378f7a1d324.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.171
+ USER-0015-1791.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655105540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f5b9bcc0-eaea-11ec-aec0-8378f7a1d324
+
+
+
diff --git a/graph/incidents_graphml/f/f5ba7c60-15fe-11ee-b6c1-6f3fa2e3bf20.graphml b/graph/incidents_graphml/f/f5ba7c60-15fe-11ee-b6c1-6f3fa2e3bf20.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d938670bac2e84ba5cd0f40c664eae9c381b19f
--- /dev/null
+++ b/graph/incidents_graphml/f/f5ba7c60-15fe-11ee-b6c1-6f3fa2e3bf20.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.100
+ 100.64.69.100
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1687989528
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5ba7c60-15fe-11ee-b6c1-6f3fa2e3bf20
+
+
+ INCIDENT_LINK
+ 1687989528
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5ba7c60-15fe-11ee-b6c1-6f3fa2e3bf20
+
+
+
diff --git a/graph/incidents_graphml/f/f5bd9260-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/f5bd9260-04ca-11ed-ab4e-45e26abbd382.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a6982ca64869bec61bd013af23095847a7a3a12
--- /dev/null
+++ b/graph/incidents_graphml/f/f5bd9260-04ca-11ed-ab4e-45e26abbd382.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.21
+ 100.64.76.21
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.211
+ 100.64.72.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657950527
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5bd9260-04ca-11ed-ab4e-45e26abbd382
+
+
+ INCIDENT_LINK
+ 1657950527
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5bd9260-04ca-11ed-ab4e-45e26abbd382
+
+
+
diff --git a/graph/incidents_graphml/f/f5bf8e30-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/f5bf8e30-04ca-11ed-ab4e-45e26abbd382.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..334294ad76fe72b7379671725731ae6afff4a03f
--- /dev/null
+++ b/graph/incidents_graphml/f/f5bf8e30-04ca-11ed-ab4e-45e26abbd382.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.5
+ 100.64.76.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.184
+ 100.64.77.184
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657950527
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5bf8e30-04ca-11ed-ab4e-45e26abbd382
+
+
+ INCIDENT_LINK
+ 1657950527
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5bf8e30-04ca-11ed-ab4e-45e26abbd382
+
+
+
diff --git a/graph/incidents_graphml/f/f5c0ffe0-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f5c0ffe0-1445-11ef-8b63-6b6087068682.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d1a3c1e4ab7f0cbe7dce3215a56aa14758c379a
--- /dev/null
+++ b/graph/incidents_graphml/f/f5c0ffe0-1445-11ef-8b63-6b6087068682.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.128
+ 100.64.52.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715947618
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5c0ffe0-1445-11ef-8b63-6b6087068682
+
+
+
diff --git a/graph/incidents_graphml/f/f5cbc4c0-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f5cbc4c0-2f61-11ef-b208-d10830cadc66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d8d57fa5abc9aac108f17c0ebb114274880c7cd
--- /dev/null
+++ b/graph/incidents_graphml/f/f5cbc4c0-2f61-11ef-b208-d10830cadc66.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.244
+ 100.64.88.244
+ ["Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.238.61
+ 172.30.238.61
+ ["Exploiting Target","Exploiting Host"]
+ 0.859375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718928325
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5cbc4c0-2f61-11ef-b208-d10830cadc66
+
+
+ INCIDENT_LINK
+ 1718928325
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5cbc4c0-2f61-11ef-b208-d10830cadc66
+
+
+
diff --git a/graph/incidents_graphml/f/f5cd6940-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/f/f5cd6940-2f46-11ee-8421-f3eff1a35bff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49e8e81e04a9259ca286c502605e1bc5f0525ffb
--- /dev/null
+++ b/graph/incidents_graphml/f/f5cd6940-2f46-11ee-8421-f3eff1a35bff.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.117
+ 100.64.18.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.104
+ USER-0015-1635.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Umbrella","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690769231
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5cd6940-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769231
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5cd6940-2f46-11ee-8421-f3eff1a35bff
+
+
+
diff --git a/graph/incidents_graphml/f/f5cf7d70-07d1-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/f/f5cf7d70-07d1-11ef-8107-af8140eb4c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82c6a60f84a54d580222c1eef350194540806b7b
--- /dev/null
+++ b/graph/incidents_graphml/f/f5cf7d70-07d1-11ef-8107-af8140eb4c5b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.20.127.176
+ 172.20.127.176
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.87.11
+ 100.64.87.11
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.12
+ 100.64.87.12
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714578382
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5cf7d70-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578382
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5cf7d70-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578382
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5cf7d70-07d1-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578382
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f5cf7d70-07d1-11ef-8107-af8140eb4c5b
+
+
+
diff --git a/graph/incidents_graphml/f/f5d1c8c0-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f5d1c8c0-1445-11ef-8b63-6b6087068682.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7410252251151b696b54ea219b85470ed8548fe
--- /dev/null
+++ b/graph/incidents_graphml/f/f5d1c8c0-1445-11ef-8b63-6b6087068682.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.128
+ 100.64.52.128
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715947618
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f5d1c8c0-1445-11ef-8b63-6b6087068682
+
+
+
diff --git a/graph/incidents_graphml/f/f5df2cb0-5090-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/f/f5df2cb0-5090-11ed-ba80-7f0cb65843d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff073cdfb5ccf513321294cf227b3548c8bdd0b1
--- /dev/null
+++ b/graph/incidents_graphml/f/f5df2cb0-5090-11ed-ba80-7f0cb65843d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.116
+ 100.64.79.116
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1666281904
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5df2cb0-5090-11ed-ba80-7f0cb65843d0
+
+
+
diff --git a/graph/incidents_graphml/f/f5e5cc00-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f5e5cc00-6106-11ee-bc15-ebbbf2eb09b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b22e4dc71fdb1aef6a93194460cb19134a5e808d
--- /dev/null
+++ b/graph/incidents_graphml/f/f5e5cc00-6106-11ee-bc15-ebbbf2eb09b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.14
+ 100.64.30.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696239301
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5e5cc00-6106-11ee-bc15-ebbbf2eb09b5
+
+
+
diff --git a/graph/incidents_graphml/f/f5e5e370-5090-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/f/f5e5e370-5090-11ed-ba80-7f0cb65843d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3fe7d5db1c16d9e2581be69dddb4342f4ebc0cfa
--- /dev/null
+++ b/graph/incidents_graphml/f/f5e5e370-5090-11ed-ba80-7f0cb65843d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.79.116
+ 100.64.79.116
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1666281904
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f5e5e370-5090-11ed-ba80-7f0cb65843d0
+
+
+
diff --git a/graph/incidents_graphml/f/f5f0a4e0-4f54-11ee-a8d7-55254673f433.graphml b/graph/incidents_graphml/f/f5f0a4e0-4f54-11ee-a8d7-55254673f433.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52694c133e3aa861e92cadf4af1e3b0ef6b8a2a8
--- /dev/null
+++ b/graph/incidents_graphml/f/f5f0a4e0-4f54-11ee-a8d7-55254673f433.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.195
+ 100.64.27.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694293681
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5f0a4e0-4f54-11ee-a8d7-55254673f433
+
+
+
diff --git a/graph/incidents_graphml/f/f5f55c60-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f5f55c60-6106-11ee-bc15-ebbbf2eb09b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..07d659daeef298ac51e31959534e5ed62c8a7194
--- /dev/null
+++ b/graph/incidents_graphml/f/f5f55c60-6106-11ee-bc15-ebbbf2eb09b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.14
+ 100.64.30.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696239302
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f5f55c60-6106-11ee-bc15-ebbbf2eb09b5
+
+
+
diff --git a/graph/incidents_graphml/f/f5ff6030-a00c-11ee-a147-6d5e36330663.graphml b/graph/incidents_graphml/f/f5ff6030-a00c-11ee-a147-6d5e36330663.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e4625364a227f757dbc9d7c8542b534ed51f28b
--- /dev/null
+++ b/graph/incidents_graphml/f/f5ff6030-a00c-11ee-a147-6d5e36330663.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.83
+ 100.64.41.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.45
+ 100.64.23.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.73
+ 100.64.19.73
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.244
+ 100.64.11.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.84
+ 100.64.41.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.85
+ 100.64.41.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.47
+ 100.64.33.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.10
+ 100.64.8.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.142
+ 100.64.21.142
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.177
+ 100.64.8.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.86
+ 100.64.41.86
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.140
+ 100.64.30.140
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.87
+ 100.64.41.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.88
+ 100.64.41.88
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.89
+ 100.64.41.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.90
+ 100.64.41.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168802
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f5ff6030-a00c-11ee-a147-6d5e36330663
+
+
+
diff --git a/graph/incidents_graphml/f/f606bb10-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f606bb10-e53f-11ed-b729-bb6ecc5516ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4597d810b7e44a7e4a5cda4438897b0d7720ff77
--- /dev/null
+++ b/graph/incidents_graphml/f/f606bb10-e53f-11ed-b729-bb6ecc5516ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.117
+ 100.64.68.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ 0.25
+ ["Precinct","Okta","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ INCIDENT_LINK
+ 1682629839
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ f606bb10-e53f-11ed-b729-bb6ecc5516ca
+
+
+
diff --git a/graph/incidents_graphml/f/f606eb80-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f606eb80-2929-11ed-82c2-3385aead5ab0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ebcefe631a9ffec5e19e692b76b8d3c769248afd
--- /dev/null
+++ b/graph/incidents_graphml/f/f606eb80-2929-11ed-82c2-3385aead5ab0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.27
+ 100.64.76.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1661949571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f606eb80-2929-11ed-82c2-3385aead5ab0
+
+
+
diff --git a/graph/incidents_graphml/f/f60cae80-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f60cae80-e53f-11ed-b729-bb6ecc5516ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7847099a19e3f1171271fba697e3f6833f96a2a0
--- /dev/null
+++ b/graph/incidents_graphml/f/f60cae80-e53f-11ed-b729-bb6ecc5516ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ 0.71875
+ ["Precinct","Okta","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.68.117
+ 100.64.68.117
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1682629839
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f60cae80-e53f-11ed-b729-bb6ecc5516ca
+
+
+
diff --git a/graph/incidents_graphml/f/f60e6590-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f60e6590-2929-11ed-82c2-3385aead5ab0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b09a165617e883d938c0b0e55d4ca9fddb947e1
--- /dev/null
+++ b/graph/incidents_graphml/f/f60e6590-2929-11ed-82c2-3385aead5ab0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.76.27
+ 100.64.76.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661949571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f60e6590-2929-11ed-82c2-3385aead5ab0
+
+
+
diff --git a/graph/incidents_graphml/f/f61030f0-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f61030f0-e53f-11ed-b729-bb6ecc5516ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1034bc3734067aba8154422d77b84cdbd8495d3a
--- /dev/null
+++ b/graph/incidents_graphml/f/f61030f0-e53f-11ed-b729-bb6ecc5516ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host","Ransomware Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"]
+
+
+ INCIDENT_LINK
+ 1682629839
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ f61030f0-e53f-11ed-b729-bb6ecc5516ca
+
+
+
diff --git a/graph/incidents_graphml/f/f613e3d0-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f613e3d0-2929-11ed-82c2-3385aead5ab0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42b862311c29cd9b3f020280115b2697227c48c8
--- /dev/null
+++ b/graph/incidents_graphml/f/f613e3d0-2929-11ed-82c2-3385aead5ab0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.92
+ 100.64.28.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661949571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f613e3d0-2929-11ed-82c2-3385aead5ab0
+
+
+
diff --git a/graph/incidents_graphml/f/f6140360-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f6140360-56ff-11ee-82f3-cfca3c4a6159.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54bc3be0d07459a06c3ec01a1249556cc39c1a5c
--- /dev/null
+++ b/graph/incidents_graphml/f/f6140360-56ff-11ee-82f3-cfca3c4a6159.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.38
+ 100.64.21.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695136784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f6140360-56ff-11ee-82f3-cfca3c4a6159
+
+
+
diff --git a/graph/incidents_graphml/f/f61bac00-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f61bac00-2929-11ed-82c2-3385aead5ab0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7aedcf2aff592b0571ea30739da8cdec6d808ed4
--- /dev/null
+++ b/graph/incidents_graphml/f/f61bac00-2929-11ed-82c2-3385aead5ab0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.92
+ 100.64.28.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661949571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f61bac00-2929-11ed-82c2-3385aead5ab0
+
+
+
diff --git a/graph/incidents_graphml/f/f61f0230-fb31-11ed-9187-67e5cded34a2.graphml b/graph/incidents_graphml/f/f61f0230-fb31-11ed-9187-67e5cded34a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0bae7ad793650d05c7e93eee08849c87361eaa87
--- /dev/null
+++ b/graph/incidents_graphml/f/f61f0230-fb31-11ed-9187-67e5cded34a2.graphml
@@ -0,0 +1,575 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.23.220
+ 100.64.23.220
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ 0.746875
+ ["Precinct","Okta","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.11.235
+ 100.64.11.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.216
+ 100.64.68.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.217
+ 100.64.68.217
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.28.242
+ 100.64.28.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.218
+ 100.64.68.218
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.48.93
+ 100.64.48.93
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.27.147
+ 100.64.27.147
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.219
+ 100.64.68.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.60.156
+ 100.64.60.156
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.27.254
+ 100.64.27.254
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.143
+ 100.64.68.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f61f0230-fb31-11ed-9187-67e5cded34a2
+
+
+
diff --git a/graph/incidents_graphml/f/f6201b10-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f6201b10-7e40-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..575c8598fa3ed973b613fdab8597733ec882a7b9
--- /dev/null
+++ b/graph/incidents_graphml/f/f6201b10-7e40-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.125
+ 100.64.50.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699452796
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6201b10-7e40-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/f/f6236f00-fb31-11ed-9187-67e5cded34a2.graphml b/graph/incidents_graphml/f/f6236f00-fb31-11ed-9187-67e5cded34a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e9b1c6f8369aeb385802bf21a1ee045d4e7e860
--- /dev/null
+++ b/graph/incidents_graphml/f/f6236f00-fb31-11ed-9187-67e5cded34a2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685042751
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f6236f00-fb31-11ed-9187-67e5cded34a2
+
+
+
diff --git a/graph/incidents_graphml/f/f623bad0-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f623bad0-56ff-11ee-82f3-cfca3c4a6159.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79240644bb7ae8a5da193966c8628cf26c03aa25
--- /dev/null
+++ b/graph/incidents_graphml/f/f623bad0-56ff-11ee-82f3-cfca3c4a6159.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.156
+ 100.64.49.156
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695136784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f623bad0-56ff-11ee-82f3-cfca3c4a6159
+
+
+
diff --git a/graph/incidents_graphml/f/f62ab4a0-5090-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/f/f62ab4a0-5090-11ed-ba80-7f0cb65843d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf0cda6b98819ecc4e9e9740f3e1dd9617037ea1
--- /dev/null
+++ b/graph/incidents_graphml/f/f62ab4a0-5090-11ed-ba80-7f0cb65843d0.graphml
@@ -0,0 +1,171 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.255
+ 100.64.81.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.121
+ 100.64.71.121
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.82.1
+ 100.64.82.1
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.9.120
+ 100.64.9.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.1
+ 100.64.82.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1666281905
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f62ab4a0-5090-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666281905
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f62ab4a0-5090-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666281905
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f62ab4a0-5090-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666281905
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f62ab4a0-5090-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666281905
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f62ab4a0-5090-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666281905
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f62ab4a0-5090-11ed-ba80-7f0cb65843d0
+
+
+ INCIDENT_LINK
+ 1666281905
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f62ab4a0-5090-11ed-ba80-7f0cb65843d0
+
+
+
diff --git a/graph/incidents_graphml/f/f62bbda0-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f62bbda0-11e8-11ed-97d5-3360f7274b74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e62f666b592a9201efd28028403960ab206805b
--- /dev/null
+++ b/graph/incidents_graphml/f/f62bbda0-11e8-11ed-97d5-3360f7274b74.graphml
@@ -0,0 +1,531 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.142
+ 100.64.77.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.85
+ 100.64.73.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.143
+ 100.64.77.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.137
+ 100.64.72.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.21.233
+ 100.64.21.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.144
+ 100.64.77.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.145
+ 100.64.77.145
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.146
+ 100.64.77.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.147
+ 100.64.77.147
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.123
+ 100.64.72.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.148
+ 100.64.77.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.149
+ 100.64.77.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.118
+ 100.64.72.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.150
+ 100.64.77.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392777
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f62bbda0-11e8-11ed-97d5-3360f7274b74
+
+
+
diff --git a/graph/incidents_graphml/f/f62d5f40-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f62d5f40-2929-11ed-82c2-3385aead5ab0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d217ac79f07003ddad68b60e5ff139cf56cb16c0
--- /dev/null
+++ b/graph/incidents_graphml/f/f62d5f40-2929-11ed-82c2-3385aead5ab0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.85.230
+ 100.64.85.230
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661949571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f62d5f40-2929-11ed-82c2-3385aead5ab0
+
+
+
diff --git a/graph/incidents_graphml/f/f62d7250-fec5-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/f/f62d7250-fec5-11ee-beca-89f62fdf83e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e366065b722c1aa793184009999586384843c22
--- /dev/null
+++ b/graph/incidents_graphml/f/f62d7250-fec5-11ee-beca-89f62fdf83e2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.227
+ 100.64.14.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713583668
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f62d7250-fec5-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583668
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f62d7250-fec5-11ee-beca-89f62fdf83e2
+
+
+
diff --git a/graph/incidents_graphml/f/f6365ff0-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f6365ff0-2929-11ed-82c2-3385aead5ab0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..22170b294b1408c4a506c0cd80da627d7877b3c3
--- /dev/null
+++ b/graph/incidents_graphml/f/f6365ff0-2929-11ed-82c2-3385aead5ab0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.41.168
+ 100.64.41.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661949571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f6365ff0-2929-11ed-82c2-3385aead5ab0
+
+
+
diff --git a/graph/incidents_graphml/f/f636d230-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/f/f636d230-1f1b-11ee-9e2e-57c890ee02a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5040349180645cbcda2e20e166369995601c737f
--- /dev/null
+++ b/graph/incidents_graphml/f/f636d230-1f1b-11ee-9e2e-57c890ee02a2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688991545
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f636d230-1f1b-11ee-9e2e-57c890ee02a2
+
+
+
diff --git a/graph/incidents_graphml/f/f6380620-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f6380620-56ff-11ee-82f3-cfca3c4a6159.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..611c138feab06fbe2b55a45ba46609a009b103fd
--- /dev/null
+++ b/graph/incidents_graphml/f/f6380620-56ff-11ee-82f3-cfca3c4a6159.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.156
+ 100.64.49.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695136784
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6380620-56ff-11ee-82f3-cfca3c4a6159
+
+
+
diff --git a/graph/incidents_graphml/f/f63e2820-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f63e2820-2929-11ed-82c2-3385aead5ab0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9fd89a256625d9e88f044c4e937fc4c7ed53c04
--- /dev/null
+++ b/graph/incidents_graphml/f/f63e2820-2929-11ed-82c2-3385aead5ab0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.61
+ 100.64.80.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1661949572
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f63e2820-2929-11ed-82c2-3385aead5ab0
+
+
+
diff --git a/graph/incidents_graphml/f/f643a660-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f643a660-2929-11ed-82c2-3385aead5ab0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..610b72d8802542f3a8ee6d952be06a31434edd2e
--- /dev/null
+++ b/graph/incidents_graphml/f/f643a660-2929-11ed-82c2-3385aead5ab0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.80.61
+ 100.64.80.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661949572
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f643a660-2929-11ed-82c2-3385aead5ab0
+
+
+
diff --git a/graph/incidents_graphml/f/f64851c0-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/f64851c0-27a0-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da831c066f7a33b00c62588dd4477d2fbf7f9f4b
--- /dev/null
+++ b/graph/incidents_graphml/f/f64851c0-27a0-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.193
+ 100.64.37.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718075775
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f64851c0-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075775
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f64851c0-27a0-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/f/f649e070-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f649e070-56ff-11ee-82f3-cfca3c4a6159.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2fb02959598e64ee641de10bce033b059d87602d
--- /dev/null
+++ b/graph/incidents_graphml/f/f649e070-56ff-11ee-82f3-cfca3c4a6159.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.42
+ 100.64.64.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695136784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f649e070-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f649e070-56ff-11ee-82f3-cfca3c4a6159
+
+
+