diff --git a/graph/incidents_graphml/e/ed0c84a0-fd59-11ec-a469-5997b7522014.graphml b/graph/incidents_graphml/e/ed0c84a0-fd59-11ec-a469-5997b7522014.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ab728ff48d0bc144e14cc0c28688b8134f62c43 --- /dev/null +++ b/graph/incidents_graphml/e/ed0c84a0-fd59-11ec-a469-5997b7522014.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.23 + 100.64.82.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.158 + USER-0015-1647.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.82.24 + 100.64.82.24 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657132321 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed0c84a0-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132321 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed0c84a0-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132321 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed0c84a0-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132321 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed0c84a0-fd59-11ec-a469-5997b7522014 + + + diff --git a/graph/incidents_graphml/e/ed112c20-212b-11ee-be86-791271b8260d.graphml b/graph/incidents_graphml/e/ed112c20-212b-11ee-be86-791271b8260d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7122172c91e0d15aa3c8422ca23b62e6e99858d6 --- /dev/null +++ b/graph/incidents_graphml/e/ed112c20-212b-11ee-be86-791271b8260d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.213 + 100.64.5.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689218304 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed112c20-212b-11ee-be86-791271b8260d + + + diff --git a/graph/incidents_graphml/e/ed12b6f0-71b5-11ee-83bd-d7ace4b5b84d.graphml b/graph/incidents_graphml/e/ed12b6f0-71b5-11ee-83bd-d7ace4b5b84d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1bb7903980f09d0433412186a78b0db95d87b882 --- /dev/null +++ b/graph/incidents_graphml/e/ed12b6f0-71b5-11ee-83bd-d7ace4b5b84d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1698073667 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ed12b6f0-71b5-11ee-83bd-d7ace4b5b84d + + + diff --git a/graph/incidents_graphml/e/ed14ec10-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/e/ed14ec10-0ea8-11ee-ac51-1fc12cdb93ff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f40bf7a1adcd20fef31be761a94f2c0695e63eb0 --- /dev/null +++ b/graph/incidents_graphml/e/ed14ec10-0ea8-11ee-ac51-1fc12cdb93ff.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.219 + 100.64.13.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687182919 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed14ec10-0ea8-11ee-ac51-1fc12cdb93ff + + + diff --git a/graph/incidents_graphml/e/ed1c7390-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/e/ed1c7390-1228-11ed-99ed-adca11e4059c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a66f7b7bd1e36bdadcfbd9fea0c28828c9275b5 --- /dev/null +++ b/graph/incidents_graphml/e/ed1c7390-1228-11ed-99ed-adca11e4059c.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.230.18 + 172.16.230.18 + ["Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.89.32 + 100.64.89.32 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.33 + 100.64.89.33 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.34 + 100.64.89.34 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.77 + 100.64.87.77 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659420250 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed1c7390-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420250 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed1c7390-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420250 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed1c7390-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420250 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed1c7390-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420250 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed1c7390-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420250 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed1c7390-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420250 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed1c7390-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420250 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed1c7390-1228-11ed-99ed-adca11e4059c + + + diff --git a/graph/incidents_graphml/e/ed230660-5c87-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/e/ed230660-5c87-11ee-8e0e-93298c809ccb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db7ca3bb094431a8a373a0ecba0f1200bb4c053e --- /dev/null +++ b/graph/incidents_graphml/e/ed230660-5c87-11ee-8e0e-93298c809ccb.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.241 + 100.64.11.241 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.17.224 + 100.64.17.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1695744936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed230660-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed230660-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed230660-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed230660-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed230660-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed230660-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed230660-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed230660-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed230660-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed230660-5c87-11ee-8e0e-93298c809ccb + + + diff --git a/graph/incidents_graphml/e/ed273b80-75f6-11ee-8cab-f39a0af54aaa.graphml b/graph/incidents_graphml/e/ed273b80-75f6-11ee-8cab-f39a0af54aaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8a8baea967c337e4883b875737012aaacc4dce3 --- /dev/null +++ b/graph/incidents_graphml/e/ed273b80-75f6-11ee-8cab-f39a0af54aaa.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.226 + 100.64.49.226 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698541389 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed273b80-75f6-11ee-8cab-f39a0af54aaa + + + INCIDENT_LINK + 1698541389 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed273b80-75f6-11ee-8cab-f39a0af54aaa + + + diff --git a/graph/incidents_graphml/e/ed2f83d0-9cf8-11ed-8fd7-753be03cabc2.graphml b/graph/incidents_graphml/e/ed2f83d0-9cf8-11ed-8fd7-753be03cabc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4a2a7a6f1d6f70b5a58059b13af4083dd74bbb9 --- /dev/null +++ b/graph/incidents_graphml/e/ed2f83d0-9cf8-11ed-8fd7-753be03cabc2.graphml @@ -0,0 +1,169 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF","ManageEngine ADManager"] + + + HOST + 172.21.4.34 + 172.21.4.34 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 172.21.5.68 + 172.21.5.68 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + INCIDENT_LINK + 1674682846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed2f83d0-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed2f83d0-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed2f83d0-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed2f83d0-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed2f83d0-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed2f83d0-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed2f83d0-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed2f83d0-9cf8-11ed-8fd7-753be03cabc2 + + + diff --git a/graph/incidents_graphml/e/ed372c80-2a5b-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/e/ed372c80-2a5b-11ed-8698-87f85c8d72c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..163cfd640e67036c5e962115ba6d47680bcb7675 --- /dev/null +++ b/graph/incidents_graphml/e/ed372c80-2a5b-11ed-8698-87f85c8d72c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.170 + 100.64.97.170 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1662080982 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed372c80-2a5b-11ed-8698-87f85c8d72c2 + + + diff --git a/graph/incidents_graphml/e/ed3c0e80-2a5b-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/e/ed3c0e80-2a5b-11ed-8698-87f85c8d72c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dbd6b9893bbf6a68568fcf45467bf68d867a764b --- /dev/null +++ b/graph/incidents_graphml/e/ed3c0e80-2a5b-11ed-8698-87f85c8d72c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.0.145.98 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.97.170 + 100.64.97.170 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662080982 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed3c0e80-2a5b-11ed-8698-87f85c8d72c2 + + + diff --git a/graph/incidents_graphml/e/ed415340-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/e/ed415340-0ea8-11ee-ac51-1fc12cdb93ff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d63d39eb03b9ab6ffc7dc1ea0d440c02a7d0f24 --- /dev/null +++ b/graph/incidents_graphml/e/ed415340-0ea8-11ee-ac51-1fc12cdb93ff.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.219 + 100.64.13.219 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687182919 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed415340-0ea8-11ee-ac51-1fc12cdb93ff + + + diff --git a/graph/incidents_graphml/e/ed466ec0-2a5b-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/e/ed466ec0-2a5b-11ed-8698-87f85c8d72c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aad40144627e393c4f1bfe05a057be95178c3d6b --- /dev/null +++ b/graph/incidents_graphml/e/ed466ec0-2a5b-11ed-8698-87f85c8d72c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.172 + 100.64.97.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1662080982 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed466ec0-2a5b-11ed-8698-87f85c8d72c2 + + + diff --git a/graph/incidents_graphml/e/ed4cd760-2a5b-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/e/ed4cd760-2a5b-11ed-8698-87f85c8d72c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82764a21ec274c25c64306870b0bc1d9875c19a1 --- /dev/null +++ b/graph/incidents_graphml/e/ed4cd760-2a5b-11ed-8698-87f85c8d72c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.97.172 + 100.64.97.172 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662080982 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed4cd760-2a5b-11ed-8698-87f85c8d72c2 + + + diff --git a/graph/incidents_graphml/e/ed4f4860-2a5b-11ed-8698-87f85c8d72c2.graphml b/graph/incidents_graphml/e/ed4f4860-2a5b-11ed-8698-87f85c8d72c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1dcf8cbb68cae6654866b7345d5e5f2a2ca24098 --- /dev/null +++ b/graph/incidents_graphml/e/ed4f4860-2a5b-11ed-8698-87f85c8d72c2.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.174 + 100.64.97.174 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662080983 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed4f4860-2a5b-11ed-8698-87f85c8d72c2 + + + INCIDENT_LINK + 1662080983 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed4f4860-2a5b-11ed-8698-87f85c8d72c2 + + + diff --git a/graph/incidents_graphml/e/ed51bbc0-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/e/ed51bbc0-9172-11ee-94be-75b251a8fc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a933dc86e1a63cc57a1e068a2f895e04cdc83f11 --- /dev/null +++ b/graph/incidents_graphml/e/ed51bbc0-9172-11ee-94be-75b251a8fc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.58 + 100.64.35.58 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701563328 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed51bbc0-9172-11ee-94be-75b251a8fc8a + + + diff --git a/graph/incidents_graphml/e/ed51fd90-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/e/ed51fd90-4efd-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b9bdb57f1bb11439673260716b138ff55f4db08 --- /dev/null +++ b/graph/incidents_graphml/e/ed51fd90-4efd-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.176 + 100.64.25.176 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694256301 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed51fd90-4efd-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/e/ed58b6d0-6d66-11ee-acf4-ebf255c20472.graphml b/graph/incidents_graphml/e/ed58b6d0-6d66-11ee-acf4-ebf255c20472.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c72659d97bc54d7accf1d7765cf1624f1864dade --- /dev/null +++ b/graph/incidents_graphml/e/ed58b6d0-6d66-11ee-acf4-ebf255c20472.graphml @@ -0,0 +1,799 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.71 + 100.64.56.71 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.146 + 100.64.31.146 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.72 + 100.64.56.72 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.76 + 100.64.7.76 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.73 + 100.64.56.73 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.74 + 100.64.56.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.83 + 100.64.14.83 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.191 + 100.64.54.191 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.75 + 100.64.56.75 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.12 + 100.64.55.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.150 + 100.64.16.150 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.76 + 100.64.56.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.48 + 100.64.51.48 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.156 + 100.64.15.156 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.77 + 100.64.56.77 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.78 + 100.64.56.78 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.79 + 100.64.56.79 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.80 + 100.64.56.80 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + INCIDENT_LINK + 1697599933 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed58b6d0-6d66-11ee-acf4-ebf255c20472 + + + diff --git a/graph/incidents_graphml/e/ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/e/ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c337c4d3a4a24511b4cb32a4259ac38c019f8a30 --- /dev/null +++ b/graph/incidents_graphml/e/ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.41 + 100.64.71.41 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.146 + 100.64.78.146 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.147 + 100.64.78.147 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.148 + 100.64.78.148 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.12.123 + 100.64.12.123 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656519859 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed5b29d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + diff --git a/graph/incidents_graphml/e/ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/e/ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25475961eff85314a73df7ece3d76004c429c302 --- /dev/null +++ b/graph/incidents_graphml/e/ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml @@ -0,0 +1,207 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.151 + 100.64.78.151 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.101 + 100.64.71.101 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.78.152 + 100.64.78.152 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.78.153 + 100.64.78.153 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.13 + USER-0015-1785.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656519859 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519859 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed5de8f0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + diff --git a/graph/incidents_graphml/e/ed635a30-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/e/ed635a30-0ea8-11ee-ac51-1fc12cdb93ff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da7ab6897f8d1ca98cd097d4b2b2f68a06c72dd0 --- /dev/null +++ b/graph/incidents_graphml/e/ed635a30-0ea8-11ee-ac51-1fc12cdb93ff.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.161 + 100.64.9.161 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687182919 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ed635a30-0ea8-11ee-ac51-1fc12cdb93ff + + + diff --git a/graph/incidents_graphml/e/ed63e430-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/e/ed63e430-9172-11ee-94be-75b251a8fc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f32849cf11d1160ca36e47185c7fa2637917843 --- /dev/null +++ b/graph/incidents_graphml/e/ed63e430-9172-11ee-94be-75b251a8fc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.58 + 100.64.35.58 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701563329 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed63e430-9172-11ee-94be-75b251a8fc8a + + + diff --git a/graph/incidents_graphml/e/ed73e9c0-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/e/ed73e9c0-9172-11ee-94be-75b251a8fc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33f71a74bdc74971c33caa9b1859d60bb1353049 --- /dev/null +++ b/graph/incidents_graphml/e/ed73e9c0-9172-11ee-94be-75b251a8fc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.60 + 100.64.35.60 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701563329 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed73e9c0-9172-11ee-94be-75b251a8fc8a + + + diff --git a/graph/incidents_graphml/e/ed7e0e20-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/e/ed7e0e20-0ea8-11ee-ac51-1fc12cdb93ff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad633153186cd68f83beb88f4df5c11490c13332 --- /dev/null +++ b/graph/incidents_graphml/e/ed7e0e20-0ea8-11ee-ac51-1fc12cdb93ff.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.161 + 100.64.9.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687182919 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed7e0e20-0ea8-11ee-ac51-1fc12cdb93ff + + + diff --git a/graph/incidents_graphml/e/ed7ef240-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/e/ed7ef240-2f46-11ee-8421-f3eff1a35bff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a113449546387523e8bd9383df459df87f0eef9e --- /dev/null +++ b/graph/incidents_graphml/e/ed7ef240-2f46-11ee-8421-f3eff1a35bff.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.132 + 100.64.76.132 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.91 + 100.64.72.91 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.243 + 100.64.11.243 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.43.16 + 100.64.43.16 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690769217 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed7ef240-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769217 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed7ef240-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769217 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed7ef240-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769217 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed7ef240-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769217 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed7ef240-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769217 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed7ef240-2f46-11ee-8421-f3eff1a35bff + + + diff --git a/graph/incidents_graphml/e/ed84b2a0-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/e/ed84b2a0-9172-11ee-94be-75b251a8fc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdcdb7ef4c5589d471a22ff67645f848a24e8af9 --- /dev/null +++ b/graph/incidents_graphml/e/ed84b2a0-9172-11ee-94be-75b251a8fc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.60 + 100.64.35.60 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701563329 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed84b2a0-9172-11ee-94be-75b251a8fc8a + + + diff --git a/graph/incidents_graphml/e/ed860e60-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/ed860e60-5c0d-11ee-9a52-1fcf6498e362.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10029a42a5b8eaa303b3d57041434eeee756b93e --- /dev/null +++ b/graph/incidents_graphml/e/ed860e60-5c0d-11ee-9a52-1fcf6498e362.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.151 + 100.64.58.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695692538 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed860e60-5c0d-11ee-9a52-1fcf6498e362 + + + diff --git a/graph/incidents_graphml/e/ed866b70-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/e/ed866b70-6861-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..306e3ce0b6b08a84f5d0011c0cc740fc88b96625 --- /dev/null +++ b/graph/incidents_graphml/e/ed866b70-6861-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.227 + 100.64.53.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697048030 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ed866b70-6861-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/e/ed8e3680-256c-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/e/ed8e3680-256c-11ee-8760-d9b0ea984292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..073b6ebecc2c93fb3f5ec6a97cbb327b305fa1d5 --- /dev/null +++ b/graph/incidents_graphml/e/ed8e3680-256c-11ee-8760-d9b0ea984292.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.73 + 100.64.7.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689686026 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed8e3680-256c-11ee-8760-d9b0ea984292 + + + diff --git a/graph/incidents_graphml/e/ed8eafe0-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ed8eafe0-95b3-11ee-a46e-7b17a4f6b26c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..689dc0ea5687f1c8caab3869b3571c5cb4d292b2 --- /dev/null +++ b/graph/incidents_graphml/e/ed8eafe0-95b3-11ee-a46e-7b17a4f6b26c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.96.42 + USER-0015-2145.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702031051 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed8eafe0-95b3-11ee-a46e-7b17a4f6b26c + + + diff --git a/graph/incidents_graphml/e/ed952990-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/ed952990-5c0d-11ee-9a52-1fcf6498e362.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc5490b8491c3826546907d85bf8cb18b147f6b9 --- /dev/null +++ b/graph/incidents_graphml/e/ed952990-5c0d-11ee-9a52-1fcf6498e362.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.151 + 100.64.58.151 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695692538 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed952990-5c0d-11ee-9a52-1fcf6498e362 + + + diff --git a/graph/incidents_graphml/e/ed9ce0b0-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ed9ce0b0-95b3-11ee-a46e-7b17a4f6b26c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57f41b571c45353289539ca240c510aed2777fcc --- /dev/null +++ b/graph/incidents_graphml/e/ed9ce0b0-95b3-11ee-a46e-7b17a4f6b26c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.44 + USER-0015-2146.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 100.64.88.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1702031051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ed9ce0b0-95b3-11ee-a46e-7b17a4f6b26c + + + diff --git a/graph/incidents_graphml/e/ed9d27c0-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/e/ed9d27c0-6861-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff8974494ef80559a77f9db52bd7c35ebd7f39b6 --- /dev/null +++ b/graph/incidents_graphml/e/ed9d27c0-6861-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.47 + 100.64.17.47 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697048030 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ed9d27c0-6861-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/e/eda46fd0-2d7e-11ee-b431-c96f4a8a8f7e.graphml b/graph/incidents_graphml/e/eda46fd0-2d7e-11ee-b431-c96f4a8a8f7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..606eec081583b6fa67db46ca421f971dcb55cd0a --- /dev/null +++ b/graph/incidents_graphml/e/eda46fd0-2d7e-11ee-b431-c96f4a8a8f7e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.200 + 100.64.82.200 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690573367 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda46fd0-2d7e-11ee-b431-c96f4a8a8f7e + + + diff --git a/graph/incidents_graphml/e/eda53680-fcd3-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/e/eda53680-fcd3-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f33c880bf33498ee7286c8e0a76a874b24e2fbf6 --- /dev/null +++ b/graph/incidents_graphml/e/eda53680-fcd3-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.131 + 100.64.13.131 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.3.212 + 100.64.3.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.132 + 100.64.13.132 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.133 + 100.64.13.133 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.13.134 + 100.64.13.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.13.135 + 100.64.13.135 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685222267 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eda53680-fcd3-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/e/eda667a0-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/eda667a0-5c0d-11ee-9a52-1fcf6498e362.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a0712fc3c51194fb6c280934e2b9f3dcfcef7f2 --- /dev/null +++ b/graph/incidents_graphml/e/eda667a0-5c0d-11ee-9a52-1fcf6498e362.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.191 + 100.64.30.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695692538 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eda667a0-5c0d-11ee-9a52-1fcf6498e362 + + + diff --git a/graph/incidents_graphml/e/edab3890-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/edab3890-95b3-11ee-a46e-7b17a4f6b26c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ccac1187932a25aebb38abe56d6b85dd9450c179 --- /dev/null +++ b/graph/incidents_graphml/e/edab3890-95b3-11ee-a46e-7b17a4f6b26c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 100.64.88.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.96.44 + USER-0015-2146.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702031051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + edab3890-95b3-11ee-a46e-7b17a4f6b26c + + + diff --git a/graph/incidents_graphml/e/edb42340-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/edb42340-5c0d-11ee-9a52-1fcf6498e362.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70d7e1376c4fc4aece4d124befbb0633b7c1b3fb --- /dev/null +++ b/graph/incidents_graphml/e/edb42340-5c0d-11ee-9a52-1fcf6498e362.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.191 + 100.64.30.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695692538 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + edb42340-5c0d-11ee-9a52-1fcf6498e362 + + + diff --git a/graph/incidents_graphml/e/edc05840-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/edc05840-5c0d-11ee-9a52-1fcf6498e362.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46570ecdb66726ac7371396ca4964ab0b7b31c4e --- /dev/null +++ b/graph/incidents_graphml/e/edc05840-5c0d-11ee-9a52-1fcf6498e362.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.153 + 100.64.58.153 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695692538 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + edc05840-5c0d-11ee-9a52-1fcf6498e362 + + + diff --git a/graph/incidents_graphml/e/edc66750-bc37-11ee-9aca-efbccc10f79c.graphml b/graph/incidents_graphml/e/edc66750-bc37-11ee-9aca-efbccc10f79c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b721c74eea919a71fcf0b6f804731da6d15b49ec --- /dev/null +++ b/graph/incidents_graphml/e/edc66750-bc37-11ee-9aca-efbccc10f79c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.232 + 100.64.51.232 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1706265889 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + edc66750-bc37-11ee-9aca-efbccc10f79c + + + diff --git a/graph/incidents_graphml/e/edcdc5c0-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/edcdc5c0-5c0d-11ee-9a52-1fcf6498e362.graphml new file mode 100644 index 0000000000000000000000000000000000000000..536b04aee591ddf987c3db83efabb3deddec5b2e --- /dev/null +++ b/graph/incidents_graphml/e/edcdc5c0-5c0d-11ee-9a52-1fcf6498e362.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.153 + 100.64.58.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695692538 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + edcdc5c0-5c0d-11ee-9a52-1fcf6498e362 + + + diff --git a/graph/incidents_graphml/e/edd1f780-fd59-11ec-a469-5997b7522014.graphml b/graph/incidents_graphml/e/edd1f780-fd59-11ec-a469-5997b7522014.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a567fc7aec7c569622fab4427e592aa088ca19c --- /dev/null +++ b/graph/incidents_graphml/e/edd1f780-fd59-11ec-a469-5997b7522014.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.25 + 100.64.82.25 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.226 + USER-0015-1727.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657132322 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + edd1f780-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132322 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + edd1f780-fd59-11ec-a469-5997b7522014 + + + diff --git a/graph/incidents_graphml/e/edd2e270-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/e/edd2e270-0cc7-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bbcb5c152d1174467c87f1d5e2b4f570436f46e --- /dev/null +++ b/graph/incidents_graphml/e/edd2e270-0cc7-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,129 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.16 + 100.64.8.16 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686976332 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + edd2e270-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976332 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + edd2e270-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976332 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + edd2e270-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976332 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + edd2e270-0cc7-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/e/edd2ea70-bc37-11ee-9aca-efbccc10f79c.graphml b/graph/incidents_graphml/e/edd2ea70-bc37-11ee-9aca-efbccc10f79c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6f7652f0aa8458a13cae99fd44f260258884a77 --- /dev/null +++ b/graph/incidents_graphml/e/edd2ea70-bc37-11ee-9aca-efbccc10f79c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.232 + 100.64.51.232 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1706265889 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + edd2ea70-bc37-11ee-9aca-efbccc10f79c + + + diff --git a/graph/incidents_graphml/e/edd56340-0769-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/e/edd56340-0769-11ef-93a8-d78cfa287885.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d09632e2237f2b01389cc6b2d538f79df1a1e02 --- /dev/null +++ b/graph/incidents_graphml/e/edd56340-0769-11ef-93a8-d78cfa287885.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.127.220 + 172.21.127.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.1.193 + 100.64.1.193 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1714533701 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + edd56340-0769-11ef-93a8-d78cfa287885 + + + INCIDENT_LINK + 1714533701 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + edd56340-0769-11ef-93a8-d78cfa287885 + + + diff --git a/graph/incidents_graphml/e/edd97190-fd59-11ec-a469-5997b7522014.graphml b/graph/incidents_graphml/e/edd97190-fd59-11ec-a469-5997b7522014.graphml new file mode 100644 index 0000000000000000000000000000000000000000..505022db3eff2c388d5eaca1fc6c0202d3ca5a24 --- /dev/null +++ b/graph/incidents_graphml/e/edd97190-fd59-11ec-a469-5997b7522014.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.91 + 100.64.40.91 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.75.177 + 100.64.75.177 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.80 + 100.64.77.80 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.81.145 + 100.64.81.145 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.82.26 + 100.64.82.26 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657132322 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + edd97190-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132322 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + edd97190-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132322 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + edd97190-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132322 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + edd97190-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132322 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + edd97190-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132322 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + edd97190-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132322 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + edd97190-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132322 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + edd97190-fd59-11ec-a469-5997b7522014 + + + diff --git a/graph/incidents_graphml/e/eddd2f10-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/eddd2f10-5c0d-11ee-9a52-1fcf6498e362.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c0a1bc0ca32445b70375fc6f23a1d59a0794d62 --- /dev/null +++ b/graph/incidents_graphml/e/eddd2f10-5c0d-11ee-9a52-1fcf6498e362.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.84 + 100.64.8.84 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695692539 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + eddd2f10-5c0d-11ee-9a52-1fcf6498e362 + + + diff --git a/graph/incidents_graphml/e/edf89ae0-bc37-11ee-9aca-efbccc10f79c.graphml b/graph/incidents_graphml/e/edf89ae0-bc37-11ee-9aca-efbccc10f79c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fe7b1b55d45a5bca3e9161e934e42678c480a02 --- /dev/null +++ b/graph/incidents_graphml/e/edf89ae0-bc37-11ee-9aca-efbccc10f79c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.96 + 100.64.25.96 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1706265889 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + edf89ae0-bc37-11ee-9aca-efbccc10f79c + + + diff --git a/graph/incidents_graphml/e/edf92d50-256c-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/e/edf92d50-256c-11ee-8760-d9b0ea984292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19b7153d5ba537a9a1a003d95e6398315747294d --- /dev/null +++ b/graph/incidents_graphml/e/edf92d50-256c-11ee-8760-d9b0ea984292.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.4 + 100.64.12.4 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689686027 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + edf92d50-256c-11ee-8760-d9b0ea984292 + + + diff --git a/graph/incidents_graphml/e/ee039f30-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/e/ee039f30-26cd-11ee-863d-83828757c718.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e70066d384a89718ea997389b117f0e0f28bca63 --- /dev/null +++ b/graph/incidents_graphml/e/ee039f30-26cd-11ee-863d-83828757c718.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.172 + 100.64.49.172 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.173 + 100.64.49.173 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.174 + 100.64.49.174 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689837639 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee039f30-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837639 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee039f30-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837639 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee039f30-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837639 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee039f30-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837639 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee039f30-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837639 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee039f30-26cd-11ee-863d-83828757c718 + + + diff --git a/graph/incidents_graphml/e/ee0b08d0-ab74-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/e/ee0b08d0-ab74-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71f3fd2486e6664530e92e5086fed49775f1ba7f --- /dev/null +++ b/graph/incidents_graphml/e/ee0b08d0-ab74-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.224 + 100.64.92.224 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1676275421 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee0b08d0-ab74-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/e/ee10ae20-ab74-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/e/ee10ae20-ab74-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..105989980d4162599e29938d7e0de90800fe43cd --- /dev/null +++ b/graph/incidents_graphml/e/ee10ae20-ab74-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.224 + 100.64.92.224 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676275421 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ee10ae20-ab74-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/e/ee120cc0-1145-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/e/ee120cc0-1145-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ee8e53f57a9f6d896e76247b5176eff998d7477 --- /dev/null +++ b/graph/incidents_graphml/e/ee120cc0-1145-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.68 + 100.64.21.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.240 + 100.64.71.240 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687470254 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee120cc0-1145-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687470254 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee120cc0-1145-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/e/ee12be50-2bee-11ed-a2b6-b13ea2175bd9.graphml b/graph/incidents_graphml/e/ee12be50-2bee-11ed-a2b6-b13ea2175bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a743d7e88c5472e8393d80bc6a9987986a139a8 --- /dev/null +++ b/graph/incidents_graphml/e/ee12be50-2bee-11ed-a2b6-b13ea2175bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.243 + 100.64.11.243 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662254071 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee12be50-2bee-11ed-a2b6-b13ea2175bd9 + + + diff --git a/graph/incidents_graphml/e/ee138150-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/ee138150-5c0d-11ee-9a52-1fcf6498e362.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8008680a4551cc7855e98bda709c95a04fafe239 --- /dev/null +++ b/graph/incidents_graphml/e/ee138150-5c0d-11ee-9a52-1fcf6498e362.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.141 + 100.64.22.141 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695692539 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ee138150-5c0d-11ee-9a52-1fcf6498e362 + + + diff --git a/graph/incidents_graphml/e/ee1c87f0-9998-11ee-9c88-85e8bec5492c.graphml b/graph/incidents_graphml/e/ee1c87f0-9998-11ee-9c88-85e8bec5492c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8ac9dde5c2c3683078c989e8dbeb6486055ddb6 --- /dev/null +++ b/graph/incidents_graphml/e/ee1c87f0-9998-11ee-9c88-85e8bec5492c.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.199 + 100.64.52.199 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.200 + 100.64.52.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.102 + 100.64.17.102 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702459260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee1c87f0-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee1c87f0-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee1c87f0-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee1c87f0-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee1c87f0-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee1c87f0-9998-11ee-9c88-85e8bec5492c + + + diff --git a/graph/incidents_graphml/e/ee23fc10-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/ee23fc10-5c0d-11ee-9a52-1fcf6498e362.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90e22eb62a09667b8240888962feb2007726a85c --- /dev/null +++ b/graph/incidents_graphml/e/ee23fc10-5c0d-11ee-9a52-1fcf6498e362.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.155 + 100.64.58.155 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695692539 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee23fc10-5c0d-11ee-9a52-1fcf6498e362 + + + diff --git a/graph/incidents_graphml/e/ee275260-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/e/ee275260-9c29-11ed-a223-eb3483e385f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7917dc407790e31af029482a72aa0f4002abcf70 --- /dev/null +++ b/graph/incidents_graphml/e/ee275260-9c29-11ed-a223-eb3483e385f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.145 + 100.64.72.145 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.130 + 100.64.71.130 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1674593942 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee275260-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593942 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee275260-9c29-11ed-a223-eb3483e385f1 + + + diff --git a/graph/incidents_graphml/e/ee27bb90-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ee27bb90-95b3-11ee-a46e-7b17a4f6b26c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7cc63868945687c31a87252ee3511f33a518254a --- /dev/null +++ b/graph/incidents_graphml/e/ee27bb90-95b3-11ee-a46e-7b17a4f6b26c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.14.83 + 100.64.14.83 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1702031052 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ee27bb90-95b3-11ee-a46e-7b17a4f6b26c + + + INCIDENT_LINK + 1702031052 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ee27bb90-95b3-11ee-a46e-7b17a4f6b26c + + + diff --git a/graph/incidents_graphml/e/ee2eacd0-71e1-11ed-b9a8-2b933f6712c2.graphml b/graph/incidents_graphml/e/ee2eacd0-71e1-11ed-b9a8-2b933f6712c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f4a1b64446f93503419ef17572de3bf2c0343c2 --- /dev/null +++ b/graph/incidents_graphml/e/ee2eacd0-71e1-11ed-b9a8-2b933f6712c2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.101 + 100.64.82.101 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.196 + 100.64.75.196 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.82.102 + 100.64.82.102 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1669945069 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee2eacd0-71e1-11ed-b9a8-2b933f6712c2 + + + INCIDENT_LINK + 1669945069 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee2eacd0-71e1-11ed-b9a8-2b933f6712c2 + + + INCIDENT_LINK + 1669945069 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee2eacd0-71e1-11ed-b9a8-2b933f6712c2 + + + INCIDENT_LINK + 1669945069 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee2eacd0-71e1-11ed-b9a8-2b933f6712c2 + + + diff --git a/graph/incidents_graphml/e/ee31dec0-5c0d-11ee-9a52-1fcf6498e362.graphml b/graph/incidents_graphml/e/ee31dec0-5c0d-11ee-9a52-1fcf6498e362.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa086ee71c806e13724cd839bb9218f9996053d5 --- /dev/null +++ b/graph/incidents_graphml/e/ee31dec0-5c0d-11ee-9a52-1fcf6498e362.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.155 + 100.64.58.155 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695692539 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ee31dec0-5c0d-11ee-9a52-1fcf6498e362 + + + diff --git a/graph/incidents_graphml/e/ee353db0-c01b-11ed-93b0-17c4c2638708.graphml b/graph/incidents_graphml/e/ee353db0-c01b-11ed-93b0-17c4c2638708.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d4c29b4da476b2e2320da51d56f2eccb2e8d004 --- /dev/null +++ b/graph/incidents_graphml/e/ee353db0-c01b-11ed-93b0-17c4c2638708.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.126 + 100.64.84.126 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678546171 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee353db0-c01b-11ed-93b0-17c4c2638708 + + + diff --git a/graph/incidents_graphml/e/ee49b950-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/ee49b950-2d4f-11ef-80f2-29529499b1dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35cd4e9d81cbfc327cc55fe31851eea6f8ad504e --- /dev/null +++ b/graph/incidents_graphml/e/ee49b950-2d4f-11ef-80f2-29529499b1dd.graphml @@ -0,0 +1,753 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.59 + 100.64.67.59 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 10.159.145.125 + 10.159.145.125 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.25 + 100.64.84.25 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.27 + 100.64.84.27 + ["Exploiting Target"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.26 + 100.64.84.26 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.14.220 + 100.64.14.220 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.22 + 100.64.84.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.24.154 + 100.64.24.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.23 + 100.64.84.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.28 + 100.64.84.28 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.29 + 100.64.84.29 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.37.195 + 100.64.37.195 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.31 + 100.64.84.31 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.33 + 100.64.84.33 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.34 + 100.64.84.34 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.35 + 100.64.84.35 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.84.38 + 100.64.84.38 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.40 + 100.64.83.40 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.5.233 + 100.64.5.233 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.34.227 + 100.64.34.227 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + INCIDENT_LINK + 1718700679 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee49b950-2d4f-11ef-80f2-29529499b1dd + + + diff --git a/graph/incidents_graphml/e/ee4c2150-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/e/ee4c2150-9172-11ee-94be-75b251a8fc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01219db460ec4d08f7f06907b52207f94481f5c2 --- /dev/null +++ b/graph/incidents_graphml/e/ee4c2150-9172-11ee-94be-75b251a8fc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.62 + USER-0015-1305.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701563330 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ee4c2150-9172-11ee-94be-75b251a8fc8a + + + diff --git a/graph/incidents_graphml/e/ee550260-b4f1-11ed-9d28-d755eb33fc3e.graphml b/graph/incidents_graphml/e/ee550260-b4f1-11ed-9d28-d755eb33fc3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da5763082de1d0d89b12e8041d92c4495fd9eed6 --- /dev/null +++ b/graph/incidents_graphml/e/ee550260-b4f1-11ed-9d28-d755eb33fc3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.95 + 100.64.86.95 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677318669 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee550260-b4f1-11ed-9d28-d755eb33fc3e + + + diff --git a/graph/incidents_graphml/e/ee580fa0-b4f1-11ed-9d28-d755eb33fc3e.graphml b/graph/incidents_graphml/e/ee580fa0-b4f1-11ed-9d28-d755eb33fc3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13eaba9052d163539741a11f8793829cf1269fd7 --- /dev/null +++ b/graph/incidents_graphml/e/ee580fa0-b4f1-11ed-9d28-d755eb33fc3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.95 + 100.64.86.95 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677318669 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ee580fa0-b4f1-11ed-9d28-d755eb33fc3e + + + diff --git a/graph/incidents_graphml/e/ee614850-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/e/ee614850-75d9-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb4425cdb74a0152f46e8d23a17c7dd78d71f72a --- /dev/null +++ b/graph/incidents_graphml/e/ee614850-75d9-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.173 + 100.64.28.173 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698528936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ee614850-75d9-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/e/ee6f7920-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/e/ee6f7920-75d9-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d20b01f54f9312f2ee1863ef507a03310510ac2 --- /dev/null +++ b/graph/incidents_graphml/e/ee6f7920-75d9-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.173 + 100.64.28.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698528936 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ee6f7920-75d9-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/e/ee7d0db0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/e/ee7d0db0-75d9-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..793f9b1ef22ffa5ab90313f92c73710b8e56e0da --- /dev/null +++ b/graph/incidents_graphml/e/ee7d0db0-75d9-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.141 + 100.64.45.141 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698528936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee7d0db0-75d9-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/e/ee834aa0-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/e/ee834aa0-11e8-11ed-97d5-3360f7274b74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..463ffad9b1b85ae75a07752310d0c29b3f6117f7 --- /dev/null +++ b/graph/incidents_graphml/e/ee834aa0-11e8-11ed-97d5-3360f7274b74.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.134 + 100.64.77.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.173 + 100.64.72.173 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.135 + 100.64.77.135 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.243 + 100.64.71.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.136 + 100.64.77.136 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659392765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee834aa0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee834aa0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee834aa0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee834aa0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee834aa0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee834aa0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee834aa0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee834aa0-11e8-11ed-97d5-3360f7274b74 + + + diff --git a/graph/incidents_graphml/e/ee8c7700-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/e/ee8c7700-75d9-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce245d2b72439071065a60d11f291b64830d585d --- /dev/null +++ b/graph/incidents_graphml/e/ee8c7700-75d9-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.141 + 100.64.45.141 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698528936 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ee8c7700-75d9-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/e/ee8dab60-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/e/ee8dab60-9268-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63438e5245b88e7ea36eaa7081fc3cbfb84a75c7 --- /dev/null +++ b/graph/incidents_graphml/e/ee8dab60-9268-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.183 + 100.64.65.183 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701668987 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ee8dab60-9268-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/e/ee91ef10-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ee91ef10-95b3-11ee-a46e-7b17a4f6b26c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..501463f9ef2ca493213f1000dbeec503f4281151 --- /dev/null +++ b/graph/incidents_graphml/e/ee91ef10-95b3-11ee-a46e-7b17a4f6b26c.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.46 + 100.64.96.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 100.64.88.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 10.184.211.180 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1702031053 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee91ef10-95b3-11ee-a46e-7b17a4f6b26c + + + INCIDENT_LINK + 1702031053 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee91ef10-95b3-11ee-a46e-7b17a4f6b26c + + + diff --git a/graph/incidents_graphml/e/ee957720-bc37-11ee-9aca-efbccc10f79c.graphml b/graph/incidents_graphml/e/ee957720-bc37-11ee-9aca-efbccc10f79c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1909543d9e8686f0351c642e0841e96219c8d15 --- /dev/null +++ b/graph/incidents_graphml/e/ee957720-bc37-11ee-9aca-efbccc10f79c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.236 + 100.64.51.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1706265890 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee957720-bc37-11ee-9aca-efbccc10f79c + + + diff --git a/graph/incidents_graphml/e/ee982a10-2efc-11ee-bea9-c5ecb1b621be.graphml b/graph/incidents_graphml/e/ee982a10-2efc-11ee-bea9-c5ecb1b621be.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6b4ba487b2d2055f3cd3908d4fc32c32c43df91 --- /dev/null +++ b/graph/incidents_graphml/e/ee982a10-2efc-11ee-bea9-c5ecb1b621be.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.232 + 100.64.81.232 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.74.95 + 100.64.74.95 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690737436 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ee982a10-2efc-11ee-bea9-c5ecb1b621be + + + diff --git a/graph/incidents_graphml/e/ee989530-329f-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/e/ee989530-329f-11ee-8ce2-1f9d9a95bd90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d55ea3e39f3acb8f6a58b737f9955a2b178255f7 --- /dev/null +++ b/graph/incidents_graphml/e/ee989530-329f-11ee-8ce2-1f9d9a95bd90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.252 + 100.64.23.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691137298 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee989530-329f-11ee-8ce2-1f9d9a95bd90 + + + diff --git a/graph/incidents_graphml/e/ee9a0770-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/e/ee9a0770-9268-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6145bbb3addc4fc4250ac238a42c012804a45822 --- /dev/null +++ b/graph/incidents_graphml/e/ee9a0770-9268-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.185 + 100.64.65.185 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701668987 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee9a0770-9268-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/e/ee9d66f0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/e/ee9d66f0-75d9-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eafef473bcb17ea9d43bb28389cf9d3a345b6d09 --- /dev/null +++ b/graph/incidents_graphml/e/ee9d66f0-75d9-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.15 + 100.64.11.15 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698528936 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ee9d66f0-75d9-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/e/ee9e2ca0-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/e/ee9e2ca0-4efd-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de8e5aede320972beb4f7e221931c6c373ec5266 --- /dev/null +++ b/graph/incidents_graphml/e/ee9e2ca0-4efd-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.234 + 100.64.11.234 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694256303 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ee9e2ca0-4efd-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/e/eea2e8f0-234a-11ee-a619-11a50471d879.graphml b/graph/incidents_graphml/e/eea2e8f0-234a-11ee-a619-11a50471d879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59d11a66a22b70b6409dd6512904742a4718b09a --- /dev/null +++ b/graph/incidents_graphml/e/eea2e8f0-234a-11ee-a619-11a50471d879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.206 + 100.64.41.206 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689451523 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eea2e8f0-234a-11ee-a619-11a50471d879 + + + diff --git a/graph/incidents_graphml/e/eea41d20-bc37-11ee-9aca-efbccc10f79c.graphml b/graph/incidents_graphml/e/eea41d20-bc37-11ee-9aca-efbccc10f79c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..386a4d05301f625ea067a4431ce0a488b1b2475f --- /dev/null +++ b/graph/incidents_graphml/e/eea41d20-bc37-11ee-9aca-efbccc10f79c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.236 + 100.64.51.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1706265890 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + eea41d20-bc37-11ee-9aca-efbccc10f79c + + + diff --git a/graph/incidents_graphml/e/eea83630-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/eea83630-95b3-11ee-a46e-7b17a4f6b26c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5becb0914c1634562b1b44a981076adba440663 --- /dev/null +++ b/graph/incidents_graphml/e/eea83630-95b3-11ee-a46e-7b17a4f6b26c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 100.64.88.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.96.46 + 100.64.96.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702031053 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + eea83630-95b3-11ee-a46e-7b17a4f6b26c + + + diff --git a/graph/incidents_graphml/e/eeb40c70-329f-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/e/eeb40c70-329f-11ee-8ce2-1f9d9a95bd90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5998d22b544183901054fc18b43866063532bbc6 --- /dev/null +++ b/graph/incidents_graphml/e/eeb40c70-329f-11ee-8ce2-1f9d9a95bd90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.252 + 100.64.23.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691137298 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + eeb40c70-329f-11ee-8ce2-1f9d9a95bd90 + + + diff --git a/graph/incidents_graphml/e/eeb80b80-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/eeb80b80-2d4f-11ef-80f2-29529499b1dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ea35b2cf53ecb42ba963a67ab7115e9be770e1d --- /dev/null +++ b/graph/incidents_graphml/e/eeb80b80-2d4f-11ef-80f2-29529499b1dd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.242 + 100.64.4.242 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.159.145.125 + 10.159.145.125 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1718700680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeb80b80-2d4f-11ef-80f2-29529499b1dd + + + diff --git a/graph/incidents_graphml/e/eebc5780-fd59-11ec-a469-5997b7522014.graphml b/graph/incidents_graphml/e/eebc5780-fd59-11ec-a469-5997b7522014.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6808574bec42a9d3a30bf0cc4087c8e04d14d307 --- /dev/null +++ b/graph/incidents_graphml/e/eebc5780-fd59-11ec-a469-5997b7522014.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.27 + 100.64.82.27 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.215 + 100.64.72.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657132324 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eebc5780-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132324 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eebc5780-fd59-11ec-a469-5997b7522014 + + + diff --git a/graph/incidents_graphml/e/eec38030-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/e/eec38030-2f46-11ee-8421-f3eff1a35bff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..898fb13c9c51364e5bb38ba1d09ec2a3e4991188 --- /dev/null +++ b/graph/incidents_graphml/e/eec38030-2f46-11ee-8421-f3eff1a35bff.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.98 + 100.64.36.98 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.195 + 100.64.73.195 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.133 + 100.64.76.133 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.18.180 + 100.64.18.180 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.66.225 + 100.64.66.225 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690769219 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eec38030-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769219 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eec38030-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769219 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eec38030-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769219 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eec38030-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769219 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eec38030-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769219 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eec38030-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769219 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eec38030-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769219 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eec38030-2f46-11ee-8421-f3eff1a35bff + + + diff --git a/graph/incidents_graphml/e/eec79be0-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/eec79be0-2d4f-11ef-80f2-29529499b1dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..74ebe4020637a5b882cfb4900c4fcc57cf66ea35 --- /dev/null +++ b/graph/incidents_graphml/e/eec79be0-2d4f-11ef-80f2-29529499b1dd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.159.145.125 + 10.159.145.125 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.4.242 + 100.64.4.242 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1718700680 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + eec79be0-2d4f-11ef-80f2-29529499b1dd + + + diff --git a/graph/incidents_graphml/e/eecb2520-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/e/eecb2520-0cc7-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4db302806c7c4e10d49465276b40d30c31f2e6c --- /dev/null +++ b/graph/incidents_graphml/e/eecb2520-0cc7-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.153 + 100.64.6.153 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686976334 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + eecb2520-0cc7-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/e/eeceb150-086f-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/e/eeceb150-086f-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa4b536e22864b609bb4f0944bd13b3955d3a498 --- /dev/null +++ b/graph/incidents_graphml/e/eeceb150-086f-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.159 + 100.64.58.159 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.160 + 100.64.58.160 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.161 + 100.64.58.161 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.162 + 100.64.58.162 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.2.213 + 100.64.2.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.163 + 100.64.58.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.212 + 100.64.50.212 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.164 + 100.64.58.164 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.165 + 100.64.58.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646231 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eeceb150-086f-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/e/eecfa490-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/e/eecfa490-21fe-11ef-a065-0d11f2930c39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e1efefd7f769fe330d4d54b701879efa33c04a4 --- /dev/null +++ b/graph/incidents_graphml/e/eecfa490-21fe-11ef-a065-0d11f2930c39.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.157 + 100.64.32.157 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717456428 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eecfa490-21fe-11ef-a065-0d11f2930c39 + + + diff --git a/graph/incidents_graphml/e/eed55780-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/eed55780-2d4f-11ef-80f2-29529499b1dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9ce9c62843b4fc218a652b74fbe1444a6ba4aa0 --- /dev/null +++ b/graph/incidents_graphml/e/eed55780-2d4f-11ef-80f2-29529499b1dd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.29 + 100.64.8.29 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.159.145.125 + 10.159.145.125 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1718700680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eed55780-2d4f-11ef-80f2-29529499b1dd + + + diff --git a/graph/incidents_graphml/e/eed6b400-dd4a-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/eed6b400-dd4a-11ed-8595-d92cdedd1bfb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa3106da9a76c9638fb73ae25e7d3369f4dd149a --- /dev/null +++ b/graph/incidents_graphml/e/eed6b400-dd4a-11ed-8595-d92cdedd1bfb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.232 + 100.64.72.232 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681754942 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eed6b400-dd4a-11ed-8595-d92cdedd1bfb + + + diff --git a/graph/incidents_graphml/e/eedce470-4135-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/e/eedce470-4135-11ee-89c1-af7b5492d246.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e3271006d5ac04f15e23f708099e794e2996126 --- /dev/null +++ b/graph/incidents_graphml/e/eedce470-4135-11ee-89c1-af7b5492d246.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.198 + 100.64.51.198 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1692741039 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eedce470-4135-11ee-89c1-af7b5492d246 + + + diff --git a/graph/incidents_graphml/e/eedcf590-dd4a-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/eedcf590-dd4a-11ed-8595-d92cdedd1bfb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a77938470104fe8745b80ce727d15111f6bb1a07 --- /dev/null +++ b/graph/incidents_graphml/e/eedcf590-dd4a-11ed-8595-d92cdedd1bfb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.232 + 100.64.72.232 + ["Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1681754942 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + eedcf590-dd4a-11ed-8595-d92cdedd1bfb + + + diff --git a/graph/incidents_graphml/e/eede81e0-2efc-11ee-bea9-c5ecb1b621be.graphml b/graph/incidents_graphml/e/eede81e0-2efc-11ee-bea9-c5ecb1b621be.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c76eac26c63d2a533c08319210d0c8dc6ca296e --- /dev/null +++ b/graph/incidents_graphml/e/eede81e0-2efc-11ee-bea9-c5ecb1b621be.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.232 + 100.64.81.232 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690737437 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eede81e0-2efc-11ee-bea9-c5ecb1b621be + + + diff --git a/graph/incidents_graphml/e/eee46510-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/e/eee46510-21fe-11ef-a065-0d11f2930c39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58061550f0dd82d50d20eb5bfeacfde558570ff7 --- /dev/null +++ b/graph/incidents_graphml/e/eee46510-21fe-11ef-a065-0d11f2930c39.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.157 + 100.64.32.157 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717456428 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + eee46510-21fe-11ef-a065-0d11f2930c39 + + + diff --git a/graph/incidents_graphml/e/eee4e7e0-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/eee4e7e0-2d4f-11ef-80f2-29529499b1dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e977b042b1a1e31abce3c5adf5a2e3a6b0c886f --- /dev/null +++ b/graph/incidents_graphml/e/eee4e7e0-2d4f-11ef-80f2-29529499b1dd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.159.145.125 + 10.159.145.125 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.8.29 + 100.64.8.29 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1718700680 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + eee4e7e0-2d4f-11ef-80f2-29529499b1dd + + + diff --git a/graph/incidents_graphml/e/eeea0410-234a-11ee-a619-11a50471d879.graphml b/graph/incidents_graphml/e/eeea0410-234a-11ee-a619-11a50471d879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f86e0bdff8a3b85580acfa27a6754af782739d6e --- /dev/null +++ b/graph/incidents_graphml/e/eeea0410-234a-11ee-a619-11a50471d879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.128 + 100.64.28.128 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689451523 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeea0410-234a-11ee-a619-11a50471d879 + + + diff --git a/graph/incidents_graphml/e/eeecc5d0-2a32-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/e/eeecc5d0-2a32-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..089d7545720f6e04f7aba073b229516c114c69c0 --- /dev/null +++ b/graph/incidents_graphml/e/eeecc5d0-2a32-11ee-9959-8506340212c8.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1690210874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeecc5d0-2a32-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeecc5d0-2a32-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeecc5d0-2a32-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeecc5d0-2a32-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/e/eeee2280-4135-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/e/eeee2280-4135-11ee-89c1-af7b5492d246.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26e5fb943fb95b533f21f447634a35c4cc0700d0 --- /dev/null +++ b/graph/incidents_graphml/e/eeee2280-4135-11ee-89c1-af7b5492d246.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.51.198 + 100.64.51.198 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692741039 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + eeee2280-4135-11ee-89c1-af7b5492d246 + + + diff --git a/graph/incidents_graphml/e/eeee79c0-5061-11ee-a936-57e582280eb3.graphml b/graph/incidents_graphml/e/eeee79c0-5061-11ee-a936-57e582280eb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cda22583c4910117aa4687a506498accc21e29b3 --- /dev/null +++ b/graph/incidents_graphml/e/eeee79c0-5061-11ee-a936-57e582280eb3.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.126 + 100.64.9.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.87 + 100.64.23.87 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.217 + 100.64.14.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.88 + 100.64.23.88 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.144 + 100.64.12.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694409204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeee79c0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeee79c0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeee79c0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeee79c0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeee79c0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeee79c0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeee79c0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeee79c0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeee79c0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeee79c0-5061-11ee-a936-57e582280eb3 + + + diff --git a/graph/incidents_graphml/e/eef3b4f0-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/eef3b4f0-2d4f-11ef-80f2-29529499b1dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5535bd15c6ea57cc4fac89ea4f29da0ba440bd6e --- /dev/null +++ b/graph/incidents_graphml/e/eef3b4f0-2d4f-11ef-80f2-29529499b1dd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.218 + 100.64.64.218 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.159.145.125 + 10.159.145.125 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1718700680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eef3b4f0-2d4f-11ef-80f2-29529499b1dd + + + diff --git a/graph/incidents_graphml/e/eefdb810-f51b-11ec-9c76-edb488c77bbc.graphml b/graph/incidents_graphml/e/eefdb810-f51b-11ec-9c76-edb488c77bbc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c951348f79e5cc7a63986d7a0e4fd2f5ba18c37b --- /dev/null +++ b/graph/incidents_graphml/e/eefdb810-f51b-11ec-9c76-edb488c77bbc.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.176 + 100.64.5.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.71 + 100.64.73.71 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656226086 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eefdb810-f51b-11ec-9c76-edb488c77bbc + + + INCIDENT_LINK + 1656226086 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eefdb810-f51b-11ec-9c76-edb488c77bbc + + + diff --git a/graph/incidents_graphml/e/eeff9360-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/e/eeff9360-59ba-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e82fcd76e077e534fe1d200d3a8f681b86fad1f --- /dev/null +++ b/graph/incidents_graphml/e/eeff9360-59ba-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.76 + 100.64.20.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695436990 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eeff9360-59ba-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/e/ef031e40-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/ef031e40-2d4f-11ef-80f2-29529499b1dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a190f0febc8307f624514727619e993b01e1062 --- /dev/null +++ b/graph/incidents_graphml/e/ef031e40-2d4f-11ef-80f2-29529499b1dd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.159.145.125 + 10.159.145.125 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.64.218 + 100.64.64.218 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1718700680 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef031e40-2d4f-11ef-80f2-29529499b1dd + + + diff --git a/graph/incidents_graphml/e/ef04a0a0-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/e/ef04a0a0-1f1b-11ee-9e2e-57c890ee02a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb97691d61be887cbe8c816c1b3629da636a8f83 --- /dev/null +++ b/graph/incidents_graphml/e/ef04a0a0-1f1b-11ee-9e2e-57c890ee02a2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.69 + 100.64.47.69 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688991533 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef04a0a0-1f1b-11ee-9e2e-57c890ee02a2 + + + diff --git a/graph/incidents_graphml/e/ef061790-234a-11ee-a619-11a50471d879.graphml b/graph/incidents_graphml/e/ef061790-234a-11ee-a619-11a50471d879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9faaaba450fe69c60bf3d165a22561e97d71deba --- /dev/null +++ b/graph/incidents_graphml/e/ef061790-234a-11ee-a619-11a50471d879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.54 + 100.64.12.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689451524 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef061790-234a-11ee-a619-11a50471d879 + + + diff --git a/graph/incidents_graphml/e/ef08e580-3661-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/e/ef08e580-3661-11ef-b33d-111abc4c57da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fe2a12d30a669ec80f06ea3a82327161cc9dc7e --- /dev/null +++ b/graph/incidents_graphml/e/ef08e580-3661-11ef-b33d-111abc4c57da.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.151 + 100.64.44.151 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.254 + 100.64.8.254 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719697972 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef08e580-3661-11ef-b33d-111abc4c57da + + + INCIDENT_LINK + 1719697972 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef08e580-3661-11ef-b33d-111abc4c57da + + + INCIDENT_LINK + 1719697972 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef08e580-3661-11ef-b33d-111abc4c57da + + + INCIDENT_LINK + 1719697972 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef08e580-3661-11ef-b33d-111abc4c57da + + + diff --git a/graph/incidents_graphml/e/ef1100f0-2d4f-11ef-80f2-29529499b1dd.graphml b/graph/incidents_graphml/e/ef1100f0-2d4f-11ef-80f2-29529499b1dd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a6b808f48c271a4076c5a2c8a1cfa685024c4e3 --- /dev/null +++ b/graph/incidents_graphml/e/ef1100f0-2d4f-11ef-80f2-29529499b1dd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.86 + 100.64.44.86 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.159.145.125 + 10.159.145.125 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1718700680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef1100f0-2d4f-11ef-80f2-29529499b1dd + + + diff --git a/graph/incidents_graphml/e/ef127f20-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/e/ef127f20-59ba-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5018ea4a3038d68b5974d116026ef20473dd2baf --- /dev/null +++ b/graph/incidents_graphml/e/ef127f20-59ba-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.76 + 100.64.20.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695436990 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef127f20-59ba-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/e/ef1290c0-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ef1290c0-95b3-11ee-a46e-7b17a4f6b26c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52e85f15509ee7f3b55b104c04393ed09bb3487c --- /dev/null +++ b/graph/incidents_graphml/e/ef1290c0-95b3-11ee-a46e-7b17a4f6b26c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.96.46 + 100.64.96.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702031053 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef1290c0-95b3-11ee-a46e-7b17a4f6b26c + + + diff --git a/graph/incidents_graphml/e/ef16dc00-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/e/ef16dc00-1068-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ab64352a6e5e5121fb3009030e5c2c0fe4858b6 --- /dev/null +++ b/graph/incidents_graphml/e/ef16dc00-1068-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.225 + USER-0015-1208.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687375337 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef16dc00-1068-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/e/ef271890-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/e/ef271890-59ba-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b1eda40fa56fd9fc7d99b5bc7b9d051a914713d4 --- /dev/null +++ b/graph/incidents_graphml/e/ef271890-59ba-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695436990 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef271890-59ba-11ee-8c81-27ac3690fef9 + + + INCIDENT_LINK + 1695436990 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef271890-59ba-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/e/ef28a360-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/e/ef28a360-1f1b-11ee-9e2e-57c890ee02a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..647deff533bac90d7affe11b2d34369aebb2a0ac --- /dev/null +++ b/graph/incidents_graphml/e/ef28a360-1f1b-11ee-9e2e-57c890ee02a2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.69 + 100.64.47.69 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688991533 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef28a360-1f1b-11ee-9e2e-57c890ee02a2 + + + diff --git a/graph/incidents_graphml/e/ef2e1310-6d66-11ee-acf4-ebf255c20472.graphml b/graph/incidents_graphml/e/ef2e1310-6d66-11ee-acf4-ebf255c20472.graphml new file mode 100644 index 0000000000000000000000000000000000000000..526f7052d625b1531c45a2fab1f8a1d51acef330 --- /dev/null +++ b/graph/incidents_graphml/e/ef2e1310-6d66-11ee-acf4-ebf255c20472.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.93 + 100.64.56.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697599936 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef2e1310-6d66-11ee-acf4-ebf255c20472 + + + diff --git a/graph/incidents_graphml/e/ef37a070-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/e/ef37a070-0bf4-11ee-9b02-ffb3de173f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3705fdc29a3a9a715714def86366a6d9c0e523b0 --- /dev/null +++ b/graph/incidents_graphml/e/ef37a070-0bf4-11ee-9b02-ffb3de173f5d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.207 + 100.64.80.207 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.157 + 100.64.78.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686885710 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef37a070-0bf4-11ee-9b02-ffb3de173f5d + + + INCIDENT_LINK + 1686885710 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef37a070-0bf4-11ee-9b02-ffb3de173f5d + + + diff --git a/graph/incidents_graphml/e/ef38a4c0-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/e/ef38a4c0-59ba-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50336b2a717e2c4e23133a13bea7cd40ee61d265 --- /dev/null +++ b/graph/incidents_graphml/e/ef38a4c0-59ba-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695436990 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ef38a4c0-59ba-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/e/ef3d0440-f30a-11ee-9a5d-cb0254535644.graphml b/graph/incidents_graphml/e/ef3d0440-f30a-11ee-9a5d-cb0254535644.graphml new file mode 100644 index 0000000000000000000000000000000000000000..295fac53f3448326d5835f1220a96e141f8320dd --- /dev/null +++ b/graph/incidents_graphml/e/ef3d0440-f30a-11ee-9a5d-cb0254535644.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.93 + 100.64.18.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712293878 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef3d0440-f30a-11ee-9a5d-cb0254535644 + + + diff --git a/graph/incidents_graphml/e/ef4124c0-234a-11ee-a619-11a50471d879.graphml b/graph/incidents_graphml/e/ef4124c0-234a-11ee-a619-11a50471d879.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1895bb72289c732ab4bbdf37e2f6250a42ac21b0 --- /dev/null +++ b/graph/incidents_graphml/e/ef4124c0-234a-11ee-a619-11a50471d879.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.35 + 100.64.29.35 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689451524 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef4124c0-234a-11ee-a619-11a50471d879 + + + diff --git a/graph/incidents_graphml/e/ef4851d0-6d66-11ee-acf4-ebf255c20472.graphml b/graph/incidents_graphml/e/ef4851d0-6d66-11ee-acf4-ebf255c20472.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb1f9dc04b60b0192dd00a9343720f23a5c5b877 --- /dev/null +++ b/graph/incidents_graphml/e/ef4851d0-6d66-11ee-acf4-ebf255c20472.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.93 + 100.64.56.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697599936 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef4851d0-6d66-11ee-acf4-ebf255c20472 + + + diff --git a/graph/incidents_graphml/e/ef4a1700-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/e/ef4a1700-0bf4-11ee-9b02-ffb3de173f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15d24fb220b31fe1e463ed5270f2f58295155665 --- /dev/null +++ b/graph/incidents_graphml/e/ef4a1700-0bf4-11ee-9b02-ffb3de173f5d.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.36 + 100.64.1.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.208 + 100.64.80.208 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686885711 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef4a1700-0bf4-11ee-9b02-ffb3de173f5d + + + INCIDENT_LINK + 1686885711 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef4a1700-0bf4-11ee-9b02-ffb3de173f5d + + + INCIDENT_LINK + 1686885711 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef4a1700-0bf4-11ee-9b02-ffb3de173f5d + + + INCIDENT_LINK + 1686885711 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef4a1700-0bf4-11ee-9b02-ffb3de173f5d + + + diff --git a/graph/incidents_graphml/e/ef4da370-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/e/ef4da370-1068-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a073da6a99634c4e61bca4a7b9eb84bd19a8cf30 --- /dev/null +++ b/graph/incidents_graphml/e/ef4da370-1068-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.225 + USER-0015-1208.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687375337 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef4da370-1068-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/e/ef5e0c70-dd4a-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/ef5e0c70-dd4a-11ed-8595-d92cdedd1bfb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a3c4830ae182a3798d6b542ce56bcab2a47633b --- /dev/null +++ b/graph/incidents_graphml/e/ef5e0c70-dd4a-11ed-8595-d92cdedd1bfb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.859375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.234 + 100.64.72.234 + ["Exploiting Host","Exploiting Target"] + 0.89453125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1681754943 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef5e0c70-dd4a-11ed-8595-d92cdedd1bfb + + + INCIDENT_LINK + 1681754943 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef5e0c70-dd4a-11ed-8595-d92cdedd1bfb + + + diff --git a/graph/incidents_graphml/e/ef613370-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/e/ef613370-1228-11ed-99ed-adca11e4059c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8148a18248f6530314487ae8d0d33bef8cbe3d43 --- /dev/null +++ b/graph/incidents_graphml/e/ef613370-1228-11ed-99ed-adca11e4059c.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.249.41 + 172.22.249.41 + ["Exploiting Host"] + 0.578125 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.86.252 + 100.64.86.252 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.35 + 100.64.89.35 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.36 + 100.64.89.36 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659420254 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef613370-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420254 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef613370-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420254 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef613370-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420254 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef613370-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420254 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef613370-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420254 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef613370-1228-11ed-99ed-adca11e4059c + + + diff --git a/graph/incidents_graphml/e/ef69fff0-2f73-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/e/ef69fff0-2f73-11ee-b11e-87149c94e410.graphml new file mode 100644 index 0000000000000000000000000000000000000000..31485d44a3d92b92a2a497ff71c4c3c4f9bbf39f --- /dev/null +++ b/graph/incidents_graphml/e/ef69fff0-2f73-11ee-b11e-87149c94e410.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.250 + 100.64.41.250 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690788548 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef69fff0-2f73-11ee-b11e-87149c94e410 + + + diff --git a/graph/incidents_graphml/e/ef6d3c70-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/e/ef6d3c70-230b-11ee-b0f8-a7fcea0862f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..673697468e68a8f8202ee573d006f898ba958c19 --- /dev/null +++ b/graph/incidents_graphml/e/ef6d3c70-230b-11ee-b0f8-a7fcea0862f2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.215 + 100.64.31.215 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689424466 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ef6d3c70-230b-11ee-b0f8-a7fcea0862f2 + + + diff --git a/graph/incidents_graphml/e/ef7a7a50-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ef7a7a50-95b3-11ee-a46e-7b17a4f6b26c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a70218acebc482d7913ea3c43d7f3322a9a0478b --- /dev/null +++ b/graph/incidents_graphml/e/ef7a7a50-95b3-11ee-a46e-7b17a4f6b26c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.140 + USER-0015-1952.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1702031054 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef7a7a50-95b3-11ee-a46e-7b17a4f6b26c + + + diff --git a/graph/incidents_graphml/e/ef7fdb80-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/e/ef7fdb80-7588-11ee-8bdd-0135165fdaaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..02ee10b398f508cff5b4bba5d5fc168e757a5413 --- /dev/null +++ b/graph/incidents_graphml/e/ef7fdb80-7588-11ee-8bdd-0135165fdaaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.97 + 100.64.13.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698494149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef7fdb80-7588-11ee-8bdd-0135165fdaaa + + + diff --git a/graph/incidents_graphml/e/ef8d5a40-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/e/ef8d5a40-6317-11ee-bf7a-9334ddba6edc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f12a58399cd9f13b7116af697a9c4a821ab787d7 --- /dev/null +++ b/graph/incidents_graphml/e/ef8d5a40-6317-11ee-bf7a-9334ddba6edc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.215 + 100.64.88.215 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696466495 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef8d5a40-6317-11ee-bf7a-9334ddba6edc + + + diff --git a/graph/incidents_graphml/e/ef8f88f0-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/e/ef8f88f0-95b3-11ee-a46e-7b17a4f6b26c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63f52b62ddb5be852d51951df3281474fe0fbe56 --- /dev/null +++ b/graph/incidents_graphml/e/ef8f88f0-95b3-11ee-a46e-7b17a4f6b26c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.5.140 + USER-0015-1952.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702031054 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef8f88f0-95b3-11ee-a46e-7b17a4f6b26c + + + diff --git a/graph/incidents_graphml/e/ef931560-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/e/ef931560-7588-11ee-8bdd-0135165fdaaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07c88fc0d2be83022c057a3344eaf6a27e748595 --- /dev/null +++ b/graph/incidents_graphml/e/ef931560-7588-11ee-8bdd-0135165fdaaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.97 + 100.64.13.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698494149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ef931560-7588-11ee-8bdd-0135165fdaaa + + + diff --git a/graph/incidents_graphml/e/ef93b030-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/e/ef93b030-230b-11ee-b0f8-a7fcea0862f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82d5be6e1647d8536d60ddcce2fc80c6bd0afec1 --- /dev/null +++ b/graph/incidents_graphml/e/ef93b030-230b-11ee-b0f8-a7fcea0862f2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.215 + 100.64.31.215 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689424466 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ef93b030-230b-11ee-b0f8-a7fcea0862f2 + + + diff --git a/graph/incidents_graphml/e/ef97dc50-a7f0-11ed-af31-070b715d9bbb.graphml b/graph/incidents_graphml/e/ef97dc50-a7f0-11ed-af31-070b715d9bbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bd1d8fbe95079c43ef96ceea3fa07492ec2ec72 --- /dev/null +++ b/graph/incidents_graphml/e/ef97dc50-a7f0-11ed-af31-070b715d9bbb.graphml @@ -0,0 +1,785 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.200 + 100.64.87.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.201 + 100.64.87.201 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.202 + 100.64.87.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.203 + 100.64.87.203 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.204 + 100.64.87.204 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.205 + 100.64.87.205 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.206 + 100.64.87.206 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.207 + 100.64.87.207 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.150 + 100.64.9.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.75.168 + 100.64.75.168 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.119 + 100.64.25.119 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.208 + 100.64.87.208 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.209 + 100.64.87.209 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.210 + 100.64.87.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.211 + 100.64.87.211 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.74.211.215 + HOST-16914 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.87.212 + 100.64.87.212 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.213 + 100.64.87.213 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.214 + 100.64.87.214 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.87.215 + 100.64.87.215 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ef97dc50-a7f0-11ed-af31-070b715d9bbb + + + diff --git a/graph/incidents_graphml/e/efa423f0-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/e/efa423f0-11e8-11ed-97d5-3360f7274b74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1af8ed7b9d2633551ef946f6794dd620c055051e --- /dev/null +++ b/graph/incidents_graphml/e/efa423f0-11e8-11ed-97d5-3360f7274b74.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.21 + 100.64.73.21 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.137 + 100.64.77.137 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659392766 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efa423f0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392766 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efa423f0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392766 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efa423f0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392766 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efa423f0-11e8-11ed-97d5-3360f7274b74 + + + diff --git a/graph/incidents_graphml/e/efa7fcf0-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/e/efa7fcf0-7588-11ee-8bdd-0135165fdaaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..221df94e84d44a45ba2c7acdce19f99d3836b6ff --- /dev/null +++ b/graph/incidents_graphml/e/efa7fcf0-7588-11ee-8bdd-0135165fdaaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.97 + 100.64.13.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698494149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + efa7fcf0-7588-11ee-8bdd-0135165fdaaa + + + diff --git a/graph/incidents_graphml/e/efaeb240-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/e/efaeb240-230b-11ee-b0f8-a7fcea0862f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f497bb3b6c4edac353f49d47d0f9ea0e10852b0 --- /dev/null +++ b/graph/incidents_graphml/e/efaeb240-230b-11ee-b0f8-a7fcea0862f2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.19 + 100.64.9.19 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689424466 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + efaeb240-230b-11ee-b0f8-a7fcea0862f2 + + + diff --git a/graph/incidents_graphml/e/efb89ec0-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/e/efb89ec0-7588-11ee-8bdd-0135165fdaaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b65562946033744462ceaed0728b5a5f5394aafc --- /dev/null +++ b/graph/incidents_graphml/e/efb89ec0-7588-11ee-8bdd-0135165fdaaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.97 + 100.64.13.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698494149 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + efb89ec0-7588-11ee-8bdd-0135165fdaaa + + + diff --git a/graph/incidents_graphml/e/efbd0d40-2d97-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/efbd0d40-2d97-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c35b28a6e272af42e2a00e6ea156582298430b8 --- /dev/null +++ b/graph/incidents_graphml/e/efbd0d40-2d97-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.252 + 100.64.52.252 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.244 + 100.64.8.244 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690584108 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + efbd0d40-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584108 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + efbd0d40-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584108 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + efbd0d40-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584108 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + efbd0d40-2d97-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/e/efcade40-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/e/efcade40-0fae-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..692bbbefeaaa6775bafadf6bc68054899ec2663f --- /dev/null +++ b/graph/incidents_graphml/e/efcade40-0fae-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.231 + USER-0015-1934.example.internal + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687295451 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + efcade40-0fae-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/e/efd01ee0-2dd6-11ef-a033-7190c885d3e4.graphml b/graph/incidents_graphml/e/efd01ee0-2dd6-11ef-a033-7190c885d3e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3420a2903db8d69e94f2dfd05d8ae4ad330940f6 --- /dev/null +++ b/graph/incidents_graphml/e/efd01ee0-2dd6-11ef-a033-7190c885d3e4.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.243 + 100.64.50.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.120 + 100.64.8.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.131 + 100.64.62.131 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.37 + USER-0015-1466.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.111 + 100.64.65.111 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.30 + 100.64.7.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.232 + 100.64.43.232 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.112 + 100.64.65.112 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + INCIDENT_LINK + 1718758664 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efd01ee0-2dd6-11ef-a033-7190c885d3e4 + + + diff --git a/graph/incidents_graphml/e/efd6dc10-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/e/efd6dc10-452b-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcf5baccb9605971990102fb4c8d3039b46b50f2 --- /dev/null +++ b/graph/incidents_graphml/e/efd6dc10-452b-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.125 + 100.64.12.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176550 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + efd6dc10-452b-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/e/efd8d700-28d3-11ee-97fa-5dcf6851b43e.graphml b/graph/incidents_graphml/e/efd8d700-28d3-11ee-97fa-5dcf6851b43e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d73c1019958691ef98c44193fbc7dc5adca13bba --- /dev/null +++ b/graph/incidents_graphml/e/efd8d700-28d3-11ee-97fa-5dcf6851b43e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.92 + 100.64.85.92 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690060122 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + efd8d700-28d3-11ee-97fa-5dcf6851b43e + + + diff --git a/graph/incidents_graphml/e/efdcb2c0-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/e/efdcb2c0-6317-11ee-bf7a-9334ddba6edc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d179cfb655c0d4fc27a5d787f6093ca575119db --- /dev/null +++ b/graph/incidents_graphml/e/efdcb2c0-6317-11ee-bf7a-9334ddba6edc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.217 + 100.64.88.217 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696466495 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + efdcb2c0-6317-11ee-bf7a-9334ddba6edc + + + diff --git a/graph/incidents_graphml/e/efe4aaa0-42ad-11ee-912e-5fdb65c11aab.graphml b/graph/incidents_graphml/e/efe4aaa0-42ad-11ee-912e-5fdb65c11aab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ea9919458847c7f977866fe531229000ffa2718 --- /dev/null +++ b/graph/incidents_graphml/e/efe4aaa0-42ad-11ee-912e-5fdb65c11aab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.174 + 100.64.21.174 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692902531 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + efe4aaa0-42ad-11ee-912e-5fdb65c11aab + + + diff --git a/graph/incidents_graphml/e/efe55610-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/e/efe55610-9c29-11ed-a223-eb3483e385f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cea517764cf822c3a4ca6abcce176c17d995a9a4 --- /dev/null +++ b/graph/incidents_graphml/e/efe55610-9c29-11ed-a223-eb3483e385f1.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.146 + 100.64.72.146 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.147 + 100.64.72.147 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.148 + 100.64.72.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.149 + 100.64.72.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1674593945 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efe55610-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593945 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efe55610-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593945 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efe55610-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593945 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efe55610-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593945 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efe55610-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593945 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efe55610-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593945 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efe55610-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593945 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efe55610-9c29-11ed-a223-eb3483e385f1 + + + diff --git a/graph/incidents_graphml/e/efe55b00-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/e/efe55b00-452b-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fd7998d8d6b52f1798a2cccf37693ef7a2e3895 --- /dev/null +++ b/graph/incidents_graphml/e/efe55b00-452b-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.63 + 100.64.38.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176550 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + efe55b00-452b-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/e/efee1db0-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/e/efee1db0-0fae-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b543445f82a961e1944aa0e4a2b7ef0b922fa8bd --- /dev/null +++ b/graph/incidents_graphml/e/efee1db0-0fae-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.232 + 100.64.82.232 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687295452 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + efee1db0-0fae-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/e/efef7770-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/e/efef7770-6317-11ee-bf7a-9334ddba6edc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4659b806797a51f7db972f70559b19582c4be51 --- /dev/null +++ b/graph/incidents_graphml/e/efef7770-6317-11ee-bf7a-9334ddba6edc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.217 + 100.64.88.217 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696466495 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + efef7770-6317-11ee-bf7a-9334ddba6edc + + + diff --git a/graph/incidents_graphml/e/eff40020-28d3-11ee-97fa-5dcf6851b43e.graphml b/graph/incidents_graphml/e/eff40020-28d3-11ee-97fa-5dcf6851b43e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbfe621e2a23ea57fd54f676e3cdb38ddaf7e3af --- /dev/null +++ b/graph/incidents_graphml/e/eff40020-28d3-11ee-97fa-5dcf6851b43e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.90.184 + 172.25.90.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.97 + 100.64.85.97 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.98 + 100.64.85.98 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690060122 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eff40020-28d3-11ee-97fa-5dcf6851b43e + + + INCIDENT_LINK + 1690060122 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eff40020-28d3-11ee-97fa-5dcf6851b43e + + + INCIDENT_LINK + 1690060122 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eff40020-28d3-11ee-97fa-5dcf6851b43e + + + INCIDENT_LINK + 1690060122 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + eff40020-28d3-11ee-97fa-5dcf6851b43e + + + diff --git a/graph/incidents_graphml/e/eff4f070-a7f0-11ed-af31-070b715d9bbb.graphml b/graph/incidents_graphml/e/eff4f070-a7f0-11ed-af31-070b715d9bbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dec8389f4a90194bb6fbd2997d4b4ade601c8408 --- /dev/null +++ b/graph/incidents_graphml/e/eff4f070-a7f0-11ed-af31-070b715d9bbb.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.28.113.148 + 172.28.113.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.1.8 + 100.64.1.8 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.238 + 100.64.87.238 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.170 + 100.64.86.170 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.239 + 100.64.87.239 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.240 + 100.64.87.240 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.241 + 100.64.87.241 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.242 + 100.64.87.242 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + eff4f070-a7f0-11ed-af31-070b715d9bbb + + + diff --git a/graph/incidents_graphml/e/eff51270-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/e/eff51270-452b-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00e8e8fd68b24cd701f3005f5c2b7b9eb5b6d648 --- /dev/null +++ b/graph/incidents_graphml/e/eff51270-452b-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.63 + 100.64.38.63 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176550 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + eff51270-452b-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/f/f0017060-5061-11ee-a936-57e582280eb3.graphml b/graph/incidents_graphml/f/f0017060-5061-11ee-a936-57e582280eb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b5bdfe2748ef467f3a2b559aaad8c345bd8b1d9 --- /dev/null +++ b/graph/incidents_graphml/f/f0017060-5061-11ee-a936-57e582280eb3.graphml @@ -0,0 +1,287 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.91 + 100.64.23.91 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.92 + 100.64.23.92 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.93 + USER-0015-1240.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.94 + 100.64.23.94 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.95 + 100.64.23.95 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.96 + 100.64.23.96 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.29 + 100.64.8.29 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.56 + 100.64.9.56 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409206 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0017060-5061-11ee-a936-57e582280eb3 + + + diff --git a/graph/incidents_graphml/f/f0042540-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/f/f0042540-230b-11ee-b0f8-a7fcea0862f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8df9753673c4f01614c107e0e785659ad07a17b1 --- /dev/null +++ b/graph/incidents_graphml/f/f0042540-230b-11ee-b0f8-a7fcea0862f2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.231 + 100.64.45.231 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689424467 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0042540-230b-11ee-b0f8-a7fcea0862f2 + + + diff --git a/graph/incidents_graphml/f/f0044070-3fac-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/f/f0044070-3fac-11ef-931a-1d289e4afac0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5169738e987c2d835cf96b2466d0564cdeb6a39e --- /dev/null +++ b/graph/incidents_graphml/f/f0044070-3fac-11ef-931a-1d289e4afac0.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.10.155 + 172.27.10.155 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.90.115 + 100.64.90.115 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.147 + 100.64.86.147 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720719746 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0044070-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719746 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0044070-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719746 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0044070-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719746 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0044070-3fac-11ef-931a-1d289e4afac0 + + + diff --git a/graph/incidents_graphml/f/f00d1760-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f00d1760-0fae-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27daaf8ec2a67efbee7ae4528ff01860b850801a --- /dev/null +++ b/graph/incidents_graphml/f/f00d1760-0fae-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.232 + 100.64.82.232 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687295452 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f00d1760-0fae-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/f01f01b0-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f01f01b0-7588-11ee-8bdd-0135165fdaaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ca4b563770e0a54aac6e1e2e3f3f7ab1bd41da6 --- /dev/null +++ b/graph/incidents_graphml/f/f01f01b0-7588-11ee-8bdd-0135165fdaaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.99 + 100.64.13.99 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698494150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f01f01b0-7588-11ee-8bdd-0135165fdaaa + + + diff --git a/graph/incidents_graphml/f/f027d9e0-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/f/f027d9e0-230b-11ee-b0f8-a7fcea0862f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2e163bbebbd0ee76127d9915ec071f720ec7a14 --- /dev/null +++ b/graph/incidents_graphml/f/f027d9e0-230b-11ee-b0f8-a7fcea0862f2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.231 + 100.64.45.231 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689424467 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f027d9e0-230b-11ee-b0f8-a7fcea0862f2 + + + diff --git a/graph/incidents_graphml/f/f029ff20-9cf8-11ed-8fd7-753be03cabc2.graphml b/graph/incidents_graphml/f/f029ff20-9cf8-11ed-8fd7-753be03cabc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88d47ae8f6998caf84e8c3f4825b746dda896b46 --- /dev/null +++ b/graph/incidents_graphml/f/f029ff20-9cf8-11ed-8fd7-753be03cabc2.graphml @@ -0,0 +1,767 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + CRED + CRED-0013 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + HOST + 100.64.97.61 + 100.64.97.61 + ["Exploiting Host"] + 0.8576171875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.62 + 100.64.97.62 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.905078125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.31.204 + 100.64.31.204 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.63 + 100.64.97.63 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.97.64 + 100.64.97.64 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + CRED + CRED-0013 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + CRED + CRED-0015 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + HOST + 100.64.21.22 + 100.64.21.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.80.58 + 100.64.80.58 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + CRED + CRED-0013 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + HOST + 100.64.97.65 + 100.64.97.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + CRED + CRED-0013 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + CRED + CRED-0013 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + CRED + CRED-0013 + ["Suspicious User"] + 0.325 + ["Barracuda WAF"] + + + CRED + CRED-0016 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + HOST + 100.64.38.73 + 100.64.38.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.81.253 + 100.64.81.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.84.239 + 100.64.84.239 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + CRED + CRED-0013 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + CRED + CRED-0013 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + HOST + 100.64.97.66 + 100.64.97.66 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + INCIDENT_LINK + 1674682851 + malicious + 0.905078125 + 0.905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f029ff20-9cf8-11ed-8fd7-753be03cabc2 + + + diff --git a/graph/incidents_graphml/f/f02ff1a0-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f02ff1a0-7588-11ee-8bdd-0135165fdaaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ff9ec17aa95c851614a74a268ade8a8ab7a13a7 --- /dev/null +++ b/graph/incidents_graphml/f/f02ff1a0-7588-11ee-8bdd-0135165fdaaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.99 + 100.64.13.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698494150 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f02ff1a0-7588-11ee-8bdd-0135165fdaaa + + + diff --git a/graph/incidents_graphml/f/f035ca90-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f035ca90-0a07-11ee-9f50-eb86987e1788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a273c9450e98b4b6c6a7afec612582da40931fb --- /dev/null +++ b/graph/incidents_graphml/f/f035ca90-0a07-11ee-9f50-eb86987e1788.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.237 + 100.64.28.237 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.238 + HOST-5730 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.99 + 100.64.18.99 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.239 + 100.64.28.239 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.243 + 100.64.24.243 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.240 + 100.64.28.240 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.133 + 100.64.27.133 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.77 + USER-0015-1276.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.241 + 100.64.28.241 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.242 + 100.64.28.242 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.101 + 100.64.18.101 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.243 + 100.64.28.243 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.244 + 100.64.28.244 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.245 + 100.64.28.245 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f035ca90-0a07-11ee-9f50-eb86987e1788 + + + diff --git a/graph/incidents_graphml/f/f03854a0-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/f/f03854a0-4efd-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..589253caef033d2d2252e22532bbb59d4998f147 --- /dev/null +++ b/graph/incidents_graphml/f/f03854a0-4efd-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.83 + 100.64.6.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694256305 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f03854a0-4efd-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/f/f03d3810-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f03d3810-7588-11ee-8bdd-0135165fdaaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..415112613707e1a1211badfa973e0d2420df2221 --- /dev/null +++ b/graph/incidents_graphml/f/f03d3810-7588-11ee-8bdd-0135165fdaaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.101 + 100.64.13.101 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698494150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f03d3810-7588-11ee-8bdd-0135165fdaaa + + + diff --git a/graph/incidents_graphml/f/f0436fa0-95b3-11ee-a46e-7b17a4f6b26c.graphml b/graph/incidents_graphml/f/f0436fa0-95b3-11ee-a46e-7b17a4f6b26c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f07eda0a41f1a712a6532774b7c4ea7134ecce33 --- /dev/null +++ b/graph/incidents_graphml/f/f0436fa0-95b3-11ee-a46e-7b17a4f6b26c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.48 + 100.64.96.48 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1702031055 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0436fa0-95b3-11ee-a46e-7b17a4f6b26c + + + diff --git a/graph/incidents_graphml/f/f0491d80-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/f/f0491d80-4efd-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8fd9db05654040ebda2076e0d9462cd33ecd5856 --- /dev/null +++ b/graph/incidents_graphml/f/f0491d80-4efd-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.83 + 100.64.6.83 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694256306 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0491d80-4efd-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/f/f04e2800-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f04e2800-7588-11ee-8bdd-0135165fdaaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e691c57237f9ccc7164b8ca069fa18b8a76f72a --- /dev/null +++ b/graph/incidents_graphml/f/f04e2800-7588-11ee-8bdd-0135165fdaaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.101 + 100.64.13.101 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698494150 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f04e2800-7588-11ee-8bdd-0135165fdaaa + + + diff --git a/graph/incidents_graphml/f/f0542800-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f0542800-0a07-11ee-9f50-eb86987e1788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c847be261c3dd74ca93e3199aa8b50efae8e2cf --- /dev/null +++ b/graph/incidents_graphml/f/f0542800-0a07-11ee-9f50-eb86987e1788.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.1 + 100.64.29.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.2 + 100.64.29.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.3 + 100.64.29.3 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.4 + 100.64.29.4 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.5 + 100.64.29.5 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.61 + 100.64.12.61 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673970 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0542800-0a07-11ee-9f50-eb86987e1788 + + + diff --git a/graph/incidents_graphml/f/f056c320-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/f/f056c320-1f1b-11ee-9e2e-57c890ee02a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4c1958373394325d336366073f830ededff6fd5 --- /dev/null +++ b/graph/incidents_graphml/f/f056c320-1f1b-11ee-9e2e-57c890ee02a2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.71 + 100.64.47.71 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688991535 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f056c320-1f1b-11ee-9e2e-57c890ee02a2 + + + diff --git a/graph/incidents_graphml/f/f05bbc90-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f05bbc90-7588-11ee-8bdd-0135165fdaaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6dcf38017d57f9c7bc4ba0c6f9f1ad6d735cda55 --- /dev/null +++ b/graph/incidents_graphml/f/f05bbc90-7588-11ee-8bdd-0135165fdaaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.103 + 100.64.13.103 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698494150 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f05bbc90-7588-11ee-8bdd-0135165fdaaa + + + diff --git a/graph/incidents_graphml/f/f05bee80-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/f/f05bee80-9172-11ee-94be-75b251a8fc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c55f9e8a7fae878658799e7e20ae1f4daa7bb0b --- /dev/null +++ b/graph/incidents_graphml/f/f05bee80-9172-11ee-94be-75b251a8fc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.64 + 100.64.35.64 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701563334 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f05bee80-9172-11ee-94be-75b251a8fc8a + + + diff --git a/graph/incidents_graphml/f/f0607610-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/f/f0607610-230b-11ee-b0f8-a7fcea0862f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c60378cea866d1229447d3b3a767e4a6ada1fb7e --- /dev/null +++ b/graph/incidents_graphml/f/f0607610-230b-11ee-b0f8-a7fcea0862f2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.175 + 100.64.16.175 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689424468 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f0607610-230b-11ee-b0f8-a7fcea0862f2 + + + diff --git a/graph/incidents_graphml/f/f060c830-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f060c830-5b06-11ee-9ed7-8fb556fb8db7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7c8a65d4877e21cc7fafefa1f54d4482c6495c9 --- /dev/null +++ b/graph/incidents_graphml/f/f060c830-5b06-11ee-9ed7-8fb556fb8db7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.235 + 100.64.35.235 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695579585 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f060c830-5b06-11ee-9ed7-8fb556fb8db7 + + + diff --git a/graph/incidents_graphml/f/f0676620-dd4a-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/f/f0676620-dd4a-11ed-8595-d92cdedd1bfb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07dd7c304bbf13117b1813fbfef5c6656d4c059b --- /dev/null +++ b/graph/incidents_graphml/f/f0676620-dd4a-11ed-8595-d92cdedd1bfb.graphml @@ -0,0 +1,135 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host","Exploiting Target"] + 0.9915625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.235 + 100.64.72.235 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.236 + 100.64.72.236 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.218 + 100.64.71.218 + ["Exploiting Target","Exploiting Host"] + 0.859375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681754944 + malicious + 0.9915625 + 0.9915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0676620-dd4a-11ed-8595-d92cdedd1bfb + + + INCIDENT_LINK + 1681754944 + malicious + 0.9915625 + 0.9915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0676620-dd4a-11ed-8595-d92cdedd1bfb + + + INCIDENT_LINK + 1681754944 + malicious + 0.9915625 + 0.9915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0676620-dd4a-11ed-8595-d92cdedd1bfb + + + INCIDENT_LINK + 1681754944 + malicious + 0.9915625 + 0.9915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0676620-dd4a-11ed-8595-d92cdedd1bfb + + + INCIDENT_LINK + 1681754944 + malicious + 0.9915625 + 0.9915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0676620-dd4a-11ed-8595-d92cdedd1bfb + + + diff --git a/graph/incidents_graphml/f/f067b9f0-2efc-11ee-bea9-c5ecb1b621be.graphml b/graph/incidents_graphml/f/f067b9f0-2efc-11ee-bea9-c5ecb1b621be.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15bfc8ca2ef240bc2db1053a20b02df8fa377647 --- /dev/null +++ b/graph/incidents_graphml/f/f067b9f0-2efc-11ee-bea9-c5ecb1b621be.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.235 + 100.64.81.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690737439 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f067b9f0-2efc-11ee-bea9-c5ecb1b621be + + + diff --git a/graph/incidents_graphml/f/f06ad7c0-7588-11ee-8bdd-0135165fdaaa.graphml b/graph/incidents_graphml/f/f06ad7c0-7588-11ee-8bdd-0135165fdaaa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f842566f9d50822fd38d6316be476521be17af1b --- /dev/null +++ b/graph/incidents_graphml/f/f06ad7c0-7588-11ee-8bdd-0135165fdaaa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.103 + 100.64.13.103 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698494150 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f06ad7c0-7588-11ee-8bdd-0135165fdaaa + + + diff --git a/graph/incidents_graphml/f/f06b5ed0-435e-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/f/f06b5ed0-435e-11ef-9e66-fd84d5bf3736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7475c73ef1b3bda1d697f8905d63b1f754e56f5e --- /dev/null +++ b/graph/incidents_graphml/f/f06b5ed0-435e-11ef-9e66-fd84d5bf3736.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.65 + 100.64.28.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721126051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f06b5ed0-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f06b5ed0-435e-11ef-9e66-fd84d5bf3736 + + + diff --git a/graph/incidents_graphml/f/f06cde70-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/f/f06cde70-9172-11ee-94be-75b251a8fc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2375cc499072971155ee81763e6e799dbd1d6348 --- /dev/null +++ b/graph/incidents_graphml/f/f06cde70-9172-11ee-94be-75b251a8fc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.64 + 100.64.35.64 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701563334 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f06cde70-9172-11ee-94be-75b251a8fc8a + + + diff --git a/graph/incidents_graphml/f/f06d7260-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f06d7260-5b06-11ee-9ed7-8fb556fb8db7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a095b7fb6480912c38cee7825fa5162b945ae70 --- /dev/null +++ b/graph/incidents_graphml/f/f06d7260-5b06-11ee-9ed7-8fb556fb8db7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.10 + 100.64.16.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695579585 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f06d7260-5b06-11ee-9ed7-8fb556fb8db7 + + + diff --git a/graph/incidents_graphml/f/f072a280-2a32-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/f/f072a280-2a32-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5246471d3703599606368ba0d4c63fbf30c1a0a --- /dev/null +++ b/graph/incidents_graphml/f/f072a280-2a32-11ee-9959-8506340212c8.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.56.204 + 100.64.56.204 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.22.254 + 100.64.22.254 + ["Exploiting Host","Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690210876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f072a280-2a32-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f072a280-2a32-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f072a280-2a32-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f072a280-2a32-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/f/f07337b0-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/f07337b0-1068-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e59687da83cc33353cc880555df28d52a6c66dde --- /dev/null +++ b/graph/incidents_graphml/f/f07337b0-1068-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.227 + 100.64.15.227 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687375339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f07337b0-1068-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/f/f07a6ab0-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f07a6ab0-5b06-11ee-9ed7-8fb556fb8db7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4fa4b493ad492c0e8ffa856a4b4bfa661dd0da48 --- /dev/null +++ b/graph/incidents_graphml/f/f07a6ab0-5b06-11ee-9ed7-8fb556fb8db7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.10 + 100.64.16.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695579585 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f07a6ab0-5b06-11ee-9ed7-8fb556fb8db7 + + + diff --git a/graph/incidents_graphml/f/f07b6460-435e-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/f/f07b6460-435e-11ef-9e66-fd84d5bf3736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..617ce32fb98c13dd2f792e0123dc218d3bee87e7 --- /dev/null +++ b/graph/incidents_graphml/f/f07b6460-435e-11ef-9e66-fd84d5bf3736.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.67 + 100.64.28.67 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.68 + USER-0015-1269.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.69 + 100.64.28.69 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721126051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f07b6460-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f07b6460-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f07b6460-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f07b6460-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f07b6460-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f07b6460-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f07b6460-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f07b6460-435e-11ef-9e66-fd84d5bf3736 + + + diff --git a/graph/incidents_graphml/f/f07ca980-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/f07ca980-04ca-11ed-ab4e-45e26abbd382.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c65b39d987757d06496d7e1bf03966de73652c02 --- /dev/null +++ b/graph/incidents_graphml/f/f07ca980-04ca-11ed-ab4e-45e26abbd382.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.54 + 100.64.79.54 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657950518 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f07ca980-04ca-11ed-ab4e-45e26abbd382 + + + INCIDENT_LINK + 1657950518 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f07ca980-04ca-11ed-ab4e-45e26abbd382 + + + diff --git a/graph/incidents_graphml/f/f07f13e0-0f7e-11ee-a9d1-514a3be7d931.graphml b/graph/incidents_graphml/f/f07f13e0-0f7e-11ee-a9d1-514a3be7d931.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7641c9a83dc9adea37e023671fe4b7304ad12597 --- /dev/null +++ b/graph/incidents_graphml/f/f07f13e0-0f7e-11ee-a9d1-514a3be7d931.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687274837 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f07f13e0-0f7e-11ee-a9d1-514a3be7d931 + + + diff --git a/graph/incidents_graphml/f/f092e360-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/f/f092e360-6317-11ee-bf7a-9334ddba6edc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c6f5258c5f0ffd326787827048a8f24ad812e3db --- /dev/null +++ b/graph/incidents_graphml/f/f092e360-6317-11ee-bf7a-9334ddba6edc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.88.219 + 100.64.88.219 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696466496 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f092e360-6317-11ee-bf7a-9334ddba6edc + + + diff --git a/graph/incidents_graphml/f/f0951bc0-4135-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/f/f0951bc0-4135-11ee-89c1-af7b5492d246.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db8c57622e63999830fe829abdfe94f0b6798a3f --- /dev/null +++ b/graph/incidents_graphml/f/f0951bc0-4135-11ee-89c1-af7b5492d246.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.120 + 100.64.16.120 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1692741042 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0951bc0-4135-11ee-89c1-af7b5492d246 + + + diff --git a/graph/incidents_graphml/f/f096f360-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f096f360-5b06-11ee-9ed7-8fb556fb8db7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..804960412e6d9fee4375c4800ce27d820127de95 --- /dev/null +++ b/graph/incidents_graphml/f/f096f360-5b06-11ee-9ed7-8fb556fb8db7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.182 + 100.64.41.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695579586 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f096f360-5b06-11ee-9ed7-8fb556fb8db7 + + + diff --git a/graph/incidents_graphml/f/f09798c0-eb97-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/f/f09798c0-eb97-11ee-8f3a-6b2412cfa52f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f7515c7e6907664f23addc719233944282967ca --- /dev/null +++ b/graph/incidents_graphml/f/f09798c0-eb97-11ee-8f3a-6b2412cfa52f.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.121.238.220 + 10.121.238.220 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","PAN NGFW","Vulnerability Management","Windows Active Directory"] + + + HOST + 100.64.70.26 + 100.64.70.26 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.27 + 100.64.70.27 + ["Exploiting Target"] + 0.578125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.28 + 100.64.70.28 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.29 + 100.64.70.29 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.30 + 100.64.70.30 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.31 + 100.64.70.31 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.154 + 100.64.69.154 + ["Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474830 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f09798c0-eb97-11ee-8f3a-6b2412cfa52f + + + diff --git a/graph/incidents_graphml/f/f0a4c450-0f7e-11ee-a9d1-514a3be7d931.graphml b/graph/incidents_graphml/f/f0a4c450-0f7e-11ee-a9d1-514a3be7d931.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cb8d24e04856e6626b0a5ba87e891f21dfbef89 --- /dev/null +++ b/graph/incidents_graphml/f/f0a4c450-0f7e-11ee-a9d1-514a3be7d931.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687274837 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f0a4c450-0f7e-11ee-a9d1-514a3be7d931 + + + diff --git a/graph/incidents_graphml/f/f0a56f70-4135-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/f/f0a56f70-4135-11ee-89c1-af7b5492d246.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ac6685fe956e8bc9ead99375aa5ce9a933c6973 --- /dev/null +++ b/graph/incidents_graphml/f/f0a56f70-4135-11ee-89c1-af7b5492d246.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.16.120 + 100.64.16.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692741042 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f0a56f70-4135-11ee-89c1-af7b5492d246 + + + diff --git a/graph/incidents_graphml/f/f0a59960-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0a59960-5b06-11ee-9ed7-8fb556fb8db7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..73be7cd92a718c6b8ec4bf611a18158b4cda0c85 --- /dev/null +++ b/graph/incidents_graphml/f/f0a59960-5b06-11ee-9ed7-8fb556fb8db7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.182 + 100.64.41.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695579586 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f0a59960-5b06-11ee-9ed7-8fb556fb8db7 + + + diff --git a/graph/incidents_graphml/f/f0a95b00-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f0a95b00-0cc7-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1fae7ffaffbfa15920a3c00b233debb892b298d3 --- /dev/null +++ b/graph/incidents_graphml/f/f0a95b00-0cc7-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.17 + USER-0015-1187.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686976337 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0a95b00-0cc7-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/f/f0a98f60-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f0a98f60-5b66-11ee-a387-a18350d70540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..406a1f65631b2810d81110fe654fddc517447731 --- /dev/null +++ b/graph/incidents_graphml/f/f0a98f60-5b66-11ee-a387-a18350d70540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.119 + 100.64.35.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695620817 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f0a98f60-5b66-11ee-a387-a18350d70540 + + + diff --git a/graph/incidents_graphml/f/f0aef110-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/f/f0aef110-59ba-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7a486f856fd819eecbd99cc842d13033d703081 --- /dev/null +++ b/graph/incidents_graphml/f/f0aef110-59ba-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.185 + 100.64.58.185 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695436993 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0aef110-59ba-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/f/f0b03d40-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f0b03d40-9268-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a057915ab21638c52ea4986e83b9c08325994645 --- /dev/null +++ b/graph/incidents_graphml/f/f0b03d40-9268-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.187 + 100.64.65.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701668990 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b03d40-9268-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/f/f0b291b0-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0b291b0-5b06-11ee-9ed7-8fb556fb8db7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9db987914a280cf3197d02a1d933c5baa0006e0a --- /dev/null +++ b/graph/incidents_graphml/f/f0b291b0-5b06-11ee-9ed7-8fb556fb8db7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.184 + 100.64.41.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695579586 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b291b0-5b06-11ee-9ed7-8fb556fb8db7 + + + diff --git a/graph/incidents_graphml/f/f0b4ab00-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f0b4ab00-2f61-11ef-b208-d10830cadc66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..733cb6b2934f10653e1125b0874ae5d97f00acf2 --- /dev/null +++ b/graph/incidents_graphml/f/f0b4ab00-2f61-11ef-b208-d10830cadc66.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.116.174 + USER-0015-2012.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.88.239 + 100.64.88.239 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.42.189 + USER-0015-1969.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.88.240 + 100.64.88.240 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.241 + 100.64.88.241 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.13 + 100.64.87.13 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.20.184.163 + USER-0015-2013.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.88.242 + 100.64.88.242 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.243 + 100.64.88.243 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928317 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0b4ab00-2f61-11ef-b208-d10830cadc66 + + + diff --git a/graph/incidents_graphml/f/f0bfff30-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0bfff30-5b06-11ee-9ed7-8fb556fb8db7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..724d96e4783a30346ffe7411323ec293f03811b3 --- /dev/null +++ b/graph/incidents_graphml/f/f0bfff30-5b06-11ee-9ed7-8fb556fb8db7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.184 + 100.64.41.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695579586 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f0bfff30-5b06-11ee-9ed7-8fb556fb8db7 + + + diff --git a/graph/incidents_graphml/f/f0c125f0-0f7e-11ee-a9d1-514a3be7d931.graphml b/graph/incidents_graphml/f/f0c125f0-0f7e-11ee-a9d1-514a3be7d931.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b25f83dd8579d60c45961ead9c7862a8b04728f4 --- /dev/null +++ b/graph/incidents_graphml/f/f0c125f0-0f7e-11ee-a9d1-514a3be7d931.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.128 + 100.64.28.128 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687274837 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0c125f0-0f7e-11ee-a9d1-514a3be7d931 + + + diff --git a/graph/incidents_graphml/f/f0cc0d20-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0cc0d20-5b06-11ee-9ed7-8fb556fb8db7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e1c2bb3e89bc00e7ef0a52fefb9e48b228493ed --- /dev/null +++ b/graph/incidents_graphml/f/f0cc0d20-5b06-11ee-9ed7-8fb556fb8db7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.186 + 100.64.41.186 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695579586 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0cc0d20-5b06-11ee-9ed7-8fb556fb8db7 + + + diff --git a/graph/incidents_graphml/f/f0cce250-23a1-11ee-b3c4-1b81ee59f0d7.graphml b/graph/incidents_graphml/f/f0cce250-23a1-11ee-b3c4-1b81ee59f0d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c12eb522cc755cd3a20c8847772540eaf22bc423 --- /dev/null +++ b/graph/incidents_graphml/f/f0cce250-23a1-11ee-b3c4-1b81ee59f0d7.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.41 + 100.64.69.41 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.42 + 100.64.69.42 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.43 + 100.64.69.43 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1689488893 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0cce250-23a1-11ee-b3c4-1b81ee59f0d7 + + + INCIDENT_LINK + 1689488893 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0cce250-23a1-11ee-b3c4-1b81ee59f0d7 + + + INCIDENT_LINK + 1689488893 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0cce250-23a1-11ee-b3c4-1b81ee59f0d7 + + + INCIDENT_LINK + 1689488893 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0cce250-23a1-11ee-b3c4-1b81ee59f0d7 + + + INCIDENT_LINK + 1689488893 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0cce250-23a1-11ee-b3c4-1b81ee59f0d7 + + + INCIDENT_LINK + 1689488893 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0cce250-23a1-11ee-b3c4-1b81ee59f0d7 + + + diff --git a/graph/incidents_graphml/f/f0ce5ff0-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/f/f0ce5ff0-59ba-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2137afced70f275cfc1afa26b9f19a169aff88d8 --- /dev/null +++ b/graph/incidents_graphml/f/f0ce5ff0-59ba-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.185 + 100.64.58.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695436993 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f0ce5ff0-59ba-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/f/f0d59120-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f0d59120-1911-11ed-9439-83188f456eb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..512c3f1227d6a6ace058cfc2335f44ec1ee2976e --- /dev/null +++ b/graph/incidents_graphml/f/f0d59120-1911-11ed-9439-83188f456eb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.78 + 100.64.78.78 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.222 + 100.64.71.222 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660180036 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0d59120-1911-11ed-9439-83188f456eb5 + + + diff --git a/graph/incidents_graphml/f/f0d8b750-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0d8b750-5b06-11ee-9ed7-8fb556fb8db7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..080f5d1cf7f59d9565e94a6f26786e291b543f47 --- /dev/null +++ b/graph/incidents_graphml/f/f0d8b750-5b06-11ee-9ed7-8fb556fb8db7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.186 + 100.64.41.186 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695579586 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f0d8b750-5b06-11ee-9ed7-8fb556fb8db7 + + + diff --git a/graph/incidents_graphml/f/f0dbf480-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/f/f0dbf480-59ba-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..402d747eeb8fd897e59f789401f3a929ef5554f7 --- /dev/null +++ b/graph/incidents_graphml/f/f0dbf480-59ba-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.187 + 100.64.58.187 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695436993 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0dbf480-59ba-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/f/f0e51360-5b06-11ee-9ed7-8fb556fb8db7.graphml b/graph/incidents_graphml/f/f0e51360-5b06-11ee-9ed7-8fb556fb8db7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c594f0e2e98f17c2fe6d3ae88223abaf90b21ac --- /dev/null +++ b/graph/incidents_graphml/f/f0e51360-5b06-11ee-9ed7-8fb556fb8db7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.188 + 100.64.41.188 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695579586 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0e51360-5b06-11ee-9ed7-8fb556fb8db7 + + + diff --git a/graph/incidents_graphml/f/f0e54890-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f0e54890-1911-11ed-9439-83188f456eb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29bf832471934d5118bf94877af5ed57e4fc7aea --- /dev/null +++ b/graph/incidents_graphml/f/f0e54890-1911-11ed-9439-83188f456eb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.222 + 100.64.71.222 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.78 + 100.64.78.78 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660180036 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f0e54890-1911-11ed-9439-83188f456eb5 + + + diff --git a/graph/incidents_graphml/f/f0f292a0-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/f/f0f292a0-6232-11ee-a972-e59ec7ee05b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ecc8a8eb2b77a0ddf84635bf37ed9ea6b34a765c --- /dev/null +++ b/graph/incidents_graphml/f/f0f292a0-6232-11ee-a972-e59ec7ee05b9.graphml @@ -0,0 +1,517 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.22 + 100.64.23.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.51 + 100.64.7.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.23 + 100.64.23.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.130 + 100.64.11.130 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.24 + 100.64.23.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.25 + 100.64.23.25 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.214 + 100.64.10.214 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.192 + 100.64.19.192 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.26 + 100.64.23.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.27 + 100.64.23.27 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.28 + 100.64.23.28 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + INCIDENT_LINK + 1696368142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f0f292a0-6232-11ee-a972-e59ec7ee05b9 + + + diff --git a/graph/incidents_graphml/f/f0f29770-1145-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f0f29770-1145-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc965fe697f973077f94ff045f09a4c2c0f1cf37 --- /dev/null +++ b/graph/incidents_graphml/f/f0f29770-1145-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.37 + 100.64.83.37 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.212 + 100.64.72.212 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687470258 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0f29770-1145-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687470258 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0f29770-1145-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/f0f48590-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/f/f0f48590-59ba-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2b4eecfb8499ea2498959c0c3a39e460f994bec --- /dev/null +++ b/graph/incidents_graphml/f/f0f48590-59ba-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.187 + 100.64.58.187 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695436993 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f0f48590-59ba-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/f/f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..252213bfeb6e82ee13b424c47517fe749023e305 --- /dev/null +++ b/graph/incidents_graphml/f/f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.95.61.142 + 10.95.61.142 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.37 + 100.64.79.37 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.38 + 100.64.79.38 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.39 + 100.64.79.39 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687621012 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621012 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621012 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621012 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621012 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621012 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f0fb1f70-12a4-11ee-ab1f-2bdb6669e8cc + + + diff --git a/graph/incidents_graphml/f/f101fbf0-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/f/f101fbf0-6232-11ee-a972-e59ec7ee05b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18439e6fa5f19409cb22e7414feb2c18883c897f --- /dev/null +++ b/graph/incidents_graphml/f/f101fbf0-6232-11ee-a972-e59ec7ee05b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.22 + 100.64.23.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696368142 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f101fbf0-6232-11ee-a972-e59ec7ee05b9 + + + diff --git a/graph/incidents_graphml/f/f106e2c0-1145-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f106e2c0-1145-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbb046ddb1bff2d208360f47a79ff83366781f24 --- /dev/null +++ b/graph/incidents_graphml/f/f106e2c0-1145-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.20 + 100.64.43.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.245 + 100.64.70.245 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687470259 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f106e2c0-1145-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687470259 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f106e2c0-1145-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/f109e250-59ba-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/f/f109e250-59ba-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac2622051b656ae5d53551abca71cf587ac488ca --- /dev/null +++ b/graph/incidents_graphml/f/f109e250-59ba-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.150 + 100.64.43.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695436993 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f109e250-59ba-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/f/f10c7270-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/f/f10c7270-1228-11ed-99ed-adca11e4059c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab22fd9d45c81cf70931102f19e5335ffe2a7bdb --- /dev/null +++ b/graph/incidents_graphml/f/f10c7270-1228-11ed-99ed-adca11e4059c.graphml @@ -0,0 +1,894 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.205 + 100.64.78.205 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.37 + 100.64.89.37 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.102 + 100.64.16.102 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.241 + 100.64.23.241 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.38 + 100.64.89.38 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.39 + 100.64.89.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.40 + 100.64.89.40 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.89.41 + 100.64.89.41 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.42 + 100.64.89.42 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + CRED + CRED-0014 + ["Suspicious User"] + 0.25 + ["Windows Active Directory"] + + + HOST + 10.190.96.179 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Barracuda WAF","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.71.178 + 100.64.71.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.83 + 100.64.17.83 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.43 + 100.64.89.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.44 + 100.64.89.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.37 + 100.64.14.37 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.219 + 100.64.14.219 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.45 + 100.64.89.45 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + f10c7270-1228-11ed-99ed-adca11e4059c + + + diff --git a/graph/incidents_graphml/f/f10e9550-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/f/f10e9550-1228-11ed-99ed-adca11e4059c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..049bbfac59e7d14a605ccbb7c7cba96d06257612 --- /dev/null +++ b/graph/incidents_graphml/f/f10e9550-1228-11ed-99ed-adca11e4059c.graphml @@ -0,0 +1,793 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.49.167 + 100.64.49.167 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.87 + 100.64.89.87 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.40 + 100.64.89.40 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.88 + 100.64.89.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.89 + 100.64.89.89 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.202 + 100.64.6.202 + ["Exploiting Host","Exploiting Target"] + 0.983125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.78.205 + 100.64.78.205 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.90 + 100.64.89.90 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.91 + 100.64.89.91 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.92 + 100.64.89.92 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.157 + 100.64.23.157 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.93 + 100.64.89.93 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.89.94 + 100.64.89.94 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.95 + 100.64.89.95 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.31.52 + 100.64.31.52 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.22.62 + 100.64.22.62 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.96 + 100.64.89.96 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.37.23 + 100.64.37.23 + ["Exploiting Host"] + 0.8875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.97 + 100.64.89.97 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + INCIDENT_LINK + 1659420257 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f10e9550-1228-11ed-99ed-adca11e4059c + + + diff --git a/graph/incidents_graphml/f/f112c620-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/f112c620-12a4-11ee-ab1f-2bdb6669e8cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfeb8f180728feeb3be8d3734a53a923a5be91a4 --- /dev/null +++ b/graph/incidents_graphml/f/f112c620-12a4-11ee-ab1f-2bdb6669e8cc.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.161 + 100.64.72.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.86 + 100.64.74.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.23.123 + 100.64.23.123 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687621012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f112c620-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f112c620-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f112c620-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f112c620-12a4-11ee-ab1f-2bdb6669e8cc + + + diff --git a/graph/incidents_graphml/f/f11814c0-3c0e-11ee-96ec-5323ee82cf36.graphml b/graph/incidents_graphml/f/f11814c0-3c0e-11ee-96ec-5323ee82cf36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc0077c667c0effe8eab3368f7cee98d82ae5b6c --- /dev/null +++ b/graph/incidents_graphml/f/f11814c0-3c0e-11ee-96ec-5323ee82cf36.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.196 + 100.64.68.196 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.197 + 100.64.68.197 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692174536 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f11814c0-3c0e-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692174536 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f11814c0-3c0e-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692174536 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f11814c0-3c0e-11ee-96ec-5323ee82cf36 + + + INCIDENT_LINK + 1692174536 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f11814c0-3c0e-11ee-96ec-5323ee82cf36 + + + diff --git a/graph/incidents_graphml/f/f11c7cb0-07d1-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/f/f11c7cb0-07d1-11ef-8107-af8140eb4c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..962a3994b003c41cf085d4288494d950cb4dddfe --- /dev/null +++ b/graph/incidents_graphml/f/f11c7cb0-07d1-11ef-8107-af8140eb4c5b.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.194.105 + 172.24.194.105 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.87.2 + 100.64.87.2 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.3 + 100.64.87.3 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.4 + 100.64.87.4 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714578374 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f11c7cb0-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578374 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f11c7cb0-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578374 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f11c7cb0-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578374 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f11c7cb0-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578374 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f11c7cb0-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578374 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f11c7cb0-07d1-11ef-8107-af8140eb4c5b + + + diff --git a/graph/incidents_graphml/f/f1244320-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f1244320-06ef-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7f3a2a148feeca20da382acd2b8adabb86d9c3f --- /dev/null +++ b/graph/incidents_graphml/f/f1244320-06ef-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686333810 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1244320-06ef-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/f/f129e770-15a0-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/f/f129e770-15a0-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..464a4fedb68e37ddb2e8f938d7c1681243bd869d --- /dev/null +++ b/graph/incidents_graphml/f/f129e770-15a0-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.160 + 100.64.72.160 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.231 + 100.64.73.231 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687949148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f129e770-15a0-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687949148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f129e770-15a0-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/f/f12ec290-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/f/f12ec290-4efd-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e92b65fe99d098dfce296bff710f9ac78da3401d --- /dev/null +++ b/graph/incidents_graphml/f/f12ec290-4efd-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.199 + 100.64.24.199 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694256307 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f12ec290-4efd-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/f/f1316d50-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/f/f1316d50-6317-11ee-bf7a-9334ddba6edc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a1eababb2b6237617ed9233b16523d5a6a5e68f --- /dev/null +++ b/graph/incidents_graphml/f/f1316d50-6317-11ee-bf7a-9334ddba6edc.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.36.31 + 100.64.36.31 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696466497 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1316d50-6317-11ee-bf7a-9334ddba6edc + + + INCIDENT_LINK + 1696466497 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1316d50-6317-11ee-bf7a-9334ddba6edc + + + diff --git a/graph/incidents_graphml/f/f132c500-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/f/f132c500-274f-11ee-9ae4-f7600c9ae4b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96ff502f68f904a09256d8d86349a95d6322fbed --- /dev/null +++ b/graph/incidents_graphml/f/f132c500-274f-11ee-9ae4-f7600c9ae4b6.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.81 + USER-0015-1452.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.82 + 100.64.63.82 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.239 + 100.64.15.239 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.121 + 100.64.8.121 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.2 + 100.64.8.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.67 + 100.64.20.67 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.116 + 100.64.48.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893479 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f132c500-274f-11ee-9ae4-f7600c9ae4b6 + + + diff --git a/graph/incidents_graphml/f/f1359540-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1359540-367c-11ef-9a96-43590930a20f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f4bbb6ac6459c495edca2de56a2994433115b7c --- /dev/null +++ b/graph/incidents_graphml/f/f1359540-367c-11ef-9a96-43590930a20f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.34 + USER-0015-1950.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.253.225.145 + 10.253.225.145 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1719709572 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1359540-367c-11ef-9a96-43590930a20f + + + diff --git a/graph/incidents_graphml/f/f13c64c0-3d5b-11ef-86a6-4db713805853.graphml b/graph/incidents_graphml/f/f13c64c0-3d5b-11ef-86a6-4db713805853.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24cea835bbc2d48ae4a3d389fe86b96489500a2f --- /dev/null +++ b/graph/incidents_graphml/f/f13c64c0-3d5b-11ef-86a6-4db713805853.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.214 + USER-0015-1218.example.internal + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.184 + 100.64.42.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720465057 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f13c64c0-3d5b-11ef-86a6-4db713805853 + + + INCIDENT_LINK + 1720465057 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f13c64c0-3d5b-11ef-86a6-4db713805853 + + + INCIDENT_LINK + 1720465057 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f13c64c0-3d5b-11ef-86a6-4db713805853 + + + INCIDENT_LINK + 1720465057 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f13c64c0-3d5b-11ef-86a6-4db713805853 + + + diff --git a/graph/incidents_graphml/f/f13d4860-15a0-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/f/f13d4860-15a0-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ae578b6b7b93c80343cf1aa7bf9e8cfcadd7347 --- /dev/null +++ b/graph/incidents_graphml/f/f13d4860-15a0-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.232 + 100.64.73.232 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.51 + 100.64.1.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687949148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f13d4860-15a0-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687949148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f13d4860-15a0-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/f/f13da0f0-2d7b-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/f/f13da0f0-2d7b-11ef-88d9-1fb9581a602f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04314763473c4e6ffed70bd650cf29ef86e1457b --- /dev/null +++ b/graph/incidents_graphml/f/f13da0f0-2d7b-11ef-88d9-1fb9581a602f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.194 + 100.64.93.194 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.10.213 + 172.29.10.213 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + INCIDENT_LINK + 1718719582 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f13da0f0-2d7b-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719582 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f13da0f0-2d7b-11ef-88d9-1fb9581a602f + + + diff --git a/graph/incidents_graphml/f/f13f4530-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f13f4530-06ef-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0dd7ffdbb06ee5d13fb86489406137e768aec26a --- /dev/null +++ b/graph/incidents_graphml/f/f13f4530-06ef-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686333811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f13f4530-06ef-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/f/f1431a60-2d7e-11ee-b431-c96f4a8a8f7e.graphml b/graph/incidents_graphml/f/f1431a60-2d7e-11ee-b431-c96f4a8a8f7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87181e1ed414fb71171fe469e61ab51bef0416d8 --- /dev/null +++ b/graph/incidents_graphml/f/f1431a60-2d7e-11ee-b431-c96f4a8a8f7e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.183 + 100.64.23.183 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.85 + 100.64.73.85 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690573373 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1431a60-2d7e-11ee-b431-c96f4a8a8f7e + + + diff --git a/graph/incidents_graphml/f/f146f230-b4f1-11ed-9d28-d755eb33fc3e.graphml b/graph/incidents_graphml/f/f146f230-b4f1-11ed-9d28-d755eb33fc3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..282d771109ce670888e5967d3f6fde218fd44542 --- /dev/null +++ b/graph/incidents_graphml/f/f146f230-b4f1-11ed-9d28-d755eb33fc3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677318674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f146f230-b4f1-11ed-9d28-d755eb33fc3e + + + diff --git a/graph/incidents_graphml/f/f14b37f0-b4f1-11ed-9d28-d755eb33fc3e.graphml b/graph/incidents_graphml/f/f14b37f0-b4f1-11ed-9d28-d755eb33fc3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..47931a709eceba0a7182f79ba1034167db241c46 --- /dev/null +++ b/graph/incidents_graphml/f/f14b37f0-b4f1-11ed-9d28-d755eb33fc3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677318674 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f14b37f0-b4f1-11ed-9d28-d755eb33fc3e + + + diff --git a/graph/incidents_graphml/f/f14bb550-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f14bb550-367c-11ef-9a96-43590930a20f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18e3f417373fe6915fd5a7dc7c3ec859041fef04 --- /dev/null +++ b/graph/incidents_graphml/f/f14bb550-367c-11ef-9a96-43590930a20f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.253.225.145 + 10.253.225.145 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.59.34 + USER-0015-1950.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1719709572 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f14bb550-367c-11ef-9a96-43590930a20f + + + diff --git a/graph/incidents_graphml/f/f14bcab0-5061-11ee-a936-57e582280eb3.graphml b/graph/incidents_graphml/f/f14bcab0-5061-11ee-a936-57e582280eb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6653e36590de5a12d86c335ecbb7160e8787763 --- /dev/null +++ b/graph/incidents_graphml/f/f14bcab0-5061-11ee-a936-57e582280eb3.graphml @@ -0,0 +1,801 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.94 + 100.64.23.94 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.103 + 100.64.23.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.104 + USER-0015-1241.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.105 + 100.64.23.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.106 + 100.64.23.106 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.107 + 100.64.23.107 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.108 + 100.64.23.108 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.42 + 100.64.13.42 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.109 + 100.64.23.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.84 + 100.64.14.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.110 + 100.64.23.110 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + INCIDENT_LINK + 1694409208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f14bcab0-5061-11ee-a936-57e582280eb3 + + + diff --git a/graph/incidents_graphml/f/f150f090-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/f/f150f090-230b-11ee-b0f8-a7fcea0862f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ccc8ee60b63cf71f422f4e522f8ed612aacba196 --- /dev/null +++ b/graph/incidents_graphml/f/f150f090-230b-11ee-b0f8-a7fcea0862f2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.233 + USER-0015-1355.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689424469 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f150f090-230b-11ee-b0f8-a7fcea0862f2 + + + diff --git a/graph/incidents_graphml/f/f151bac0-15a0-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/f/f151bac0-15a0-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d543f4f8de62332171580c9f035e6d8f83ce48a --- /dev/null +++ b/graph/incidents_graphml/f/f151bac0-15a0-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.219 + 100.64.13.219 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687949148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f151bac0-15a0-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687949148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f151bac0-15a0-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/f/f15290a0-594c-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/f/f15290a0-594c-11ed-aecd-b7c09b1a67fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7792d3be03ea0f90cea0c1367b212f8ec8b001d0 --- /dev/null +++ b/graph/incidents_graphml/f/f15290a0-594c-11ed-aecd-b7c09b1a67fb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.69 + 100.64.23.69 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.80 + 100.64.71.80 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1667242251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f15290a0-594c-11ed-aecd-b7c09b1a67fb + + + INCIDENT_LINK + 1667242251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f15290a0-594c-11ed-aecd-b7c09b1a67fb + + + diff --git a/graph/incidents_graphml/f/f1585fb0-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f1585fb0-0cc7-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d53a723b7ffbb79f6b0d9d6d3b05047539bbbb6 --- /dev/null +++ b/graph/incidents_graphml/f/f1585fb0-0cc7-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,511 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.19 + 100.64.8.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.20 + USER-0015-1188.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.21 + 100.64.8.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.22 + 100.64.8.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.23 + 100.64.8.23 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.24 + 100.64.8.24 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.25 + 100.64.8.25 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.26 + 100.64.8.26 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.27 + 100.64.8.27 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.28 + 100.64.8.28 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.29 + 100.64.8.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1585fb0-0cc7-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/f/f15f1640-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f15f1640-367c-11ef-9a96-43590930a20f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..960e12c80968809b70a638cee944e97724cb1764 --- /dev/null +++ b/graph/incidents_graphml/f/f15f1640-367c-11ef-9a96-43590930a20f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.253.225.145 + 10.253.225.145 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.46.24 + 100.64.46.24 + ["Exploiting Target"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1719709572 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f15f1640-367c-11ef-9a96-43590930a20f + + + diff --git a/graph/incidents_graphml/f/f167c450-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/f/f167c450-6861-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..740c8811bab00ab1cf94fc5ef02ee7cc8084bd7c --- /dev/null +++ b/graph/incidents_graphml/f/f167c450-6861-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.163 + 100.64.15.163 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697048036 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f167c450-6861-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/f/f175e610-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f175e610-452b-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c42d6eb41167b656e1d72dcc4dd0927d3d0d8a25 --- /dev/null +++ b/graph/incidents_graphml/f/f175e610-452b-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176553 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f175e610-452b-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/f/f176df80-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/f/f176df80-6861-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0ce36f339009344f4f312ccf7e10a5dce85e43f --- /dev/null +++ b/graph/incidents_graphml/f/f176df80-6861-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.229 + 100.64.53.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697048036 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f176df80-6861-11ee-864e-0fda06c5b459 + + + INCIDENT_LINK + 1697048036 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f176df80-6861-11ee-864e-0fda06c5b459 + + + INCIDENT_LINK + 1697048036 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f176df80-6861-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/f/f17bcec0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f17bcec0-75d9-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9b9ced14cb7e2473d273e1ee310c5c3889e958c --- /dev/null +++ b/graph/incidents_graphml/f/f17bcec0-75d9-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.143 + 100.64.45.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698528941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f17bcec0-75d9-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f1856320-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f1856320-0cc7-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..770559f8fd431eb591a96c94ffd4fe479a71141f --- /dev/null +++ b/graph/incidents_graphml/f/f1856320-0cc7-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.45 + 100.64.8.45 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686976338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1856320-0cc7-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/f/f185d3a0-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/f/f185d3a0-6861-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48f1f6804e2bdc5d65b55b92ffe1a35186d60402 --- /dev/null +++ b/graph/incidents_graphml/f/f185d3a0-6861-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.229 + 100.64.53.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697048036 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f185d3a0-6861-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/f/f189f6d0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f189f6d0-367c-11ef-9a96-43590930a20f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0fd4065c142a12d117ff60118b68767f61fc116 --- /dev/null +++ b/graph/incidents_graphml/f/f189f6d0-367c-11ef-9a96-43590930a20f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.176 + 100.64.83.176 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.253.225.145 + 10.253.225.145 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1719709572 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f189f6d0-367c-11ef-9a96-43590930a20f + + + diff --git a/graph/incidents_graphml/f/f18e2900-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f18e2900-452b-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21925fa92c4753926b36303360c0d71a93983d90 --- /dev/null +++ b/graph/incidents_graphml/f/f18e2900-452b-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176553 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f18e2900-452b-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/f/f190b8b0-230b-11ee-b0f8-a7fcea0862f2.graphml b/graph/incidents_graphml/f/f190b8b0-230b-11ee-b0f8-a7fcea0862f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e664894f6666db2f90a8fa63a940fdedf313acce --- /dev/null +++ b/graph/incidents_graphml/f/f190b8b0-230b-11ee-b0f8-a7fcea0862f2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.233 + USER-0015-1355.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689424470 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f190b8b0-230b-11ee-b0f8-a7fcea0862f2 + + + diff --git a/graph/incidents_graphml/f/f193eaa0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f193eaa0-75d9-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..468f0b455f1b3fd005464ab1cd74a26f4952bc5d --- /dev/null +++ b/graph/incidents_graphml/f/f193eaa0-75d9-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.143 + 100.64.45.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698528941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f193eaa0-75d9-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f19515e0-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/f/f19515e0-6861-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c185789635330e78ea4222bf6a0276bd8f0eddb --- /dev/null +++ b/graph/incidents_graphml/f/f19515e0-6861-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.229 + 100.64.53.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697048036 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f19515e0-6861-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/f/f1992970-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/f/f1992970-9172-11ee-94be-75b251a8fc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..966df3358e3ec722549dcefd64852d329b82272f --- /dev/null +++ b/graph/incidents_graphml/f/f1992970-9172-11ee-94be-75b251a8fc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.66 + 100.64.35.66 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701563336 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f1992970-9172-11ee-94be-75b251a8fc8a + + + diff --git a/graph/incidents_graphml/f/f19ddec0-fd11-11ed-a4b5-cd7044d3b555.graphml b/graph/incidents_graphml/f/f19ddec0-fd11-11ed-a4b5-cd7044d3b555.graphml new file mode 100644 index 0000000000000000000000000000000000000000..590218beaced18d257be6070c1e8184a7ea380e8 --- /dev/null +++ b/graph/incidents_graphml/f/f19ddec0-fd11-11ed-a4b5-cd7044d3b555.graphml @@ -0,0 +1,811 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.142 + 100.64.41.142 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.19.191 + 100.64.19.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.16.36 + 100.64.16.36 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.143 + 100.64.41.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.28.193 + 100.64.28.193 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.144 + 100.64.41.144 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.187 + 100.64.13.187 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.41.145 + 100.64.41.145 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.146 + 100.64.41.146 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.147 + 100.64.41.147 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.96 + 100.64.38.96 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.148 + 100.64.41.148 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.85 + 100.64.36.85 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.149 + 100.64.41.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.150 + 100.64.41.150 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.170 + 100.64.14.170 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.151 + 100.64.41.151 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f19ddec0-fd11-11ed-a4b5-cd7044d3b555 + + + diff --git a/graph/incidents_graphml/f/f1a287e0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1a287e0-367c-11ef-9a96-43590930a20f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af7dd8d5d8a71b5eb3c8042d96af7ff8bad3e11a --- /dev/null +++ b/graph/incidents_graphml/f/f1a287e0-367c-11ef-9a96-43590930a20f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.253.225.145 + 10.253.225.145 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.176 + 100.64.83.176 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1719709573 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1a287e0-367c-11ef-9a96-43590930a20f + + + diff --git a/graph/incidents_graphml/f/f1a2e980-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f1a2e980-452b-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e43f55c36ac81487285329a2eab1c688e58d8183 --- /dev/null +++ b/graph/incidents_graphml/f/f1a2e980-452b-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176553 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f1a2e980-452b-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/f/f1a32450-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f1a32450-0cc7-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0a2899e808a9ddcd14cce600630cc66ee1c8c00 --- /dev/null +++ b/graph/incidents_graphml/f/f1a32450-0cc7-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.45 + 100.64.8.45 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686976338 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1a32450-0cc7-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/f/f1a50660-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f1a50660-5b66-11ee-a387-a18350d70540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72887352a9afa311e7293c7b2e52f1b1c61d9a36 --- /dev/null +++ b/graph/incidents_graphml/f/f1a50660-5b66-11ee-a387-a18350d70540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.121 + 100.64.35.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695620819 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1a50660-5b66-11ee-a387-a18350d70540 + + + diff --git a/graph/incidents_graphml/f/f1a599c0-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f1a599c0-9268-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb7a870333f8e3ec56c75d155c429e11db77722a --- /dev/null +++ b/graph/incidents_graphml/f/f1a599c0-9268-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.189 + 100.64.65.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701668992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1a599c0-9268-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/f/f1aca2c0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f1aca2c0-75d9-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4509c3de96e87f2c951a328683d8d9e3c79782b8 --- /dev/null +++ b/graph/incidents_graphml/f/f1aca2c0-75d9-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.145 + 100.64.45.145 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698528941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f1aca2c0-75d9-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f1b4bdd0-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f1b4bdd0-5b66-11ee-a387-a18350d70540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32b239a327fda81e02242389feee436da57b02fb --- /dev/null +++ b/graph/incidents_graphml/f/f1b4bdd0-5b66-11ee-a387-a18350d70540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.121 + 100.64.35.121 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695620819 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1b4bdd0-5b66-11ee-a387-a18350d70540 + + + diff --git a/graph/incidents_graphml/f/f1b60fe0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1b60fe0-367c-11ef-9a96-43590930a20f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60a95b6df8425406628af7a16e8403e129cb2756 --- /dev/null +++ b/graph/incidents_graphml/f/f1b60fe0-367c-11ef-9a96-43590930a20f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.177 + 100.64.83.177 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.253.225.145 + 10.253.225.145 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1719709573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1b60fe0-367c-11ef-9a96-43590930a20f + + + diff --git a/graph/incidents_graphml/f/f1b9a5d0-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f1b9a5d0-452b-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcdf3c2099891133e23b0feb3cc3b201aa253620 --- /dev/null +++ b/graph/incidents_graphml/f/f1b9a5d0-452b-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176553 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f1b9a5d0-452b-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/f/f1b9e930-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f1b9e930-75d9-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d30a44e86e314d2dfce91bc600a0191c95bc0e50 --- /dev/null +++ b/graph/incidents_graphml/f/f1b9e930-75d9-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.147 + 100.64.45.147 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698528941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1b9e930-75d9-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f1bb3fa0-fd59-11ec-a469-5997b7522014.graphml b/graph/incidents_graphml/f/f1bb3fa0-fd59-11ec-a469-5997b7522014.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f828d614358e9e3bfeef0075533a6376028d603 --- /dev/null +++ b/graph/incidents_graphml/f/f1bb3fa0-fd59-11ec-a469-5997b7522014.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.30 + 100.64.74.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.6.18 + 100.64.6.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657132329 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1bb3fa0-fd59-11ec-a469-5997b7522014 + + + INCIDENT_LINK + 1657132329 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1bb3fa0-fd59-11ec-a469-5997b7522014 + + + diff --git a/graph/incidents_graphml/f/f1bb7e80-9172-11ee-94be-75b251a8fc8a.graphml b/graph/incidents_graphml/f/f1bb7e80-9172-11ee-94be-75b251a8fc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0781dce69582e7649d50fcb445f2b6b3b5c11f78 --- /dev/null +++ b/graph/incidents_graphml/f/f1bb7e80-9172-11ee-94be-75b251a8fc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.68 + 100.64.35.68 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701563336 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1bb7e80-9172-11ee-94be-75b251a8fc8a + + + diff --git a/graph/incidents_graphml/f/f1bc8320-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1bc8320-1c9d-11ed-822a-cb7c4e632a4f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0525353665c12436924e2600d878873b4b5d71c --- /dev/null +++ b/graph/incidents_graphml/f/f1bc8320-1c9d-11ed-822a-cb7c4e632a4f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.45 + 100.64.76.45 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660570020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f1bc8320-1c9d-11ed-822a-cb7c4e632a4f + + + diff --git a/graph/incidents_graphml/f/f1bd1960-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f1bd1960-9268-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0133da1d05c47e57a87958ea6067c1db363937f2 --- /dev/null +++ b/graph/incidents_graphml/f/f1bd1960-9268-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.189 + 100.64.65.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701668992 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1bd1960-9268-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/f/f1bdb130-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f1bdb130-0cc7-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8c71c06dc92592db7f2477ff4d3da635f557854 --- /dev/null +++ b/graph/incidents_graphml/f/f1bdb130-0cc7-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.47 + 100.64.8.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686976339 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1bdb130-0cc7-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/f/f1be96e0-6861-11ee-864e-0fda06c5b459.graphml b/graph/incidents_graphml/f/f1be96e0-6861-11ee-864e-0fda06c5b459.graphml new file mode 100644 index 0000000000000000000000000000000000000000..883207c3ce0883b9697c010e0d870ce31facba55 --- /dev/null +++ b/graph/incidents_graphml/f/f1be96e0-6861-11ee-864e-0fda06c5b459.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.231 + 100.64.53.231 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697048037 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1be96e0-6861-11ee-864e-0fda06c5b459 + + + diff --git a/graph/incidents_graphml/f/f1c7fc00-fd11-11ed-a4b5-cd7044d3b555.graphml b/graph/incidents_graphml/f/f1c7fc00-fd11-11ed-a4b5-cd7044d3b555.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52f8b7b578c08b57e502a03119ea0bbc97dd483a --- /dev/null +++ b/graph/incidents_graphml/f/f1c7fc00-fd11-11ed-a4b5-cd7044d3b555.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685248903 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f1c7fc00-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248903 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f1c7fc00-fd11-11ed-a4b5-cd7044d3b555 + + + diff --git a/graph/incidents_graphml/f/f1cb6ca0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1cb6ca0-367c-11ef-9a96-43590930a20f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b1b7f7c5b44416549038e473f6a6a61a233353a --- /dev/null +++ b/graph/incidents_graphml/f/f1cb6ca0-367c-11ef-9a96-43590930a20f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.253.225.145 + 10.253.225.145 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.177 + 100.64.83.177 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1719709573 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1cb6ca0-367c-11ef-9a96-43590930a20f + + + diff --git a/graph/incidents_graphml/f/f1ccade0-75d9-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f1ccade0-75d9-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7062213e03d21d7ecd8ef42367a446eeca1e5992 --- /dev/null +++ b/graph/incidents_graphml/f/f1ccade0-75d9-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.147 + 100.64.45.147 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698528942 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1ccade0-75d9-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f1d2ca40-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1d2ca40-1c9d-11ed-822a-cb7c4e632a4f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6023d8ff03cecdfcec6e9c1b902f97701e5ae722 --- /dev/null +++ b/graph/incidents_graphml/f/f1d2ca40-1c9d-11ed-822a-cb7c4e632a4f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.47 + 100.64.76.47 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660570021 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1d2ca40-1c9d-11ed-822a-cb7c4e632a4f + + + diff --git a/graph/incidents_graphml/f/f1d72ca0-0cc7-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/f/f1d72ca0-0cc7-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..508e69b4bc93f04de3d9ba1e85368e9550e86451 --- /dev/null +++ b/graph/incidents_graphml/f/f1d72ca0-0cc7-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.47 + 100.64.8.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686976339 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1d72ca0-0cc7-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/f/f1d81360-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f1d81360-0fae-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea89243db9b1885b3e928c4bb8e14a4089e312b1 --- /dev/null +++ b/graph/incidents_graphml/f/f1d81360-0fae-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.151 + 100.64.75.151 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687295455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1d81360-0fae-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/f1d9f630-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1d9f630-1c9d-11ed-822a-cb7c4e632a4f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f942a99e23a9a4ec1d5dbbb8bdf3e47a06237f5e --- /dev/null +++ b/graph/incidents_graphml/f/f1d9f630-1c9d-11ed-822a-cb7c4e632a4f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.47 + 100.64.76.47 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660570021 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1d9f630-1c9d-11ed-822a-cb7c4e632a4f + + + diff --git a/graph/incidents_graphml/f/f1dbd8e0-a7f0-11ed-af31-070b715d9bbb.graphml b/graph/incidents_graphml/f/f1dbd8e0-a7f0-11ed-af31-070b715d9bbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05636b2829bb54a75496d6c9d6335e3bce4c0623 --- /dev/null +++ b/graph/incidents_graphml/f/f1dbd8e0-a7f0-11ed-af31-070b715d9bbb.graphml @@ -0,0 +1,775 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.243 + 100.64.87.243 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.87.244 + 100.64.87.244 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.245 + 100.64.87.245 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.218 + 100.64.87.218 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.246 + 100.64.87.246 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.87.247 + 100.64.87.247 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.248 + 100.64.87.248 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.249 + 100.64.87.249 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.250 + 100.64.87.250 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.211 + 100.64.87.211 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.251 + 100.64.87.251 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.217 + 100.64.39.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.252 + 100.64.87.252 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.253 + 100.64.87.253 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.254 + 100.64.87.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.255 + 100.64.87.255 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.1 + 100.64.88.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.1 + 100.64.88.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888881 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1dbd8e0-a7f0-11ed-af31-070b715d9bbb + + + diff --git a/graph/incidents_graphml/f/f1ddc6c0-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1ddc6c0-1c9d-11ed-822a-cb7c4e632a4f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06fd2aed7507f4c985c8462e63e232df02c82a50 --- /dev/null +++ b/graph/incidents_graphml/f/f1ddc6c0-1c9d-11ed-822a-cb7c4e632a4f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.171 + 100.64.71.171 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660570021 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1ddc6c0-1c9d-11ed-822a-cb7c4e632a4f + + + diff --git a/graph/incidents_graphml/f/f1def4a0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1def4a0-367c-11ef-9a96-43590930a20f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1b653d63d368048dc0bd659af63d226d8556965 --- /dev/null +++ b/graph/incidents_graphml/f/f1def4a0-367c-11ef-9a96-43590930a20f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.190 + USER-0015-1951.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.253.225.145 + 10.253.225.145 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1719709573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1def4a0-367c-11ef-9a96-43590930a20f + + + diff --git a/graph/incidents_graphml/f/f1e17770-fd11-11ed-a4b5-cd7044d3b555.graphml b/graph/incidents_graphml/f/f1e17770-fd11-11ed-a4b5-cd7044d3b555.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f97bca7a9613be25ee8400964aefdf72645690e9 --- /dev/null +++ b/graph/incidents_graphml/f/f1e17770-fd11-11ed-a4b5-cd7044d3b555.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685248903 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e17770-fd11-11ed-a4b5-cd7044d3b555 + + + diff --git a/graph/incidents_graphml/f/f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d.graphml b/graph/incidents_graphml/f/f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..725ac2a631496d7ba3b1acc5b8711760b0dc1db7 --- /dev/null +++ b/graph/incidents_graphml/f/f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.165 + 100.64.59.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.166 + 100.64.59.166 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.167 + 100.64.59.167 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.55 + 100.64.16.55 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.168 + 100.64.59.168 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.79 + 100.64.23.79 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990810 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6b0b0-1601-11ee-b5b0-23eb7b8b596d + + + diff --git a/graph/incidents_graphml/f/f1e6e070-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f1e6e070-0fae-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77941cccdda64b9b2978ee61ed3a125f84682fd2 --- /dev/null +++ b/graph/incidents_graphml/f/f1e6e070-0fae-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.151 + 100.64.75.151 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687295455 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1e6e070-0fae-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/f1ed0900-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1ed0900-1c9d-11ed-822a-cb7c4e632a4f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..345205acaa7e0abbc1e79cf2743ba69a2583e5e6 --- /dev/null +++ b/graph/incidents_graphml/f/f1ed0900-1c9d-11ed-822a-cb7c4e632a4f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.171 + 100.64.71.171 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660570021 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1ed0900-1c9d-11ed-822a-cb7c4e632a4f + + + diff --git a/graph/incidents_graphml/f/f1ede8c0-367c-11ef-9a96-43590930a20f.graphml b/graph/incidents_graphml/f/f1ede8c0-367c-11ef-9a96-43590930a20f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c42149f86c765f876e23520c68129d599cc97df2 --- /dev/null +++ b/graph/incidents_graphml/f/f1ede8c0-367c-11ef-9a96-43590930a20f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.253.225.145 + 10.253.225.145 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.7.190 + USER-0015-1951.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1719709573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f1ede8c0-367c-11ef-9a96-43590930a20f + + + diff --git a/graph/incidents_graphml/f/f1f1eb00-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1f1eb00-1c9d-11ed-822a-cb7c4e632a4f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f17f145aaf53598934d3d0ef3e42182e7888d2fa --- /dev/null +++ b/graph/incidents_graphml/f/f1f1eb00-1c9d-11ed-822a-cb7c4e632a4f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.48 + USER-0015-1730.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660570021 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1f1eb00-1c9d-11ed-822a-cb7c4e632a4f + + + diff --git a/graph/incidents_graphml/f/f1f36390-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f1f36390-0fae-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..694ac5dcea699e8d36f9edfddf98a87ff0ade20f --- /dev/null +++ b/graph/incidents_graphml/f/f1f36390-0fae-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.233 + 100.64.82.233 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687295455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f1f36390-0fae-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/f1f8efe0-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f1f8efe0-1c9d-11ed-822a-cb7c4e632a4f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da346a52c6faec67048a1b9c9f637488f89e4f61 --- /dev/null +++ b/graph/incidents_graphml/f/f1f8efe0-1c9d-11ed-822a-cb7c4e632a4f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.48 + USER-0015-1730.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660570021 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f1f8efe0-1c9d-11ed-822a-cb7c4e632a4f + + + diff --git a/graph/incidents_graphml/f/f204a1a0-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f204a1a0-0fae-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6ffc8f809fe3a3037f8fa90b3f4c50476a0d0e8 --- /dev/null +++ b/graph/incidents_graphml/f/f204a1a0-0fae-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.233 + 100.64.82.233 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687295455 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f204a1a0-0fae-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/f/f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49b1b718361a6e09de278eaeef14fcdf16c41bac --- /dev/null +++ b/graph/incidents_graphml/f/f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.111 + 100.64.73.111 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.212 + 100.64.72.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.154 + 100.64.78.154 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656519867 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519867 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519867 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519867 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20c55d0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + diff --git a/graph/incidents_graphml/f/f20e41d0-a8bd-11ee-be75-9d7de56126cf.graphml b/graph/incidents_graphml/f/f20e41d0-a8bd-11ee-be75-9d7de56126cf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49169e2fac50b2fc18c8d9b3590d9424a8e2cb4b --- /dev/null +++ b/graph/incidents_graphml/f/f20e41d0-a8bd-11ee-be75-9d7de56126cf.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.169 + 100.64.31.169 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.170 + 100.64.31.170 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.171 + USER-0015-1289.example.internal + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.172 + 100.64.31.172 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.105 + 100.64.17.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.173 + 100.64.31.173 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.174 + 100.64.31.174 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.175 + 100.64.31.175 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.176 + 100.64.31.176 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.177 + 100.64.31.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.178 + 100.64.31.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.29 + 100.64.23.29 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.179 + 100.64.31.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.246 + 100.64.13.246 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.38 + USER-0015-1290.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.180 + 100.64.31.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.181 + 100.64.31.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124425 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f20e41d0-a8bd-11ee-be75-9d7de56126cf + + + diff --git a/graph/incidents_graphml/f/f213d050-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f213d050-d360-11ee-82a4-572767498e98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2bd7288cfb27f1c6559acd92d4b7610def16e39 --- /dev/null +++ b/graph/incidents_graphml/f/f213d050-d360-11ee-82a4-572767498e98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.238 + 100.64.8.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708812382 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f213d050-d360-11ee-82a4-572767498e98 + + + diff --git a/graph/incidents_graphml/f/f214f550-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f214f550-0fae-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6002a4cf333f3c8607686489369e7cf7fc68a277 --- /dev/null +++ b/graph/incidents_graphml/f/f214f550-0fae-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.8 + 100.64.75.8 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687295455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f214f550-0fae-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/f21acfc0-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f21acfc0-1c9d-11ed-822a-cb7c4e632a4f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6be2df581a0565ae7f252d9281c79a5dcd0f47d1 --- /dev/null +++ b/graph/incidents_graphml/f/f21acfc0-1c9d-11ed-822a-cb7c4e632a4f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.49 + 100.64.76.49 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660570021 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f21acfc0-1c9d-11ed-822a-cb7c4e632a4f + + + diff --git a/graph/incidents_graphml/f/f222e610-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f222e610-1c9d-11ed-822a-cb7c4e632a4f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d7ccac0e72e0bf874118e82ceb2607b3767866f --- /dev/null +++ b/graph/incidents_graphml/f/f222e610-1c9d-11ed-822a-cb7c4e632a4f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.49 + 100.64.76.49 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660570021 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f222e610-1c9d-11ed-822a-cb7c4e632a4f + + + diff --git a/graph/incidents_graphml/f/f22521f0-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f22521f0-0fae-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d32d4532ee9f001b18f589af661c0d6b0d52b348 --- /dev/null +++ b/graph/incidents_graphml/f/f22521f0-0fae-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.8 + 100.64.75.8 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687295455 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f22521f0-0fae-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/f2253000-1c9d-11ed-822a-cb7c4e632a4f.graphml b/graph/incidents_graphml/f/f2253000-1c9d-11ed-822a-cb7c4e632a4f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c68aa254315f37b7e2f66f1c8c53f7ae7a43b5e3 --- /dev/null +++ b/graph/incidents_graphml/f/f2253000-1c9d-11ed-822a-cb7c4e632a4f.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.139 + 100.64.36.139 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.172 + 100.64.75.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.51 + 100.64.76.51 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.52 + 100.64.76.52 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.20.30 + 100.64.20.30 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.53 + 100.64.76.53 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.54 + 100.64.76.54 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.217 + 100.64.71.217 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.55 + 100.64.76.55 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.248 + 100.64.70.248 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.42 + 100.64.76.42 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.56 + 100.64.76.56 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.57 + 100.64.76.57 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.137 + 100.64.72.137 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.58 + 100.64.76.58 + ["Exploiting Host"] + 0.7525 + ["Precinct","Meraki"] + + + HOST + 100.64.1.25 + 100.64.1.25 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.59 + 100.64.76.59 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.17.5 + 100.64.17.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.63 + USER-0015-1731.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.60 + 100.64.76.60 + ["Exploiting Target"] + 0.68359375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + INCIDENT_LINK + 1660570021 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2253000-1c9d-11ed-822a-cb7c4e632a4f + + + diff --git a/graph/incidents_graphml/f/f2420a70-2d97-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/f/f2420a70-2d97-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4df1bbc0bd3a60110c047c9aaf405e402ab13b60 --- /dev/null +++ b/graph/incidents_graphml/f/f2420a70-2d97-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,811 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.129 + 100.64.17.129 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.16 + 100.64.9.16 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.96 + USER-0015-1316.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.254 + 100.64.52.254 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + HOST-2906 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.255 + 100.64.52.255 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.130 + 100.64.14.130 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.167 + 100.64.45.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.203 + 100.64.23.203 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.1 + USER-0015-1397.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.1 + USER-0015-1398.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.166 + 100.64.42.166 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.151 + 100.64.52.151 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.243 + 100.64.40.243 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.175 + 100.64.12.175 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.195 + 100.64.6.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.34 + 100.64.43.34 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.60 + 100.64.18.60 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + INCIDENT_LINK + 1690584112 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2420a70-2d97-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/f/f251acc0-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f251acc0-eb51-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8695586c362cf90dc7b704fba00e8198da6fa09d --- /dev/null +++ b/graph/incidents_graphml/f/f251acc0-eb51-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.251 + USER-0015-1815.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655149773 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f251acc0-eb51-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/f/f258dc20-0fae-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f258dc20-0fae-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ddc0759858c32a90f9bf1bc3ff283d546aaf333 --- /dev/null +++ b/graph/incidents_graphml/f/f258dc20-0fae-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.209 + 100.64.72.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687295456 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f258dc20-0fae-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/f2646650-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f2646650-efc3-11ec-9799-0176ac54cf1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d818461c090259316731368a3322beb1e4cff97 --- /dev/null +++ b/graph/incidents_graphml/f/f2646650-efc3-11ec-9799-0176ac54cf1b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.76 + 100.64.50.76 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.255 + 100.64.73.255 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655638540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f2646650-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f2646650-efc3-11ec-9799-0176ac54cf1b + + + diff --git a/graph/incidents_graphml/f/f26fff10-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f26fff10-efc3-11ec-9799-0176ac54cf1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..849369ddfa063a239fcb624da9a2560bd0bd2f0a --- /dev/null +++ b/graph/incidents_graphml/f/f26fff10-efc3-11ec-9799-0176ac54cf1b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.162 + 100.64.80.162 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.17 + USER-0015-1842.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655638540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f26fff10-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f26fff10-efc3-11ec-9799-0176ac54cf1b + + + diff --git a/graph/incidents_graphml/f/f2759cd0-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f2759cd0-5b66-11ee-a387-a18350d70540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..101b93e0ed11e335b19933e4b0cab03fbda10031 --- /dev/null +++ b/graph/incidents_graphml/f/f2759cd0-5b66-11ee-a387-a18350d70540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.122 + 100.64.35.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695620820 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f2759cd0-5b66-11ee-a387-a18350d70540 + + + diff --git a/graph/incidents_graphml/f/f27cf550-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f27cf550-06ef-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..956d507dd55f778f348893758d94f01ea81fde6c --- /dev/null +++ b/graph/incidents_graphml/f/f27cf550-06ef-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.166 + 100.64.46.166 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686333813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f27cf550-06ef-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/f/f2829630-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f2829630-2ea5-11ee-a61f-7552bb17f553.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7cafdbb7eb1ae55d23f02f968590bbaddaba5367 --- /dev/null +++ b/graph/incidents_graphml/f/f2829630-2ea5-11ee-a61f-7552bb17f553.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.37 + 100.64.33.37 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690700076 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2829630-2ea5-11ee-a61f-7552bb17f553 + + + diff --git a/graph/incidents_graphml/f/f28442d0-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f28442d0-5b66-11ee-a387-a18350d70540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83159e473b576403b7e0004c87b7a326f45234ee --- /dev/null +++ b/graph/incidents_graphml/f/f28442d0-5b66-11ee-a387-a18350d70540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.122 + 100.64.35.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695620820 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f28442d0-5b66-11ee-a387-a18350d70540 + + + diff --git a/graph/incidents_graphml/f/f28b5a60-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f28b5a60-eb51-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..afb875e8ab4edd8307605f861fa2085b0f42cb13 --- /dev/null +++ b/graph/incidents_graphml/f/f28b5a60-eb51-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.251 + USER-0015-1815.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655149773 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f28b5a60-eb51-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/f/f28ce210-1403-11ed-91bb-5f4a5e1f0902.graphml b/graph/incidents_graphml/f/f28ce210-1403-11ed-91bb-5f4a5e1f0902.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4de8a9d836f1e198a3917d57f74f15b329658e38 --- /dev/null +++ b/graph/incidents_graphml/f/f28ce210-1403-11ed-91bb-5f4a5e1f0902.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.104 + 100.64.73.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.4 + 100.64.76.4 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659624270 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f28ce210-1403-11ed-91bb-5f4a5e1f0902 + + + INCIDENT_LINK + 1659624270 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f28ce210-1403-11ed-91bb-5f4a5e1f0902 + + + diff --git a/graph/incidents_graphml/f/f290b5d0-0f7e-11ee-a9d1-514a3be7d931.graphml b/graph/incidents_graphml/f/f290b5d0-0f7e-11ee-a9d1-514a3be7d931.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bff9d65dd521a214ba8e4478c7c19bcaa27afe9c --- /dev/null +++ b/graph/incidents_graphml/f/f290b5d0-0f7e-11ee-a9d1-514a3be7d931.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.136 + 100.64.43.136 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687274840 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f290b5d0-0f7e-11ee-a9d1-514a3be7d931 + + + diff --git a/graph/incidents_graphml/f/f2916230-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f2916230-5b66-11ee-a387-a18350d70540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d4e6323aa10081a8a4a51ef108d71995a055149 --- /dev/null +++ b/graph/incidents_graphml/f/f2916230-5b66-11ee-a387-a18350d70540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.124 + 100.64.35.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695620821 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f2916230-5b66-11ee-a387-a18350d70540 + + + diff --git a/graph/incidents_graphml/f/f2981e70-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f2981e70-06ef-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5df949280a68acddea3e182f2fcb9390d8f26ca --- /dev/null +++ b/graph/incidents_graphml/f/f2981e70-06ef-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.166 + 100.64.46.166 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686333813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f2981e70-06ef-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/f/f29a63f0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f29a63f0-2ea5-11ee-a61f-7552bb17f553.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf35aca6f24b52c4c9b4ee4df7a9dba8e05bc7d4 --- /dev/null +++ b/graph/incidents_graphml/f/f29a63f0-2ea5-11ee-a61f-7552bb17f553.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.37 + 100.64.33.37 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690700077 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f29a63f0-2ea5-11ee-a61f-7552bb17f553 + + + diff --git a/graph/incidents_graphml/f/f29e3ce0-77d5-11ee-9835-15031a37be5d.graphml b/graph/incidents_graphml/f/f29e3ce0-77d5-11ee-9835-15031a37be5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5117608e396cfa9f30d50e76c2a0d1d97e64b6ff --- /dev/null +++ b/graph/incidents_graphml/f/f29e3ce0-77d5-11ee-9835-15031a37be5d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.241 + 100.64.23.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747127 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f29e3ce0-77d5-11ee-9835-15031a37be5d + + + diff --git a/graph/incidents_graphml/f/f2a1b5e0-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f2a1b5e0-5b66-11ee-a387-a18350d70540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff597c431801bb655a66f31af1a1e3ac666cd7fa --- /dev/null +++ b/graph/incidents_graphml/f/f2a1b5e0-5b66-11ee-a387-a18350d70540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.124 + 100.64.35.124 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695620821 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f2a1b5e0-5b66-11ee-a387-a18350d70540 + + + diff --git a/graph/incidents_graphml/f/f2b34790-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f2b34790-06ef-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8fe11422f0ab0c3700767bb3dd5d7b0e3261b65 --- /dev/null +++ b/graph/incidents_graphml/f/f2b34790-06ef-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.168 + 100.64.46.168 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686333813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f2b34790-06ef-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/f/f2ba52d0-10bb-11ee-a3c2-a9ac98626f62.graphml b/graph/incidents_graphml/f/f2ba52d0-10bb-11ee-a3c2-a9ac98626f62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..604da40bd8cb26c33a3add84d73ee5166563c034 --- /dev/null +++ b/graph/incidents_graphml/f/f2ba52d0-10bb-11ee-a3c2-a9ac98626f62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.255 + 100.64.18.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687410991 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f2ba52d0-10bb-11ee-a3c2-a9ac98626f62 + + + diff --git a/graph/incidents_graphml/f/f2ba9e80-77d5-11ee-9835-15031a37be5d.graphml b/graph/incidents_graphml/f/f2ba9e80-77d5-11ee-9835-15031a37be5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf6a05cf71210781bcd5e2a149e6fcf0488bf4ab --- /dev/null +++ b/graph/incidents_graphml/f/f2ba9e80-77d5-11ee-9835-15031a37be5d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.10 + 100.64.12.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747127 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f2ba9e80-77d5-11ee-9835-15031a37be5d + + + diff --git a/graph/incidents_graphml/f/f2bb1040-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f2bb1040-452b-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72ec8b15f00e7072b6b84982cb07ecd351dd3969 --- /dev/null +++ b/graph/incidents_graphml/f/f2bb1040-452b-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.84 + 100.64.16.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176555 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f2bb1040-452b-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/f/f2c1d0c0-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f2c1d0c0-1911-11ed-9439-83188f456eb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bae7f945b92238e43b40a07b5db0c3be8b69ce0 --- /dev/null +++ b/graph/incidents_graphml/f/f2c1d0c0-1911-11ed-9439-83188f456eb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.79 + 100.64.78.79 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.70.248 + 100.64.70.248 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660180039 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2c1d0c0-1911-11ed-9439-83188f456eb5 + + + diff --git a/graph/incidents_graphml/f/f2c992a0-77d5-11ee-9835-15031a37be5d.graphml b/graph/incidents_graphml/f/f2c992a0-77d5-11ee-9835-15031a37be5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53e2e098d0b9b7e9546d94111263c7477c5078bf --- /dev/null +++ b/graph/incidents_graphml/f/f2c992a0-77d5-11ee-9835-15031a37be5d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.10 + 100.64.12.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747128 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f2c992a0-77d5-11ee-9835-15031a37be5d + + + diff --git a/graph/incidents_graphml/f/f2d37a40-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f2d37a40-452b-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..102bcad82d3453414c59296bc811343681f3c8a1 --- /dev/null +++ b/graph/incidents_graphml/f/f2d37a40-452b-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.84 + 100.64.16.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176555 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f2d37a40-452b-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/f/f2d52b60-77d5-11ee-9835-15031a37be5d.graphml b/graph/incidents_graphml/f/f2d52b60-77d5-11ee-9835-15031a37be5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfc50d21069550b2abed17bdef47ea2c064289c0 --- /dev/null +++ b/graph/incidents_graphml/f/f2d52b60-77d5-11ee-9835-15031a37be5d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.116 + 100.64.50.116 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747128 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f2d52b60-77d5-11ee-9835-15031a37be5d + + + diff --git a/graph/incidents_graphml/f/f2d69430-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f2d69430-eb51-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..245f754f6ca3f9b7be823022bb5a08e39e0d97e1 --- /dev/null +++ b/graph/incidents_graphml/f/f2d69430-eb51-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.111 + 100.64.71.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.157 + 100.64.79.157 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655149774 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2d69430-eb51-11ec-8162-f7a03e680dde + + + INCIDENT_LINK + 1655149774 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2d69430-eb51-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/f/f2d6ae10-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f2d6ae10-06ef-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef409ec6ede7a06c233e06bad5faf032e1cfe2f8 --- /dev/null +++ b/graph/incidents_graphml/f/f2d6ae10-06ef-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.168 + 100.64.46.168 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686333813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f2d6ae10-06ef-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/f/f2e02090-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/f/f2e02090-f7c7-11ec-bee1-ad5b1c4e4be8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f62d569375e4e67719c62d8eda9669d3d5d31dd --- /dev/null +++ b/graph/incidents_graphml/f/f2e02090-f7c7-11ec-bee1-ad5b1c4e4be8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.152 + 100.64.7.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.196 + USER-0015-1786.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656519868 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2e02090-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519868 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2e02090-f7c7-11ec-bee1-ad5b1c4e4be8 + + + diff --git a/graph/incidents_graphml/f/f2e63df0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f2e63df0-a1fc-11ee-b2e6-711be6db0b61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11d55dc37eaa5141e8397c532925614e058d2a7c --- /dev/null +++ b/graph/incidents_graphml/f/f2e63df0-a1fc-11ee-b2e6-711be6db0b61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.114 + 100.64.49.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703381827 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f2e63df0-a1fc-11ee-b2e6-711be6db0b61 + + + diff --git a/graph/incidents_graphml/f/f2f02980-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f2f02980-06ef-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea0fdbe7b13ceb77594e2208fee8b21e8bc9b7b9 --- /dev/null +++ b/graph/incidents_graphml/f/f2f02980-06ef-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686333813 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f2f02980-06ef-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/f/f2f13ee0-77d5-11ee-9835-15031a37be5d.graphml b/graph/incidents_graphml/f/f2f13ee0-77d5-11ee-9835-15031a37be5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed28f57c083e24a93de4dce3c9b14af2e5f84f99 --- /dev/null +++ b/graph/incidents_graphml/f/f2f13ee0-77d5-11ee-9835-15031a37be5d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.110 + 100.64.48.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698747128 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f2f13ee0-77d5-11ee-9835-15031a37be5d + + + diff --git a/graph/incidents_graphml/f/f2f4e3f0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f2f4e3f0-a1fc-11ee-b2e6-711be6db0b61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7490a9d989432a08004d302f797ae562346c89d2 --- /dev/null +++ b/graph/incidents_graphml/f/f2f4e3f0-a1fc-11ee-b2e6-711be6db0b61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.114 + 100.64.49.114 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703381827 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f2f4e3f0-a1fc-11ee-b2e6-711be6db0b61 + + + diff --git a/graph/incidents_graphml/f/f2fb0930-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f2fb0930-1911-11ed-9439-83188f456eb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57220ac770e2006df9aaa0d9a7823aeb13b86877 --- /dev/null +++ b/graph/incidents_graphml/f/f2fb0930-1911-11ed-9439-83188f456eb5.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.80 + 100.64.78.80 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.90 + 100.64.71.90 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660180040 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2fb0930-1911-11ed-9439-83188f456eb5 + + + INCIDENT_LINK + 1660180040 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2fb0930-1911-11ed-9439-83188f456eb5 + + + diff --git a/graph/incidents_graphml/f/f2fdbb80-fcd2-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/f/f2fdbb80-fcd2-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90c8451388fa8be4430da2de70cc0bccc2c30ff6 --- /dev/null +++ b/graph/incidents_graphml/f/f2fdbb80-fcd2-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.123 + 100.64.13.123 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.13.124 + 100.64.13.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685221846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2fdbb80-fcd2-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685221846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2fdbb80-fcd2-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685221846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2fdbb80-fcd2-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685221846 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2fdbb80-fcd2-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/f/f2ffc420-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f2ffc420-1911-11ed-9439-83188f456eb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e10a5a5e98e3257c86c304975e43f5c1ffee6ed3 --- /dev/null +++ b/graph/incidents_graphml/f/f2ffc420-1911-11ed-9439-83188f456eb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.129 + 100.64.11.129 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.69 + 100.64.72.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660180040 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f2ffc420-1911-11ed-9439-83188f456eb5 + + + diff --git a/graph/incidents_graphml/f/f3035530-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3035530-7541-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f09e923e8a66e32ead6401288c50f9b4312997e2 --- /dev/null +++ b/graph/incidents_graphml/f/f3035530-7541-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.99 + 100.64.29.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698463660 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f3035530-7541-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f304f440-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f304f440-1911-11ed-9439-83188f456eb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0adca6225c0b449d9e4c32f9a973b5c4013e83eb --- /dev/null +++ b/graph/incidents_graphml/f/f304f440-1911-11ed-9439-83188f456eb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.88 + 100.64.76.88 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.152 + 100.64.72.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660180040 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f304f440-1911-11ed-9439-83188f456eb5 + + + diff --git a/graph/incidents_graphml/f/f30a8f50-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f30a8f50-06ef-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa30635f153b31fe4bf545624291f773a0f3dbf2 --- /dev/null +++ b/graph/incidents_graphml/f/f30a8f50-06ef-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686333814 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f30a8f50-06ef-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/f/f312be80-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f312be80-7541-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4687db3d9c0a4e9fd2df9477bae913bedee10ee --- /dev/null +++ b/graph/incidents_graphml/f/f312be80-7541-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.101 + 100.64.29.101 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698463660 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f312be80-7541-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f312d6f0-1911-11ed-9439-83188f456eb5.graphml b/graph/incidents_graphml/f/f312d6f0-1911-11ed-9439-83188f456eb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab9b20d62d3ff49abf9a3ff8083fe281693f0336 --- /dev/null +++ b/graph/incidents_graphml/f/f312d6f0-1911-11ed-9439-83188f456eb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.152 + 100.64.72.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.88 + 100.64.76.88 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660180040 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f312d6f0-1911-11ed-9439-83188f456eb5 + + + diff --git a/graph/incidents_graphml/f/f313c440-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f313c440-eb51-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3128088eb0d2adb17e50da72e795058fe375068 --- /dev/null +++ b/graph/incidents_graphml/f/f313c440-eb51-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.166 + USER-0015-1816.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655149774 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f313c440-eb51-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/f/f320a130-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f320a130-7541-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f55fc986a93acaee4d25aff6178cb26b2ccabd01 --- /dev/null +++ b/graph/incidents_graphml/f/f320a130-7541-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.101 + 100.64.29.101 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698463660 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f320a130-7541-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f3245e20-eb97-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/f/f3245e20-eb97-11ee-8f3a-6b2412cfa52f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d2d9464761579b61affa2acf1c85ff545e85743 --- /dev/null +++ b/graph/incidents_graphml/f/f3245e20-eb97-11ee-8f3a-6b2412cfa52f.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.144.11.175 + 10.144.11.175 + ["Exploiting Host"] + 0.841796875 + ["Precinct","PAN NGFW","Windows Active Directory"] + + + HOST + 100.64.70.45 + 100.64.70.45 + ["Exploiting Target"] + 0.578125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.44 + 100.64.70.44 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.50 + 100.64.70.50 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.51 + 100.64.70.51 + ["Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.52 + 100.64.70.52 + ["Exploiting Target"] + 0.578125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.53 + 100.64.70.53 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.54 + 100.64.70.54 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.55 + 100.64.70.55 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.56 + 100.64.70.56 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.57 + 100.64.70.57 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.98 + 100.64.68.98 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.58 + USER-0015-1565.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.59 + 100.64.70.59 + ["Exploiting Target"] + 0.578125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.155 + 100.64.69.155 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.43 + 100.64.70.43 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.60 + 100.64.70.60 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.61 + 100.64.70.61 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.62 + 100.64.70.62 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.63 + 100.64.70.63 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.64 + 100.64.70.64 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474834 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3245e20-eb97-11ee-8f3a-6b2412cfa52f + + + diff --git a/graph/incidents_graphml/f/f325c870-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f325c870-1bdf-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3daae1d5ec34152fe3e9260a0ad320072dccc9fb --- /dev/null +++ b/graph/incidents_graphml/f/f325c870-1bdf-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.18 + 100.64.90.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660488418 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f325c870-1bdf-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/f32d2450-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f32d2450-7541-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d857e2041ebca4cbf7a4b6cd0445a9cd568fd8cf --- /dev/null +++ b/graph/incidents_graphml/f/f32d2450-7541-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.103 + 100.64.29.103 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698463660 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f32d2450-7541-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f32e05d0-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f32e05d0-1bdf-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fab3cd5260af372bd2e1e8f49a503fc655ae444 --- /dev/null +++ b/graph/incidents_graphml/f/f32e05d0-1bdf-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.18 + 100.64.90.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660488419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f32e05d0-1bdf-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/f334ac10-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f334ac10-a1fc-11ee-b2e6-711be6db0b61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df17dbf5fb3cb9167e24e0ed1a7e9bca36d90482 --- /dev/null +++ b/graph/incidents_graphml/f/f334ac10-a1fc-11ee-b2e6-711be6db0b61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.250 + 100.64.26.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703381828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f334ac10-a1fc-11ee-b2e6-711be6db0b61 + + + diff --git a/graph/incidents_graphml/f/f33531c0-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f33531c0-1bdf-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d19da42a311481f0446fb18739b8c3c9cfebc5aa --- /dev/null +++ b/graph/incidents_graphml/f/f33531c0-1bdf-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.19 + 100.64.90.19 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660488419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f33531c0-1bdf-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/f337a0a0-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/f/f337a0a0-6232-11ee-a972-e59ec7ee05b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a059865b4494a5db65be7d5ed12636599f7dee4 --- /dev/null +++ b/graph/incidents_graphml/f/f337a0a0-6232-11ee-a972-e59ec7ee05b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.37 + 100.64.23.37 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696368146 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f337a0a0-6232-11ee-a972-e59ec7ee05b9 + + + diff --git a/graph/incidents_graphml/f/f33a91d0-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f33a91d0-7541-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1ad881d316f535177843b440077d7d1c65e13c3 --- /dev/null +++ b/graph/incidents_graphml/f/f33a91d0-7541-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.103 + 100.64.29.103 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698463660 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f33a91d0-7541-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f33e5980-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f33e5980-1bdf-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a259c7b716910cbaaba976cd6a05d0604e1b1cab --- /dev/null +++ b/graph/incidents_graphml/f/f33e5980-1bdf-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.19 + 100.64.90.19 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660488419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f33e5980-1bdf-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/f3538c60-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f3538c60-eb51-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e8e978d746f949d524c436a22656ad70756e64c --- /dev/null +++ b/graph/incidents_graphml/f/f3538c60-eb51-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.166 + USER-0015-1816.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655149774 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f3538c60-eb51-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/f/f35a4ca0-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/f/f35a4ca0-0ea8-11ee-ac51-1fc12cdb93ff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..156eb05f1e41de3cf693d62b9323e109509dbd2a --- /dev/null +++ b/graph/incidents_graphml/f/f35a4ca0-0ea8-11ee-ac51-1fc12cdb93ff.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.2 + USER-0015-1239.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687182929 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f35a4ca0-0ea8-11ee-ac51-1fc12cdb93ff + + + INCIDENT_LINK + 1687182929 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f35a4ca0-0ea8-11ee-ac51-1fc12cdb93ff + + + diff --git a/graph/incidents_graphml/f/f35d8ce0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f35d8ce0-2ea5-11ee-a61f-7552bb17f553.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3366675841d82fc6370e3c1e0ca6f50421120bbc --- /dev/null +++ b/graph/incidents_graphml/f/f35d8ce0-2ea5-11ee-a61f-7552bb17f553.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.39 + 100.64.33.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690700078 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f35d8ce0-2ea5-11ee-a61f-7552bb17f553 + + + diff --git a/graph/incidents_graphml/f/f3628c30-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3628c30-7541-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..acf908a00591e722ba402cffc0e13222e367137b --- /dev/null +++ b/graph/incidents_graphml/f/f3628c30-7541-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.84 + 100.64.16.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698463661 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3628c30-7541-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f36bb940-7afa-11ee-b62a-83f597088d9e.graphml b/graph/incidents_graphml/f/f36bb940-7afa-11ee-b62a-83f597088d9e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0bb3748b4337157e1d077d59ebb630ea3a6f6a4 --- /dev/null +++ b/graph/incidents_graphml/f/f36bb940-7afa-11ee-b62a-83f597088d9e.graphml @@ -0,0 +1,287 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.14 + 100.64.38.14 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.15 + 100.64.38.15 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.161 + 100.64.32.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.104 + 100.64.11.104 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.16 + 100.64.38.16 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.17 + 100.64.38.17 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f36bb940-7afa-11ee-b62a-83f597088d9e + + + diff --git a/graph/incidents_graphml/f/f36fb940-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f36fb940-a1fc-11ee-b2e6-711be6db0b61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..faec11501fa0a1e327e6e071deeaa77fd58dcee0 --- /dev/null +++ b/graph/incidents_graphml/f/f36fb940-a1fc-11ee-b2e6-711be6db0b61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.99 + 100.64.11.99 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703381828 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f36fb940-a1fc-11ee-b2e6-711be6db0b61 + + + diff --git a/graph/incidents_graphml/f/f3710b20-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3710b20-7541-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..adc131cc26e05627da9e26b1e21aa83a8b7cbca2 --- /dev/null +++ b/graph/incidents_graphml/f/f3710b20-7541-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.84 + 100.64.16.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698463661 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f3710b20-7541-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f3766020-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/f/f3766020-0ea8-11ee-ac51-1fc12cdb93ff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e954c65019f5163b83d83839106a7d4043913b1 --- /dev/null +++ b/graph/incidents_graphml/f/f3766020-0ea8-11ee-ac51-1fc12cdb93ff.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.2 + USER-0015-1239.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687182929 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f3766020-0ea8-11ee-ac51-1fc12cdb93ff + + + diff --git a/graph/incidents_graphml/f/f378d8a0-7afa-11ee-b62a-83f597088d9e.graphml b/graph/incidents_graphml/f/f378d8a0-7afa-11ee-b62a-83f597088d9e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58a30bfd72e9f1063245b59fc1056911dafe3c43 --- /dev/null +++ b/graph/incidents_graphml/f/f378d8a0-7afa-11ee-b62a-83f597088d9e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.14 + 100.64.38.14 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699092874 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f378d8a0-7afa-11ee-b62a-83f597088d9e + + + diff --git a/graph/incidents_graphml/f/f37afff0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f37afff0-2ea5-11ee-a61f-7552bb17f553.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bca471359eb943e8567183eb90c2e226d3c9f3df --- /dev/null +++ b/graph/incidents_graphml/f/f37afff0-2ea5-11ee-a61f-7552bb17f553.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.39 + 100.64.33.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690700078 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f37afff0-2ea5-11ee-a61f-7552bb17f553 + + + diff --git a/graph/incidents_graphml/f/f3802650-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3802650-7541-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..920f43beb41b8098098aebe451b2ca7d59a139cd --- /dev/null +++ b/graph/incidents_graphml/f/f3802650-7541-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.70 + 100.64.13.70 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698463661 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3802650-7541-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f3813610-eb95-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/f/f3813610-eb95-11ee-8f3a-6b2412cfa52f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca4d073026bee615decb1031f1da1ba59ad41a00 --- /dev/null +++ b/graph/incidents_graphml/f/f3813610-eb95-11ee-8f3a-6b2412cfa52f.graphml @@ -0,0 +1,653 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.240 + 100.64.9.240 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.31.242 + 100.64.31.242 + ["Exploiting Host","Exploiting Target"] + 0.8576171875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.70.9 + 100.64.70.9 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.68.241 + 100.64.68.241 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.59.184 + 100.64.59.184 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.37.76 + 100.64.37.76 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.214 + 100.64.68.214 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"] + + + HOST + 100.64.70.10 + 100.64.70.10 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.24.143 + 100.64.24.143 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473976 + malicious + 0.8576171875 + 0.8576171875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3813610-eb95-11ee-8f3a-6b2412cfa52f + + + diff --git a/graph/incidents_graphml/f/f3842c50-5c87-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/f/f3842c50-5c87-11ee-8e0e-93298c809ccb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e113d126c5935fef724891f6f65678e2c9d6585 --- /dev/null +++ b/graph/incidents_graphml/f/f3842c50-5c87-11ee-8e0e-93298c809ccb.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.82 + 100.64.69.82 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.83 + 100.64.69.83 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.84 + 100.64.69.84 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.169 + 100.64.68.169 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695744947 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3842c50-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744947 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3842c50-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744947 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3842c50-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744947 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3842c50-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744947 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3842c50-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744947 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3842c50-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744947 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3842c50-5c87-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695744947 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3842c50-5c87-11ee-8e0e-93298c809ccb + + + diff --git a/graph/incidents_graphml/f/f38d8820-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f38d8820-eb51-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cca980c381349c5de4dc0613bea00cef085aac61 --- /dev/null +++ b/graph/incidents_graphml/f/f38d8820-eb51-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.26 + USER-0015-1817.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655149775 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f38d8820-eb51-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/f/f38e1440-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f38e1440-d360-11ee-82a4-572767498e98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc840037d971b397cd5e627fdfbf2e3424697c34 --- /dev/null +++ b/graph/incidents_graphml/f/f38e1440-d360-11ee-82a4-572767498e98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.240 + 100.64.8.240 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708812385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f38e1440-d360-11ee-82a4-572767498e98 + + + diff --git a/graph/incidents_graphml/f/f3924ec0-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3924ec0-7541-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..041eba045afb1aad8ad83c84c1b126396c4212ee --- /dev/null +++ b/graph/incidents_graphml/f/f3924ec0-7541-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.70 + 100.64.13.70 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698463661 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f3924ec0-7541-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f399b2b0-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f399b2b0-e53f-11ed-b729-bb6ecc5516ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..882afa5e4bd6fbee306595c1a581b7492c442acc --- /dev/null +++ b/graph/incidents_graphml/f/f399b2b0-e53f-11ed-b729-bb6ecc5516ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.68.113 + 100.64.68.113 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1682629835 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f399b2b0-e53f-11ed-b729-bb6ecc5516ca + + + diff --git a/graph/incidents_graphml/f/f3a12120-7afa-11ee-b62a-83f597088d9e.graphml b/graph/incidents_graphml/f/f3a12120-7afa-11ee-b62a-83f597088d9e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3aee9dbd81932a75e8dbe735837021f5b4007582 --- /dev/null +++ b/graph/incidents_graphml/f/f3a12120-7afa-11ee-b62a-83f597088d9e.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.22 + 100.64.38.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.23 + 100.64.38.23 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3a12120-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3a12120-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3a12120-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3a12120-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3a12120-7afa-11ee-b62a-83f597088d9e + + + INCIDENT_LINK + 1699092874 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3a12120-7afa-11ee-b62a-83f597088d9e + + + diff --git a/graph/incidents_graphml/f/f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/f/f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71ae05991856c19d2294c90e504543520a2ac043 --- /dev/null +++ b/graph/incidents_graphml/f/f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.155 + 100.64.78.155 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.2 + 100.64.77.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.156 + 100.64.78.156 + ["Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.75 + 100.64.73.75 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.72 + 100.64.73.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.51 + 100.64.72.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.243 + 100.64.71.243 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.33.134 + 100.64.33.134 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.78.157 + 100.64.78.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.17.47 + 100.64.17.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.158 + 100.64.78.158 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519869 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a48200-f7c7-11ec-bee1-ad5b1c4e4be8 + + + diff --git a/graph/incidents_graphml/f/f3a6c770-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/f/f3a6c770-4efd-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27221bab8fe18d74f5efa62ea681960dbe4e771a --- /dev/null +++ b/graph/incidents_graphml/f/f3a6c770-4efd-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.98 + 100.64.17.98 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694256311 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3a6c770-4efd-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/f/f3a8a0b0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml b/graph/incidents_graphml/f/f3a8a0b0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cb67254ede0e41382b33da0a5a81d0a33feedab --- /dev/null +++ b/graph/incidents_graphml/f/f3a8a0b0-f7c7-11ec-bee1-ad5b1c4e4be8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.121 + 100.64.77.121 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.167 + 100.64.72.167 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656519870 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a8a0b0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + INCIDENT_LINK + 1656519870 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a8a0b0-f7c7-11ec-bee1-ad5b1c4e4be8 + + + diff --git a/graph/incidents_graphml/f/f3a9cd60-5ce2-11ee-888f-c5a21ae2b888.graphml b/graph/incidents_graphml/f/f3a9cd60-5ce2-11ee-888f-c5a21ae2b888.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a2ddeb63530f478da13ce89b13a15c98383bae9 --- /dev/null +++ b/graph/incidents_graphml/f/f3a9cd60-5ce2-11ee-888f-c5a21ae2b888.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.3 + 100.64.15.3 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.73 + 100.64.44.73 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.74 + 100.64.44.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.74 + 100.64.14.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.75 + 100.64.44.75 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.76 + 100.64.44.76 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3a9cd60-5ce2-11ee-888f-c5a21ae2b888 + + + diff --git a/graph/incidents_graphml/f/f3ab1220-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f3ab1220-d360-11ee-82a4-572767498e98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f21877e24a37edca1e182c28416d8c6b0f894cb --- /dev/null +++ b/graph/incidents_graphml/f/f3ab1220-d360-11ee-82a4-572767498e98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.240 + 100.64.8.240 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708812385 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f3ab1220-d360-11ee-82a4-572767498e98 + + + diff --git a/graph/incidents_graphml/f/f3b7bec0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f3b7bec0-a1fc-11ee-b2e6-711be6db0b61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..047abc42115c736457565fa302b9b666fb2fc1f0 --- /dev/null +++ b/graph/incidents_graphml/f/f3b7bec0-a1fc-11ee-b2e6-711be6db0b61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.95 + 100.64.33.95 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703381828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3b7bec0-a1fc-11ee-b2e6-711be6db0b61 + + + diff --git a/graph/incidents_graphml/f/f3c55f60-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/f3c55f60-a05b-11ed-9aec-656149dc5369.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66c18d080d45347c1f622c195051438bbac1f56d --- /dev/null +++ b/graph/incidents_graphml/f/f3c55f60-a05b-11ed-9aec-656149dc5369.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.91.14 + 100.64.91.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675055231 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f3c55f60-a05b-11ed-9aec-656149dc5369 + + + diff --git a/graph/incidents_graphml/f/f3c77630-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f3c77630-a1fc-11ee-b2e6-711be6db0b61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16d68fd335a384968f5e8ae303061d20558e3a1a --- /dev/null +++ b/graph/incidents_graphml/f/f3c77630-a1fc-11ee-b2e6-711be6db0b61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.95 + 100.64.33.95 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703381828 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f3c77630-a1fc-11ee-b2e6-711be6db0b61 + + + diff --git a/graph/incidents_graphml/f/f3c7c550-452b-11ee-8b8f-a1a07f616025.graphml b/graph/incidents_graphml/f/f3c7c550-452b-11ee-8b8f-a1a07f616025.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b164629f0b7da659119b8e7c335bf9aa72d2b00f --- /dev/null +++ b/graph/incidents_graphml/f/f3c7c550-452b-11ee-8b8f-a1a07f616025.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.225 + 100.64.5.225 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176557 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3c7c550-452b-11ee-8b8f-a1a07f616025 + + + INCIDENT_LINK + 1693176557 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3c7c550-452b-11ee-8b8f-a1a07f616025 + + + diff --git a/graph/incidents_graphml/f/f3cac040-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f3cac040-f4ab-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d66126553dd3e704cb41df79381ded09c76dd60c --- /dev/null +++ b/graph/incidents_graphml/f/f3cac040-f4ab-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.127 + 100.64.65.127 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712472986 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3cac040-f4ab-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/f/f3cd5b40-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f3cd5b40-11e8-11ed-97d5-3360f7274b74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b075b2cc7cf209346b87dd28b208a5e4e94ed07f --- /dev/null +++ b/graph/incidents_graphml/f/f3cd5b40-11e8-11ed-97d5-3360f7274b74.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.138 + 100.64.77.138 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.221 + 100.64.71.221 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659392773 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3cd5b40-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392773 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3cd5b40-11e8-11ed-97d5-3360f7274b74 + + + diff --git a/graph/incidents_graphml/f/f3d6ed30-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f3d6ed30-eb51-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d21dd93517322ef6f3fe8308ea8b25f4bfa8293 --- /dev/null +++ b/graph/incidents_graphml/f/f3d6ed30-eb51-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.26 + USER-0015-1817.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655149775 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f3d6ed30-eb51-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/f/f3d86620-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f3d86620-a1fc-11ee-b2e6-711be6db0b61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6defb696c92fad165654836403bdf3a14e0b32f2 --- /dev/null +++ b/graph/incidents_graphml/f/f3d86620-a1fc-11ee-b2e6-711be6db0b61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.116 + 100.64.49.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703381829 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f3d86620-a1fc-11ee-b2e6-711be6db0b61 + + + diff --git a/graph/incidents_graphml/f/f3dc5010-7541-11ee-8b17-61801d88c129.graphml b/graph/incidents_graphml/f/f3dc5010-7541-11ee-8b17-61801d88c129.graphml new file mode 100644 index 0000000000000000000000000000000000000000..feddf2b936685869cde57032c7c9c0d9d88ad3ca --- /dev/null +++ b/graph/incidents_graphml/f/f3dc5010-7541-11ee-8b17-61801d88c129.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.105 + 100.64.29.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698463662 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3dc5010-7541-11ee-8b17-61801d88c129 + + + diff --git a/graph/incidents_graphml/f/f3e09230-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f3e09230-f4ab-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec08dd14fe269bffd5bbb49b28b6d546616cf8d3 --- /dev/null +++ b/graph/incidents_graphml/f/f3e09230-f4ab-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.127 + 100.64.65.127 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712472986 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f3e09230-f4ab-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/f/f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6.graphml b/graph/incidents_graphml/f/f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc924fcc65fc1b8897e7c8fe114f99597223b375 --- /dev/null +++ b/graph/incidents_graphml/f/f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.19 + 100.64.25.19 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Azure Security"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.182 + 100.64.40.182 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.162 + 100.64.9.162 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.49 + 100.64.23.49 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.97 + 100.64.38.97 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.183 + 100.64.40.183 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.152 + 100.64.10.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597997 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3e328d0-9adb-11ee-a9ab-0bd9fddee9c6 + + + diff --git a/graph/incidents_graphml/f/f3e68310-1145-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/f3e68310-1145-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6590c201bf08fd4cbc6089e38b3d79eb9aa3271 --- /dev/null +++ b/graph/incidents_graphml/f/f3e68310-1145-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.189 + 100.64.18.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.151 + 100.64.71.151 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687470263 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3e68310-1145-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687470263 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3e68310-1145-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/f3e844a0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f3e844a0-a1fc-11ee-b2e6-711be6db0b61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9bb82d1c5537e01b622d99fcb677c121db3fdc6a --- /dev/null +++ b/graph/incidents_graphml/f/f3e844a0-a1fc-11ee-b2e6-711be6db0b61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.66 + 100.64.36.66 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703381829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f3e844a0-a1fc-11ee-b2e6-711be6db0b61 + + + diff --git a/graph/incidents_graphml/f/f3e86e40-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f3e86e40-efc3-11ec-9799-0176ac54cf1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7090bc4e3c4a1e43ac65d358ea001b36f435ab3 --- /dev/null +++ b/graph/incidents_graphml/f/f3e86e40-efc3-11ec-9799-0176ac54cf1b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.40 + USER-0015-1612.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655638543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3e86e40-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3e86e40-efc3-11ec-9799-0176ac54cf1b + + + diff --git a/graph/incidents_graphml/f/f3f21e60-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f3f21e60-f4ab-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..993df8098737cab422ae286d29a2b951a3154c4a --- /dev/null +++ b/graph/incidents_graphml/f/f3f21e60-f4ab-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.219 + 100.64.35.219 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712472986 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3f21e60-f4ab-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/f/f3f52e20-179d-11ee-9bde-a75d9ab1122d.graphml b/graph/incidents_graphml/f/f3f52e20-179d-11ee-9bde-a75d9ab1122d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a38b0d2782af7eba2ab9554681e5aa73a1767dd4 --- /dev/null +++ b/graph/incidents_graphml/f/f3f52e20-179d-11ee-9bde-a75d9ab1122d.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.15 + 100.64.82.15 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.234 + 100.64.71.234 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.16 + 100.64.82.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.43.118 + 100.64.43.118 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688167766 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3f52e20-179d-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167766 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3f52e20-179d-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167766 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3f52e20-179d-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167766 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3f52e20-179d-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167766 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3f52e20-179d-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167766 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f3f52e20-179d-11ee-9bde-a75d9ab1122d + + + diff --git a/graph/incidents_graphml/f/f3f786e0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f3f786e0-a1fc-11ee-b2e6-711be6db0b61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b5cb71bae7dfb1da5283aa65bf5e13c95e040a4 --- /dev/null +++ b/graph/incidents_graphml/f/f3f786e0-a1fc-11ee-b2e6-711be6db0b61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.66 + 100.64.36.66 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703381829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f3f786e0-a1fc-11ee-b2e6-711be6db0b61 + + + diff --git a/graph/incidents_graphml/f/f4033560-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f4033560-f4ab-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f0ea23eae1f240aafcfc1e573754b8840302fd7 --- /dev/null +++ b/graph/incidents_graphml/f/f4033560-f4ab-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.219 + 100.64.35.219 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712472986 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4033560-f4ab-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/f/f40590a0-a1fc-11ee-b2e6-711be6db0b61.graphml b/graph/incidents_graphml/f/f40590a0-a1fc-11ee-b2e6-711be6db0b61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..612e9cf7df550b4dd7edb8701bd5e43d54507335 --- /dev/null +++ b/graph/incidents_graphml/f/f40590a0-a1fc-11ee-b2e6-711be6db0b61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.117 + 100.64.49.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703381829 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f40590a0-a1fc-11ee-b2e6-711be6db0b61 + + + diff --git a/graph/incidents_graphml/f/f40ce6d0-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/f40ce6d0-1948-11ee-8b71-f9525f65ac72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70f1515ef9033764a7f60f9014d11c46a983aab5 --- /dev/null +++ b/graph/incidents_graphml/f/f40ce6d0-1948-11ee-8b71-f9525f65ac72.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.97 + 100.64.74.97 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688351161 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f40ce6d0-1948-11ee-8b71-f9525f65ac72 + + + diff --git a/graph/incidents_graphml/f/f40ec610-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f40ec610-eb51-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..424c3bf322e9caffbfd49ff2b7a35e06a69bb1c9 --- /dev/null +++ b/graph/incidents_graphml/f/f40ec610-eb51-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.194 + USER-0015-1818.example.internal + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.79.158 + USER-0015-1819.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655149776 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f40ec610-eb51-11ec-8162-f7a03e680dde + + + INCIDENT_LINK + 1655149776 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f40ec610-eb51-11ec-8162-f7a03e680dde + + + INCIDENT_LINK + 1655149776 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f40ec610-eb51-11ec-8162-f7a03e680dde + + + INCIDENT_LINK + 1655149776 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f40ec610-eb51-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/f/f428ac40-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f428ac40-e53f-11ed-b729-bb6ecc5516ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..966c76bb200725fdd34b88272d25a4d87474850d --- /dev/null +++ b/graph/incidents_graphml/f/f428ac40-e53f-11ed-b729-bb6ecc5516ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.68.114 + 100.64.68.114 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1682629836 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f428ac40-e53f-11ed-b729-bb6ecc5516ca + + + diff --git a/graph/incidents_graphml/f/f435a480-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/f435a480-1948-11ee-8b71-f9525f65ac72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4821a3108b9cc9d9e0721e832085d45a26f0bb59 --- /dev/null +++ b/graph/incidents_graphml/f/f435a480-1948-11ee-8b71-f9525f65ac72.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.97 + 100.64.74.97 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688351162 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f435a480-1948-11ee-8b71-f9525f65ac72 + + + diff --git a/graph/incidents_graphml/f/f435eeb0-0a0a-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/f/f435eeb0-0a0a-11ee-9aea-c52880a9cb1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f71ebd8c2680433f7954d9fc389d1d254cd025cd --- /dev/null +++ b/graph/incidents_graphml/f/f435eeb0-0a0a-11ee-9aea-c52880a9cb1e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.235 + 100.64.11.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.123 + 100.64.71.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686675265 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f435eeb0-0a0a-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675265 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f435eeb0-0a0a-11ee-9aea-c52880a9cb1e + + + diff --git a/graph/incidents_graphml/f/f43ce6d0-29b7-11ee-b86f-6b6c9ebf54e6.graphml b/graph/incidents_graphml/f/f43ce6d0-29b7-11ee-b86f-6b6c9ebf54e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5bde26acfd17332eb215938536a3773b1b51d91 --- /dev/null +++ b/graph/incidents_graphml/f/f43ce6d0-29b7-11ee-b86f-6b6c9ebf54e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.43 + 100.64.28.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690158054 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f43ce6d0-29b7-11ee-b86f-6b6c9ebf54e6 + + + diff --git a/graph/incidents_graphml/f/f4461b60-fd11-11ed-a4b5-cd7044d3b555.graphml b/graph/incidents_graphml/f/f4461b60-fd11-11ed-a4b5-cd7044d3b555.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36cb09efe6bf6e4c802f3b2744e20f95368080f2 --- /dev/null +++ b/graph/incidents_graphml/f/f4461b60-fd11-11ed-a4b5-cd7044d3b555.graphml @@ -0,0 +1,785 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.142 + 100.64.41.142 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.41.162 + 100.64.41.162 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.163 + 100.64.41.163 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.223 + 100.64.19.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.7.34 + 100.64.7.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.164 + 100.64.41.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.41.144 + 100.64.41.144 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.165 + 100.64.41.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.12.23 + 100.64.12.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.235 + 100.64.10.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.41.166 + 100.64.41.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.41.167 + 100.64.41.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.168 + 100.64.41.168 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.169 + 100.64.41.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.13.133 + 100.64.13.133 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.12 + 100.64.19.12 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + INCIDENT_LINK + 1685248907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4461b60-fd11-11ed-a4b5-cd7044d3b555 + + + diff --git a/graph/incidents_graphml/f/f4598ab0-eb51-11ec-8162-f7a03e680dde.graphml b/graph/incidents_graphml/f/f4598ab0-eb51-11ec-8162-f7a03e680dde.graphml new file mode 100644 index 0000000000000000000000000000000000000000..876bb03289f3d9c42c1b5ca3039586fa1fb97120 --- /dev/null +++ b/graph/incidents_graphml/f/f4598ab0-eb51-11ec-8162-f7a03e680dde.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.79.156 + USER-0015-1820.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655149776 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4598ab0-eb51-11ec-8162-f7a03e680dde + + + diff --git a/graph/incidents_graphml/f/f466e9d0-fd11-11ed-a4b5-cd7044d3b555.graphml b/graph/incidents_graphml/f/f466e9d0-fd11-11ed-a4b5-cd7044d3b555.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc469cd7bb2abf7458095b832e704f94b84f4b13 --- /dev/null +++ b/graph/incidents_graphml/f/f466e9d0-fd11-11ed-a4b5-cd7044d3b555.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.41.180 + 100.64.41.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685248907 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f466e9d0-fd11-11ed-a4b5-cd7044d3b555 + + + diff --git a/graph/incidents_graphml/f/f476bd60-0d84-11ed-9b08-71b0edc527ac.graphml b/graph/incidents_graphml/f/f476bd60-0d84-11ed-9b08-71b0edc527ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d83d9b5341e4d95f3d9cbbf25940ac240aa5ec6e --- /dev/null +++ b/graph/incidents_graphml/f/f476bd60-0d84-11ed-9b08-71b0edc527ac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.247 + 100.64.77.247 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658910020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f476bd60-0d84-11ed-9b08-71b0edc527ac + + + diff --git a/graph/incidents_graphml/f/f47d4d10-0d84-11ed-9b08-71b0edc527ac.graphml b/graph/incidents_graphml/f/f47d4d10-0d84-11ed-9b08-71b0edc527ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9cc70592a07ace69fa68049b8f5051cabf1805b --- /dev/null +++ b/graph/incidents_graphml/f/f47d4d10-0d84-11ed-9b08-71b0edc527ac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.247 + 100.64.77.247 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658910020 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f47d4d10-0d84-11ed-9b08-71b0edc527ac + + + diff --git a/graph/incidents_graphml/f/f480f690-0d84-11ed-9b08-71b0edc527ac.graphml b/graph/incidents_graphml/f/f480f690-0d84-11ed-9b08-71b0edc527ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2dba5d58aa32f249c2cb91390034743c214d0c4 --- /dev/null +++ b/graph/incidents_graphml/f/f480f690-0d84-11ed-9b08-71b0edc527ac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.57 + 100.64.74.57 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658910020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f480f690-0d84-11ed-9b08-71b0edc527ac + + + diff --git a/graph/incidents_graphml/f/f4816d70-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/f4816d70-908f-11ee-8556-17eb2ccba952.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9dcb43d5f05eba5ef70233645ebfc54c71e963e --- /dev/null +++ b/graph/incidents_graphml/f/f4816d70-908f-11ee-8556-17eb2ccba952.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.202 + 100.64.6.202 + ["Exploiting Target","Exploiting Host"] + 0.983125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701465845 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4816d70-908f-11ee-8556-17eb2ccba952 + + + INCIDENT_LINK + 1701465845 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4816d70-908f-11ee-8556-17eb2ccba952 + + + diff --git a/graph/incidents_graphml/f/f483f210-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f483f210-6106-11ee-bc15-ebbbf2eb09b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4a6d914ace49b2f75c949321adca4ee1e2a2e75 --- /dev/null +++ b/graph/incidents_graphml/f/f483f210-6106-11ee-bc15-ebbbf2eb09b5.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.12 + 100.64.30.12 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696239299 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f483f210-6106-11ee-bc15-ebbbf2eb09b5 + + + INCIDENT_LINK + 1696239299 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f483f210-6106-11ee-bc15-ebbbf2eb09b5 + + + diff --git a/graph/incidents_graphml/f/f483f740-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f483f740-7e40-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..acdf844b7e6a4d496f05c689074aae4ce41564ea --- /dev/null +++ b/graph/incidents_graphml/f/f483f740-7e40-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.68 + 100.64.46.68 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699452794 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f483f740-7e40-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/f/f487e6a0-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f487e6a0-0a07-11ee-9f50-eb86987e1788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95d9f40c069aa47baa7a74763217bc2ec530b729 --- /dev/null +++ b/graph/incidents_graphml/f/f487e6a0-0a07-11ee-9f50-eb86987e1788.graphml @@ -0,0 +1,755 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.11 + 100.64.29.11 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.12 + 100.64.29.12 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.13 + 100.64.29.13 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.114 + USER-0015-1204.example.internal + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.14 + 100.64.29.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.15 + 100.64.29.15 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.150 + 100.64.19.150 + ["Exploiting Host","Exploiting Target"] + 0.926875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.16 + 100.64.29.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.17 + 100.64.29.17 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.129 + 100.64.25.129 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.18 + 100.64.29.18 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.19 + 100.64.29.19 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.20 + USER-0015-1277.example.internal + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673977 + malicious + 0.926875 + 0.926875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f487e6a0-0a07-11ee-9f50-eb86987e1788 + + + diff --git a/graph/incidents_graphml/f/f4882280-0d84-11ed-9b08-71b0edc527ac.graphml b/graph/incidents_graphml/f/f4882280-0d84-11ed-9b08-71b0edc527ac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c0686d3ae2eafeb042daf06b08834d1d0985803 --- /dev/null +++ b/graph/incidents_graphml/f/f4882280-0d84-11ed-9b08-71b0edc527ac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.57 + 100.64.74.57 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658910020 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4882280-0d84-11ed-9b08-71b0edc527ac + + + diff --git a/graph/incidents_graphml/f/f48b28c0-9200-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/f/f48b28c0-9200-11ee-ac87-cff3005068fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88f50db717b77d4ffe67406c4d64433abb2b43e2 --- /dev/null +++ b/graph/incidents_graphml/f/f48b28c0-9200-11ee-ac87-cff3005068fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.144 + 100.64.10.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701624329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f48b28c0-9200-11ee-ac87-cff3005068fb + + + diff --git a/graph/incidents_graphml/f/f4958370-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f4958370-7e40-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84969b03984609d800a140c91d34c13ee5e6aa52 --- /dev/null +++ b/graph/incidents_graphml/f/f4958370-7e40-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.68 + 100.64.46.68 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699452794 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4958370-7e40-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/f/f4981340-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f4981340-0a07-11ee-9f50-eb86987e1788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..631fdf28874fec0d016d01fe381651099390b052 --- /dev/null +++ b/graph/incidents_graphml/f/f4981340-0a07-11ee-9f50-eb86987e1788.graphml @@ -0,0 +1,747 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.31 + 100.64.29.31 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.192 + 100.64.14.192 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.32 + 100.64.29.32 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.20.74 + 172.24.20.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.33 + 100.64.29.33 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.5 + 100.64.19.5 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.34 + USER-0015-1278.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.35 + 100.64.29.35 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.19 + 100.64.9.19 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.36 + 100.64.29.36 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.37 + 100.64.29.37 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.75 + 100.64.21.75 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.38 + 100.64.29.38 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.100 + 100.64.24.100 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.113 + 100.64.11.113 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.39 + 100.64.29.39 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.209 + 100.64.14.209 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4981340-0a07-11ee-9f50-eb86987e1788 + + + diff --git a/graph/incidents_graphml/f/f49abd60-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f49abd60-11e8-11ed-97d5-3360f7274b74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f5124e0be3d420dedec68bde304eed54d7d4c85 --- /dev/null +++ b/graph/incidents_graphml/f/f49abd60-11e8-11ed-97d5-3360f7274b74.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.172 + 100.64.72.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.23.247 + 100.64.23.247 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.139 + 100.64.77.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.77.12 + 100.64.77.12 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.2.213 + 100.64.2.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.140 + 100.64.77.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.141 + 100.64.77.141 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f49abd60-11e8-11ed-97d5-3360f7274b74 + + + diff --git a/graph/incidents_graphml/f/f4a1a6d0-9c9c-11ee-b60c-751684393f5d.graphml b/graph/incidents_graphml/f/f4a1a6d0-9c9c-11ee-b60c-751684393f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ee4d7629df1fc6d767d528284a5572708f29865 --- /dev/null +++ b/graph/incidents_graphml/f/f4a1a6d0-9c9c-11ee-b60c-751684393f5d.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.124 + 100.64.68.124 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.68.125 + 100.64.68.125 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1702790842 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4a1a6d0-9c9c-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702790842 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4a1a6d0-9c9c-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702790842 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4a1a6d0-9c9c-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702790842 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4a1a6d0-9c9c-11ee-b60c-751684393f5d + + + diff --git a/graph/incidents_graphml/f/f4a592d0-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f4a592d0-11e8-11ed-97d5-3360f7274b74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b64f5d9f6bf7ee4ca0ffabc43c0f614aa96283e8 --- /dev/null +++ b/graph/incidents_graphml/f/f4a592d0-11e8-11ed-97d5-3360f7274b74.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.201 + 100.64.13.201 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.2 + 100.64.77.2 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659392775 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4a592d0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392775 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4a592d0-11e8-11ed-97d5-3360f7274b74 + + + diff --git a/graph/incidents_graphml/f/f4b00810-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f4b00810-0a07-11ee-9f50-eb86987e1788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04c15733cdf8945971f2a0bac57f27a622b7216b --- /dev/null +++ b/graph/incidents_graphml/f/f4b00810-0a07-11ee-9f50-eb86987e1788.graphml @@ -0,0 +1,817 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.49 + 100.64.29.49 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.153 + 100.64.3.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + HOST-2906 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.50 + 100.64.29.50 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.143 + 100.64.10.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.14 + 100.64.5.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.51 + 100.64.29.51 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.52 + 100.64.29.52 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.53 + 100.64.29.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.73 + 100.64.27.73 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.54 + 100.64.29.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4b00810-0a07-11ee-9f50-eb86987e1788 + + + diff --git a/graph/incidents_graphml/f/f4b89340-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4b89340-14d5-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8da9d9a3580f23b3220191ad009abc6852bd8720 --- /dev/null +++ b/graph/incidents_graphml/f/f4b89340-14d5-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.223 + 100.64.88.223 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659714468 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4b89340-14d5-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/f/f4c0d0a0-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4c0d0a0-14d5-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7dc1bf6d59e23161fc7acd0a7b80258baa3014b0 --- /dev/null +++ b/graph/incidents_graphml/f/f4c0d0a0-14d5-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.223 + 100.64.88.223 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659714468 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4c0d0a0-14d5-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/f/f4c447c0-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f4c447c0-5b66-11ee-a387-a18350d70540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9bb797721d84df53e8c1afae0671c8e82f70557a --- /dev/null +++ b/graph/incidents_graphml/f/f4c447c0-5b66-11ee-a387-a18350d70540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.217 + 100.64.5.217 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695620824 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4c447c0-5b66-11ee-a387-a18350d70540 + + + diff --git a/graph/incidents_graphml/f/f4c45310-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4c45310-14d5-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f622a78ab44ee14ae87e3192ee53c3e2ceb18777 --- /dev/null +++ b/graph/incidents_graphml/f/f4c45310-14d5-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.227 + 100.64.88.227 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1659714468 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4c45310-14d5-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/f/f4c48d20-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f4c48d20-4ef5-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41c2b7ad2c259b1041d889a076748dd0d496c674 --- /dev/null +++ b/graph/incidents_graphml/f/f4c48d20-4ef5-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694252877 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4c48d20-4ef5-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/f/f4ca4680-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4ca4680-14d5-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b38fcbca85c7cf44c41c574b03c7d9c38f8569f8 --- /dev/null +++ b/graph/incidents_graphml/f/f4ca4680-14d5-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.88.227 + 100.64.88.227 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659714468 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4ca4680-14d5-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/f/f4caae40-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/f4caae40-003e-11ee-a334-5be386c18109.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa4eb8f3ce4f323a9d9e73b3ce5eeda0758b5fd0 --- /dev/null +++ b/graph/incidents_graphml/f/f4caae40-003e-11ee-a334-5be386c18109.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.61 + 100.64.16.61 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685598089 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4caae40-003e-11ee-a334-5be386c18109 + + + diff --git a/graph/incidents_graphml/f/f4cf93f0-176e-11ee-a7dc-57e99513cc0a.graphml b/graph/incidents_graphml/f/f4cf93f0-176e-11ee-a7dc-57e99513cc0a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05b02757c09adeed533f67a48cc9c8750f96d135 --- /dev/null +++ b/graph/incidents_graphml/f/f4cf93f0-176e-11ee-a7dc-57e99513cc0a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.71 + 100.64.68.71 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1688147581 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4cf93f0-176e-11ee-a7dc-57e99513cc0a + + + diff --git a/graph/incidents_graphml/f/f4d2aaf0-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4d2aaf0-14d5-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f434c906b3a3bf362dbc0f23e19fe88a10a45d46 --- /dev/null +++ b/graph/incidents_graphml/f/f4d2aaf0-14d5-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.3.104 + 100.64.3.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659714468 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4d2aaf0-14d5-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/f/f4d93af0-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f4d93af0-0a07-11ee-9f50-eb86987e1788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc5e3e9a120903c3020232b2ed038146f1110c58 --- /dev/null +++ b/graph/incidents_graphml/f/f4d93af0-0a07-11ee-9f50-eb86987e1788.graphml @@ -0,0 +1,509 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.187 + 100.64.13.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.61 + 100.64.29.61 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.51 + 100.64.18.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.13 + 100.64.11.13 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.176 + 100.64.5.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.246 + 100.64.28.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.62 + 100.64.29.62 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.63 + 100.64.29.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.64 + 100.64.29.64 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.65 + 100.64.29.65 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.66 + 100.64.29.66 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673978 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d93af0-0a07-11ee-9f50-eb86987e1788 + + + diff --git a/graph/incidents_graphml/f/f4d961b0-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4d961b0-14d5-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb66a2f0926607f70309223ee46a78a786061491 --- /dev/null +++ b/graph/incidents_graphml/f/f4d961b0-14d5-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.228 + 100.64.88.228 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1659714468 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4d961b0-14d5-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/f/f4db5230-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f4db5230-5b66-11ee-a387-a18350d70540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18b93102cbccdd7dfdf70ad01fde94ef37ce1b2d --- /dev/null +++ b/graph/incidents_graphml/f/f4db5230-5b66-11ee-a387-a18350d70540.graphml @@ -0,0 +1,655 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.85 + 100.64.3.85 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.18 + 100.64.12.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.15 + 100.64.31.15 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.126 + 100.64.35.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.123 + 100.64.28.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.48 + 100.64.19.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.151 + 100.64.10.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.127 + 100.64.35.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.173 + 100.64.26.173 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.148 + 100.64.8.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.128 + 100.64.35.128 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.129 + 100.64.35.129 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.79 + 100.64.11.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.130 + 100.64.35.130 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.131 + 100.64.35.131 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + INCIDENT_LINK + 1695620824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4db5230-5b66-11ee-a387-a18350d70540 + + + diff --git a/graph/incidents_graphml/f/f4dd1e30-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f4dd1e30-4ef5-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4e7cf03792065f0046351c74e86524f09974294 --- /dev/null +++ b/graph/incidents_graphml/f/f4dd1e30-4ef5-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.164 + 100.64.9.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694252877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f4dd1e30-4ef5-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/f/f4df1430-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f4df1430-eaea-11ec-aec0-8378f7a1d324.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4f3a438de931296e2cc67d58eb3026433ca1b72 --- /dev/null +++ b/graph/incidents_graphml/f/f4df1430-eaea-11ec-aec0-8378f7a1d324.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.175 + USER-0015-1788.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655105539 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4df1430-eaea-11ec-aec0-8378f7a1d324 + + + diff --git a/graph/incidents_graphml/f/f4e01870-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4e01870-14d5-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9997be7b75052b24ecf22a274a9f9d1f2931c35f --- /dev/null +++ b/graph/incidents_graphml/f/f4e01870-14d5-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.88.228 + 100.64.88.228 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659714468 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4e01870-14d5-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/f/f4e146b0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f4e146b0-2ea5-11ee-a61f-7552bb17f553.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2833502a556d4aeb3fb3c119a8d44d911a77800 --- /dev/null +++ b/graph/incidents_graphml/f/f4e146b0-2ea5-11ee-a61f-7552bb17f553.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.41 + 100.64.33.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690700080 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4e146b0-2ea5-11ee-a61f-7552bb17f553 + + + diff --git a/graph/incidents_graphml/f/f4e60be0-14d5-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/f/f4e60be0-14d5-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..879bc28b94d79edf2c37bcd17f11de41f63bbed9 --- /dev/null +++ b/graph/incidents_graphml/f/f4e60be0-14d5-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.229 + 100.64.88.229 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1659714468 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4e60be0-14d5-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/f/f4ea94d0-a00c-11ee-a147-6d5e36330663.graphml b/graph/incidents_graphml/f/f4ea94d0-a00c-11ee-a147-6d5e36330663.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ba9dee3d05f8548fd7e64e0a0aa57866bbdeb73 --- /dev/null +++ b/graph/incidents_graphml/f/f4ea94d0-a00c-11ee-a147-6d5e36330663.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.77 + 100.64.41.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.234 + 100.64.32.234 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.78 + 100.64.41.78 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.79 + 100.64.41.79 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.204 + 100.64.34.204 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.125 + 100.64.12.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.248 + 100.64.33.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168800 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4ea94d0-a00c-11ee-a147-6d5e36330663 + + + diff --git a/graph/incidents_graphml/f/f4eabb80-5b66-11ee-a387-a18350d70540.graphml b/graph/incidents_graphml/f/f4eabb80-5b66-11ee-a387-a18350d70540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c47e9589914776e4f8980afcc6d43d7acfa24d83 --- /dev/null +++ b/graph/incidents_graphml/f/f4eabb80-5b66-11ee-a387-a18350d70540.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.85 + 100.64.3.85 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695620824 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4eabb80-5b66-11ee-a387-a18350d70540 + + + diff --git a/graph/incidents_graphml/f/f4ee3bd0-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/f4ee3bd0-003e-11ee-a334-5be386c18109.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df0a207603ee1b97b7161773d31b47bf389d52f5 --- /dev/null +++ b/graph/incidents_graphml/f/f4ee3bd0-003e-11ee-a334-5be386c18109.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.16.61 + 100.64.16.61 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685598089 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f4ee3bd0-003e-11ee-a334-5be386c18109 + + + diff --git a/graph/incidents_graphml/f/f4fbfaa0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f4fbfaa0-2ea5-11ee-a61f-7552bb17f553.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2291831721e1488762aa8549e3dc583270f290e1 --- /dev/null +++ b/graph/incidents_graphml/f/f4fbfaa0-2ea5-11ee-a61f-7552bb17f553.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.41 + 100.64.33.41 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690700081 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f4fbfaa0-2ea5-11ee-a61f-7552bb17f553 + + + diff --git a/graph/incidents_graphml/f/f4fd5040-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f4fd5040-9268-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b96fe2e2c5851d88c997e2c90df9dbf2b56c775 --- /dev/null +++ b/graph/incidents_graphml/f/f4fd5040-9268-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.151 + 100.64.39.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701668998 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f4fd5040-9268-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/f/f5078d50-9b17-11ee-a7a5-af0e8425a262.graphml b/graph/incidents_graphml/f/f5078d50-9b17-11ee-a7a5-af0e8425a262.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b47791d44bd94803b0b5fffe60d0abad7c29fb66 --- /dev/null +++ b/graph/incidents_graphml/f/f5078d50-9b17-11ee-a7a5-af0e8425a262.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.143 + 100.64.31.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702623769 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f5078d50-9b17-11ee-a7a5-af0e8425a262 + + + diff --git a/graph/incidents_graphml/f/f50e4030-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f50e4030-9268-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c271c933d1335cc5043b610db508653b20b82d83 --- /dev/null +++ b/graph/incidents_graphml/f/f50e4030-9268-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.151 + 100.64.39.151 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701668998 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f50e4030-9268-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/f/f5108a40-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f5108a40-4ef5-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc72ff49be065cf859ed9c7c3caa938250dfc57e --- /dev/null +++ b/graph/incidents_graphml/f/f5108a40-4ef5-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.164 + 100.64.9.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694252878 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f5108a40-4ef5-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/f/f5116ed0-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f5116ed0-eaea-11ec-aec0-8378f7a1d324.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11c467d8c0d42354f643808f0c34140a27fed6a4 --- /dev/null +++ b/graph/incidents_graphml/f/f5116ed0-eaea-11ec-aec0-8378f7a1d324.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.172 + USER-0015-1789.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.76.60 + 100.64.76.60 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655105539 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5116ed0-eaea-11ec-aec0-8378f7a1d324 + + + diff --git a/graph/incidents_graphml/f/f5199af0-07d1-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/f/f5199af0-07d1-11ef-8107-af8140eb4c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14203c40f16aa13cd14aef2d4190b7b3c50a0dfd --- /dev/null +++ b/graph/incidents_graphml/f/f5199af0-07d1-11ef-8107-af8140eb4c5b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.87.5 + 100.64.87.5 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 172.16.46.208 + 172.16.46.208 + ["Exploiting Host"] + 0.578125 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + INCIDENT_LINK + 1714578381 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5199af0-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578381 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5199af0-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578381 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5199af0-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578381 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5199af0-07d1-11ef-8107-af8140eb4c5b + + + diff --git a/graph/incidents_graphml/f/f525b050-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/f/f525b050-1f1b-11ee-9e2e-57c890ee02a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7393d0aff2fb36323e4c475610eb3433690517e --- /dev/null +++ b/graph/incidents_graphml/f/f525b050-1f1b-11ee-9e2e-57c890ee02a2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.38 + USER-0015-1290.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688991543 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f525b050-1f1b-11ee-9e2e-57c890ee02a2 + + + diff --git a/graph/incidents_graphml/f/f52e2460-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f52e2460-4ef5-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb48330f484fd50cbd8d2c1c13f881ed4f8cb4cf --- /dev/null +++ b/graph/incidents_graphml/f/f52e2460-4ef5-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.204 + 100.64.2.204 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694252878 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f52e2460-4ef5-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/f/f53664e0-3eff-11ef-a3c1-8be1e2d87500.graphml b/graph/incidents_graphml/f/f53664e0-3eff-11ef-a3c1-8be1e2d87500.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e514fc77758ba47791da3d5315effbce8bd2a94 --- /dev/null +++ b/graph/incidents_graphml/f/f53664e0-3eff-11ef-a3c1-8be1e2d87500.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.100 + 100.64.22.100 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720645452 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f53664e0-3eff-11ef-a3c1-8be1e2d87500 + + + diff --git a/graph/incidents_graphml/f/f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6.graphml b/graph/incidents_graphml/f/f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9f626fb1fa02bfb4ce32852e98319f45e034414 --- /dev/null +++ b/graph/incidents_graphml/f/f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.186 + 100.64.40.186 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.187 + 100.64.40.187 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.188 + 100.64.40.188 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.44 + 100.64.10.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.189 + 100.64.40.189 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.190 + 100.64.40.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.191 + 100.64.40.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.194 + 100.64.24.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.192 + 100.64.40.192 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.193 + 100.64.40.193 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.187 + 100.64.4.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.192 + 100.64.9.192 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.19 + 100.64.9.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.194 + 100.64.40.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.184 + 100.64.33.184 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702597999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f53a7b70-9adb-11ee-a9ab-0bd9fddee9c6 + + + diff --git a/graph/incidents_graphml/f/f54498f0-4efd-11ee-81d4-670b4c6897d4.graphml b/graph/incidents_graphml/f/f54498f0-4efd-11ee-81d4-670b4c6897d4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46ba8b1a2cf6f5c7f4b6b864c57ce58c54682bec --- /dev/null +++ b/graph/incidents_graphml/f/f54498f0-4efd-11ee-81d4-670b4c6897d4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.180 + 100.64.25.180 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694256314 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f54498f0-4efd-11ee-81d4-670b4c6897d4 + + + diff --git a/graph/incidents_graphml/f/f5480f30-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f5480f30-eaea-11ec-aec0-8378f7a1d324.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cca6118343d7ca86be47e795468fc8927fdbd41f --- /dev/null +++ b/graph/incidents_graphml/f/f5480f30-eaea-11ec-aec0-8378f7a1d324.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.45 + USER-0015-1790.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655105540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5480f30-eaea-11ec-aec0-8378f7a1d324 + + + diff --git a/graph/incidents_graphml/f/f54c6900-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f54c6900-06ef-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ae375d892faefb6157bd67d807bc4d23b8507d9 --- /dev/null +++ b/graph/incidents_graphml/f/f54c6900-06ef-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.118 + 100.64.21.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686333817 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f54c6900-06ef-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/f/f55348e0-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f55348e0-efc3-11ec-9799-0176ac54cf1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c78c4c10eefa9ce8d8ab7f25933c992d001f4ef5 --- /dev/null +++ b/graph/incidents_graphml/f/f55348e0-efc3-11ec-9799-0176ac54cf1b.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.209 + 100.64.72.209 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.127 + USER-0015-1843.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.163 + 100.64.80.163 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.95 + 100.64.74.95 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655638545 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f55348e0-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638545 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f55348e0-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638545 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f55348e0-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638545 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f55348e0-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638545 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f55348e0-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638545 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f55348e0-efc3-11ec-9799-0176ac54cf1b + + + diff --git a/graph/incidents_graphml/f/f5561b30-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f5561b30-f4ab-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80b6d0ee2b1184c4217700bddc99ea77846296c7 --- /dev/null +++ b/graph/incidents_graphml/f/f5561b30-f4ab-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.129 + 100.64.65.129 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712472988 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5561b30-f4ab-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/f/f5622cb0-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f5622cb0-4ef5-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f894a1db3b2702837ec28392704938be4148552e --- /dev/null +++ b/graph/incidents_graphml/f/f5622cb0-4ef5-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694252878 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f5622cb0-4ef5-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/f/f5654830-06ef-11ee-a6b9-2fa958ecde6f.graphml b/graph/incidents_graphml/f/f5654830-06ef-11ee-a6b9-2fa958ecde6f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d30a893e26f09bb949570c5b505994d1bb661e56 --- /dev/null +++ b/graph/incidents_graphml/f/f5654830-06ef-11ee-a6b9-2fa958ecde6f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.118 + 100.64.21.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686333818 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5654830-06ef-11ee-a6b9-2fa958ecde6f + + + diff --git a/graph/incidents_graphml/f/f56ab4a0-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f56ab4a0-f4ab-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0b9070bccd6e7c87a8a721131c50493668c7b7b --- /dev/null +++ b/graph/incidents_graphml/f/f56ab4a0-f4ab-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.129 + 100.64.65.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712472988 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f56ab4a0-f4ab-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/f/f56d9890-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f56d9890-eaea-11ec-aec0-8378f7a1d324.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43cc6c5f5860cebe65ba142691be112fde903eaa --- /dev/null +++ b/graph/incidents_graphml/f/f56d9890-eaea-11ec-aec0-8378f7a1d324.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.45 + USER-0015-1790.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655105540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f56d9890-eaea-11ec-aec0-8378f7a1d324 + + + diff --git a/graph/incidents_graphml/f/f570ab80-9268-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/f/f570ab80-9268-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a6ff3b603649c75106e77f2ca0a7f763e21198f --- /dev/null +++ b/graph/incidents_graphml/f/f570ab80-9268-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.208 + 100.64.58.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701668998 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f570ab80-9268-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/f/f577d790-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f577d790-4ef5-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4187b0d50a73e180bdea99e60c06dfc00530bce --- /dev/null +++ b/graph/incidents_graphml/f/f577d790-4ef5-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.164 + 100.64.9.164 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694252878 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f577d790-4ef5-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/f/f57b9210-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f57b9210-e53f-11ed-b729-bb6ecc5516ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cac8456127c1704926a0f07dee3a8468777159d8 --- /dev/null +++ b/graph/incidents_graphml/f/f57b9210-e53f-11ed-b729-bb6ecc5516ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.115 + 100.64.68.115 + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + 0.7890625 + ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"] + + + INCIDENT_LINK + 1682629838 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f57b9210-e53f-11ed-b729-bb6ecc5516ca + + + diff --git a/graph/incidents_graphml/f/f582abf0-179d-11ee-9bde-a75d9ab1122d.graphml b/graph/incidents_graphml/f/f582abf0-179d-11ee-9bde-a75d9ab1122d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59bd25fdda94fe82e78a15f338db193a7e9a31b3 --- /dev/null +++ b/graph/incidents_graphml/f/f582abf0-179d-11ee-9bde-a75d9ab1122d.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.233 + 100.64.19.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.121 + 100.64.71.121 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.32.100 + 100.64.32.100 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688167769 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f582abf0-179d-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167769 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f582abf0-179d-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167769 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f582abf0-179d-11ee-9bde-a75d9ab1122d + + + INCIDENT_LINK + 1688167769 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f582abf0-179d-11ee-9bde-a75d9ab1122d + + + diff --git a/graph/incidents_graphml/f/f5884420-285a-11ee-a03d-7b364f1dc27e.graphml b/graph/incidents_graphml/f/f5884420-285a-11ee-a03d-7b364f1dc27e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89f67cbf4889e2d25237f51716f9f496ef85061c --- /dev/null +++ b/graph/incidents_graphml/f/f5884420-285a-11ee-a03d-7b364f1dc27e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.171 + 100.64.32.171 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690008162 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f5884420-285a-11ee-a03d-7b364f1dc27e + + + diff --git a/graph/incidents_graphml/f/f58c80e0-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f58c80e0-54af-11ee-b23a-419638593710.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35377de2c6a16e21043f03f3fc3222c12d673d00 --- /dev/null +++ b/graph/incidents_graphml/f/f58c80e0-54af-11ee-b23a-419638593710.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.121 + 100.64.7.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694882521 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f58c80e0-54af-11ee-b23a-419638593710 + + + diff --git a/graph/incidents_graphml/f/f597dce0-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f597dce0-eaea-11ec-aec0-8378f7a1d324.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad71cea2d05c2f4c3fbec04d5d607680a926e6cf --- /dev/null +++ b/graph/incidents_graphml/f/f597dce0-eaea-11ec-aec0-8378f7a1d324.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.171 + USER-0015-1791.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655105540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f597dce0-eaea-11ec-aec0-8378f7a1d324 + + + diff --git a/graph/incidents_graphml/f/f59b1700-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f59b1700-4ef5-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a086e86a7f25988f0b807c3390fa32d270f1342 --- /dev/null +++ b/graph/incidents_graphml/f/f59b1700-4ef5-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694252879 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f59b1700-4ef5-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/f/f59d0d80-3825-11ee-b5a7-eb9164a8ca63.graphml b/graph/incidents_graphml/f/f59d0d80-3825-11ee-b5a7-eb9164a8ca63.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d003e3a4eabacce174c14f7d4a5e6d4eb7314f5 --- /dev/null +++ b/graph/incidents_graphml/f/f59d0d80-3825-11ee-b5a7-eb9164a8ca63.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.140 + 100.64.70.140 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1691744618 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f59d0d80-3825-11ee-b5a7-eb9164a8ca63 + + + INCIDENT_LINK + 1691744618 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f59d0d80-3825-11ee-b5a7-eb9164a8ca63 + + + diff --git a/graph/incidents_graphml/f/f59ef890-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f59ef890-e53f-11ed-b729-bb6ecc5516ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..127835ec6c65c4af6803ed4042d170128687538d --- /dev/null +++ b/graph/incidents_graphml/f/f59ef890-e53f-11ed-b729-bb6ecc5516ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.68.116 + 100.64.68.116 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1682629838 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f59ef890-e53f-11ed-b729-bb6ecc5516ca + + + diff --git a/graph/incidents_graphml/f/f59fbac0-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f59fbac0-54af-11ee-b23a-419638593710.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2024b2997c827b944e71b86ee499d7ac74ced6b --- /dev/null +++ b/graph/incidents_graphml/f/f59fbac0-54af-11ee-b23a-419638593710.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.121 + 100.64.7.121 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694882521 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f59fbac0-54af-11ee-b23a-419638593710 + + + diff --git a/graph/incidents_graphml/f/f5ad8d90-4ef5-11ee-ad39-cfd1e51583fa.graphml b/graph/incidents_graphml/f/f5ad8d90-4ef5-11ee-ad39-cfd1e51583fa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a80eec574f4a153fb5a9a1da3b1a9e6b707a3295 --- /dev/null +++ b/graph/incidents_graphml/f/f5ad8d90-4ef5-11ee-ad39-cfd1e51583fa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.61 + 100.64.27.61 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694252879 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f5ad8d90-4ef5-11ee-ad39-cfd1e51583fa + + + diff --git a/graph/incidents_graphml/f/f5b9bcc0-eaea-11ec-aec0-8378f7a1d324.graphml b/graph/incidents_graphml/f/f5b9bcc0-eaea-11ec-aec0-8378f7a1d324.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcfe91eb6916460ed34c210f7e3d05c8971f3084 --- /dev/null +++ b/graph/incidents_graphml/f/f5b9bcc0-eaea-11ec-aec0-8378f7a1d324.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.78.171 + USER-0015-1791.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655105540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f5b9bcc0-eaea-11ec-aec0-8378f7a1d324 + + + diff --git a/graph/incidents_graphml/f/f5ba7c60-15fe-11ee-b6c1-6f3fa2e3bf20.graphml b/graph/incidents_graphml/f/f5ba7c60-15fe-11ee-b6c1-6f3fa2e3bf20.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d938670bac2e84ba5cd0f40c664eae9c381b19f --- /dev/null +++ b/graph/incidents_graphml/f/f5ba7c60-15fe-11ee-b6c1-6f3fa2e3bf20.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.100 + 100.64.69.100 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1687989528 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5ba7c60-15fe-11ee-b6c1-6f3fa2e3bf20 + + + INCIDENT_LINK + 1687989528 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5ba7c60-15fe-11ee-b6c1-6f3fa2e3bf20 + + + diff --git a/graph/incidents_graphml/f/f5bd9260-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/f5bd9260-04ca-11ed-ab4e-45e26abbd382.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a6982ca64869bec61bd013af23095847a7a3a12 --- /dev/null +++ b/graph/incidents_graphml/f/f5bd9260-04ca-11ed-ab4e-45e26abbd382.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.21 + 100.64.76.21 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.211 + 100.64.72.211 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657950527 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5bd9260-04ca-11ed-ab4e-45e26abbd382 + + + INCIDENT_LINK + 1657950527 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5bd9260-04ca-11ed-ab4e-45e26abbd382 + + + diff --git a/graph/incidents_graphml/f/f5bf8e30-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/f5bf8e30-04ca-11ed-ab4e-45e26abbd382.graphml new file mode 100644 index 0000000000000000000000000000000000000000..334294ad76fe72b7379671725731ae6afff4a03f --- /dev/null +++ b/graph/incidents_graphml/f/f5bf8e30-04ca-11ed-ab4e-45e26abbd382.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.5 + 100.64.76.5 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.77.184 + 100.64.77.184 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657950527 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5bf8e30-04ca-11ed-ab4e-45e26abbd382 + + + INCIDENT_LINK + 1657950527 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5bf8e30-04ca-11ed-ab4e-45e26abbd382 + + + diff --git a/graph/incidents_graphml/f/f5c0ffe0-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f5c0ffe0-1445-11ef-8b63-6b6087068682.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d1a3c1e4ab7f0cbe7dce3215a56aa14758c379a --- /dev/null +++ b/graph/incidents_graphml/f/f5c0ffe0-1445-11ef-8b63-6b6087068682.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.128 + 100.64.52.128 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715947618 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5c0ffe0-1445-11ef-8b63-6b6087068682 + + + diff --git a/graph/incidents_graphml/f/f5cbc4c0-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f5cbc4c0-2f61-11ef-b208-d10830cadc66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d8d57fa5abc9aac108f17c0ebb114274880c7cd --- /dev/null +++ b/graph/incidents_graphml/f/f5cbc4c0-2f61-11ef-b208-d10830cadc66.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.244 + 100.64.88.244 + ["Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.238.61 + 172.30.238.61 + ["Exploiting Target","Exploiting Host"] + 0.859375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718928325 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5cbc4c0-2f61-11ef-b208-d10830cadc66 + + + INCIDENT_LINK + 1718928325 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5cbc4c0-2f61-11ef-b208-d10830cadc66 + + + diff --git a/graph/incidents_graphml/f/f5cd6940-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/f/f5cd6940-2f46-11ee-8421-f3eff1a35bff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49e8e81e04a9259ca286c502605e1bc5f0525ffb --- /dev/null +++ b/graph/incidents_graphml/f/f5cd6940-2f46-11ee-8421-f3eff1a35bff.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.104 + USER-0015-1635.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Umbrella","Meraki"] + + + INCIDENT_LINK + 1690769231 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5cd6940-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769231 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5cd6940-2f46-11ee-8421-f3eff1a35bff + + + diff --git a/graph/incidents_graphml/f/f5cf7d70-07d1-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/f/f5cf7d70-07d1-11ef-8107-af8140eb4c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82c6a60f84a54d580222c1eef350194540806b7b --- /dev/null +++ b/graph/incidents_graphml/f/f5cf7d70-07d1-11ef-8107-af8140eb4c5b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.20.127.176 + 172.20.127.176 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.87.11 + 100.64.87.11 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.12 + 100.64.87.12 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714578382 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5cf7d70-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578382 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5cf7d70-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578382 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5cf7d70-07d1-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578382 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f5cf7d70-07d1-11ef-8107-af8140eb4c5b + + + diff --git a/graph/incidents_graphml/f/f5d1c8c0-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f5d1c8c0-1445-11ef-8b63-6b6087068682.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7410252251151b696b54ea219b85470ed8548fe --- /dev/null +++ b/graph/incidents_graphml/f/f5d1c8c0-1445-11ef-8b63-6b6087068682.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.128 + 100.64.52.128 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715947618 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f5d1c8c0-1445-11ef-8b63-6b6087068682 + + + diff --git a/graph/incidents_graphml/f/f5df2cb0-5090-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/f/f5df2cb0-5090-11ed-ba80-7f0cb65843d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff073cdfb5ccf513321294cf227b3548c8bdd0b1 --- /dev/null +++ b/graph/incidents_graphml/f/f5df2cb0-5090-11ed-ba80-7f0cb65843d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.116 + 100.64.79.116 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1666281904 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5df2cb0-5090-11ed-ba80-7f0cb65843d0 + + + diff --git a/graph/incidents_graphml/f/f5e5cc00-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f5e5cc00-6106-11ee-bc15-ebbbf2eb09b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b22e4dc71fdb1aef6a93194460cb19134a5e808d --- /dev/null +++ b/graph/incidents_graphml/f/f5e5cc00-6106-11ee-bc15-ebbbf2eb09b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.14 + 100.64.30.14 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696239301 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5e5cc00-6106-11ee-bc15-ebbbf2eb09b5 + + + diff --git a/graph/incidents_graphml/f/f5e5e370-5090-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/f/f5e5e370-5090-11ed-ba80-7f0cb65843d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fe7d5db1c16d9e2581be69dddb4342f4ebc0cfa --- /dev/null +++ b/graph/incidents_graphml/f/f5e5e370-5090-11ed-ba80-7f0cb65843d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.79.116 + 100.64.79.116 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1666281904 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f5e5e370-5090-11ed-ba80-7f0cb65843d0 + + + diff --git a/graph/incidents_graphml/f/f5f0a4e0-4f54-11ee-a8d7-55254673f433.graphml b/graph/incidents_graphml/f/f5f0a4e0-4f54-11ee-a8d7-55254673f433.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52694c133e3aa861e92cadf4af1e3b0ef6b8a2a8 --- /dev/null +++ b/graph/incidents_graphml/f/f5f0a4e0-4f54-11ee-a8d7-55254673f433.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.195 + 100.64.27.195 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694293681 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5f0a4e0-4f54-11ee-a8d7-55254673f433 + + + diff --git a/graph/incidents_graphml/f/f5f55c60-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f5f55c60-6106-11ee-bc15-ebbbf2eb09b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07d659daeef298ac51e31959534e5ed62c8a7194 --- /dev/null +++ b/graph/incidents_graphml/f/f5f55c60-6106-11ee-bc15-ebbbf2eb09b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.14 + 100.64.30.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696239302 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f5f55c60-6106-11ee-bc15-ebbbf2eb09b5 + + + diff --git a/graph/incidents_graphml/f/f5ff6030-a00c-11ee-a147-6d5e36330663.graphml b/graph/incidents_graphml/f/f5ff6030-a00c-11ee-a147-6d5e36330663.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e4625364a227f757dbc9d7c8542b534ed51f28b --- /dev/null +++ b/graph/incidents_graphml/f/f5ff6030-a00c-11ee-a147-6d5e36330663.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.83 + 100.64.41.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.73 + 100.64.19.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.244 + 100.64.11.244 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.84 + 100.64.41.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.85 + 100.64.41.85 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.47 + 100.64.33.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.10 + 100.64.8.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.142 + 100.64.21.142 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.177 + 100.64.8.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.86 + 100.64.41.86 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.140 + 100.64.30.140 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.87 + 100.64.41.87 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.88 + 100.64.41.88 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.89 + 100.64.41.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.90 + 100.64.41.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168802 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f5ff6030-a00c-11ee-a147-6d5e36330663 + + + diff --git a/graph/incidents_graphml/f/f606bb10-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f606bb10-e53f-11ed-b729-bb6ecc5516ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4597d810b7e44a7e4a5cda4438897b0d7720ff77 --- /dev/null +++ b/graph/incidents_graphml/f/f606bb10-e53f-11ed-b729-bb6ecc5516ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.117 + 100.64.68.117 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + 0.25 + ["Precinct","Okta","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + INCIDENT_LINK + 1682629839 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Unprocessed + f606bb10-e53f-11ed-b729-bb6ecc5516ca + + + diff --git a/graph/incidents_graphml/f/f606eb80-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f606eb80-2929-11ed-82c2-3385aead5ab0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ebcefe631a9ffec5e19e692b76b8d3c769248afd --- /dev/null +++ b/graph/incidents_graphml/f/f606eb80-2929-11ed-82c2-3385aead5ab0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.27 + 100.64.76.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1661949571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f606eb80-2929-11ed-82c2-3385aead5ab0 + + + diff --git a/graph/incidents_graphml/f/f60cae80-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f60cae80-e53f-11ed-b729-bb6ecc5516ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7847099a19e3f1171271fba697e3f6833f96a2a0 --- /dev/null +++ b/graph/incidents_graphml/f/f60cae80-e53f-11ed-b729-bb6ecc5516ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + 0.71875 + ["Precinct","Okta","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.68.117 + 100.64.68.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1682629839 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f60cae80-e53f-11ed-b729-bb6ecc5516ca + + + diff --git a/graph/incidents_graphml/f/f60e6590-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f60e6590-2929-11ed-82c2-3385aead5ab0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b09a165617e883d938c0b0e55d4ca9fddb947e1 --- /dev/null +++ b/graph/incidents_graphml/f/f60e6590-2929-11ed-82c2-3385aead5ab0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.76.27 + 100.64.76.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661949571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f60e6590-2929-11ed-82c2-3385aead5ab0 + + + diff --git a/graph/incidents_graphml/f/f61030f0-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f61030f0-e53f-11ed-b729-bb6ecc5516ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1034bc3734067aba8154422d77b84cdbd8495d3a --- /dev/null +++ b/graph/incidents_graphml/f/f61030f0-e53f-11ed-b729-bb6ecc5516ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host","Ransomware Target"] + 0.25 + ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"] + + + INCIDENT_LINK + 1682629839 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Unprocessed + f61030f0-e53f-11ed-b729-bb6ecc5516ca + + + diff --git a/graph/incidents_graphml/f/f613e3d0-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f613e3d0-2929-11ed-82c2-3385aead5ab0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42b862311c29cd9b3f020280115b2697227c48c8 --- /dev/null +++ b/graph/incidents_graphml/f/f613e3d0-2929-11ed-82c2-3385aead5ab0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.92 + 100.64.28.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1661949571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f613e3d0-2929-11ed-82c2-3385aead5ab0 + + + diff --git a/graph/incidents_graphml/f/f6140360-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f6140360-56ff-11ee-82f3-cfca3c4a6159.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54bc3be0d07459a06c3ec01a1249556cc39c1a5c --- /dev/null +++ b/graph/incidents_graphml/f/f6140360-56ff-11ee-82f3-cfca3c4a6159.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.38 + 100.64.21.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695136784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f6140360-56ff-11ee-82f3-cfca3c4a6159 + + + diff --git a/graph/incidents_graphml/f/f61bac00-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f61bac00-2929-11ed-82c2-3385aead5ab0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7aedcf2aff592b0571ea30739da8cdec6d808ed4 --- /dev/null +++ b/graph/incidents_graphml/f/f61bac00-2929-11ed-82c2-3385aead5ab0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.28.92 + 100.64.28.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661949571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f61bac00-2929-11ed-82c2-3385aead5ab0 + + + diff --git a/graph/incidents_graphml/f/f61f0230-fb31-11ed-9187-67e5cded34a2.graphml b/graph/incidents_graphml/f/f61f0230-fb31-11ed-9187-67e5cded34a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0bae7ad793650d05c7e93eee08849c87361eaa87 --- /dev/null +++ b/graph/incidents_graphml/f/f61f0230-fb31-11ed-9187-67e5cded34a2.graphml @@ -0,0 +1,575 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + 0.746875 + ["Precinct","Okta","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.11.235 + 100.64.11.235 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.216 + 100.64.68.216 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.217 + 100.64.68.217 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.28.242 + 100.64.28.242 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.218 + 100.64.68.218 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.48.93 + 100.64.48.93 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.27.147 + 100.64.27.147 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.219 + 100.64.68.219 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.60.156 + 100.64.60.156 + ["Exploiting Host","Exploiting Target","Ransomware Target"] + 0.746875 + ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.27.254 + 100.64.27.254 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.143 + 100.64.68.143 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + INCIDENT_LINK + 1685042751 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f61f0230-fb31-11ed-9187-67e5cded34a2 + + + diff --git a/graph/incidents_graphml/f/f6201b10-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f6201b10-7e40-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..575c8598fa3ed973b613fdab8597733ec882a7b9 --- /dev/null +++ b/graph/incidents_graphml/f/f6201b10-7e40-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.125 + 100.64.50.125 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699452796 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6201b10-7e40-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/f/f6236f00-fb31-11ed-9187-67e5cded34a2.graphml b/graph/incidents_graphml/f/f6236f00-fb31-11ed-9187-67e5cded34a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e9b1c6f8369aeb385802bf21a1ee045d4e7e860 --- /dev/null +++ b/graph/incidents_graphml/f/f6236f00-fb31-11ed-9187-67e5cded34a2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1685042751 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f6236f00-fb31-11ed-9187-67e5cded34a2 + + + diff --git a/graph/incidents_graphml/f/f623bad0-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f623bad0-56ff-11ee-82f3-cfca3c4a6159.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79240644bb7ae8a5da193966c8628cf26c03aa25 --- /dev/null +++ b/graph/incidents_graphml/f/f623bad0-56ff-11ee-82f3-cfca3c4a6159.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.156 + 100.64.49.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695136784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f623bad0-56ff-11ee-82f3-cfca3c4a6159 + + + diff --git a/graph/incidents_graphml/f/f62ab4a0-5090-11ed-ba80-7f0cb65843d0.graphml b/graph/incidents_graphml/f/f62ab4a0-5090-11ed-ba80-7f0cb65843d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf0cda6b98819ecc4e9e9740f3e1dd9617037ea1 --- /dev/null +++ b/graph/incidents_graphml/f/f62ab4a0-5090-11ed-ba80-7f0cb65843d0.graphml @@ -0,0 +1,171 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.255 + 100.64.81.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.121 + 100.64.71.121 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.82.1 + 100.64.82.1 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.82.1 + 100.64.82.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1666281905 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f62ab4a0-5090-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666281905 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f62ab4a0-5090-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666281905 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f62ab4a0-5090-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666281905 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f62ab4a0-5090-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666281905 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f62ab4a0-5090-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666281905 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f62ab4a0-5090-11ed-ba80-7f0cb65843d0 + + + INCIDENT_LINK + 1666281905 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f62ab4a0-5090-11ed-ba80-7f0cb65843d0 + + + diff --git a/graph/incidents_graphml/f/f62bbda0-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f62bbda0-11e8-11ed-97d5-3360f7274b74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e62f666b592a9201efd28028403960ab206805b --- /dev/null +++ b/graph/incidents_graphml/f/f62bbda0-11e8-11ed-97d5-3360f7274b74.graphml @@ -0,0 +1,531 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.142 + 100.64.77.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.85 + 100.64.73.85 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.143 + 100.64.77.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.137 + 100.64.72.137 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.21.233 + 100.64.21.233 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.144 + 100.64.77.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.145 + 100.64.77.145 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.146 + 100.64.77.146 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.147 + 100.64.77.147 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.123 + 100.64.72.123 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.148 + 100.64.77.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.149 + 100.64.77.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.118 + 100.64.72.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.150 + 100.64.77.150 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392777 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f62bbda0-11e8-11ed-97d5-3360f7274b74 + + + diff --git a/graph/incidents_graphml/f/f62d5f40-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f62d5f40-2929-11ed-82c2-3385aead5ab0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d217ac79f07003ddad68b60e5ff139cf56cb16c0 --- /dev/null +++ b/graph/incidents_graphml/f/f62d5f40-2929-11ed-82c2-3385aead5ab0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.85.230 + 100.64.85.230 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661949571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f62d5f40-2929-11ed-82c2-3385aead5ab0 + + + diff --git a/graph/incidents_graphml/f/f62d7250-fec5-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/f/f62d7250-fec5-11ee-beca-89f62fdf83e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e366065b722c1aa793184009999586384843c22 --- /dev/null +++ b/graph/incidents_graphml/f/f62d7250-fec5-11ee-beca-89f62fdf83e2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.227 + 100.64.14.227 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713583668 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f62d7250-fec5-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583668 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f62d7250-fec5-11ee-beca-89f62fdf83e2 + + + diff --git a/graph/incidents_graphml/f/f6365ff0-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f6365ff0-2929-11ed-82c2-3385aead5ab0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..22170b294b1408c4a506c0cd80da627d7877b3c3 --- /dev/null +++ b/graph/incidents_graphml/f/f6365ff0-2929-11ed-82c2-3385aead5ab0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.41.168 + 100.64.41.168 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661949571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f6365ff0-2929-11ed-82c2-3385aead5ab0 + + + diff --git a/graph/incidents_graphml/f/f636d230-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/f/f636d230-1f1b-11ee-9e2e-57c890ee02a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5040349180645cbcda2e20e166369995601c737f --- /dev/null +++ b/graph/incidents_graphml/f/f636d230-1f1b-11ee-9e2e-57c890ee02a2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.250 + 100.64.7.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688991545 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f636d230-1f1b-11ee-9e2e-57c890ee02a2 + + + diff --git a/graph/incidents_graphml/f/f6380620-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f6380620-56ff-11ee-82f3-cfca3c4a6159.graphml new file mode 100644 index 0000000000000000000000000000000000000000..611c138feab06fbe2b55a45ba46609a009b103fd --- /dev/null +++ b/graph/incidents_graphml/f/f6380620-56ff-11ee-82f3-cfca3c4a6159.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.156 + 100.64.49.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695136784 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6380620-56ff-11ee-82f3-cfca3c4a6159 + + + diff --git a/graph/incidents_graphml/f/f63e2820-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f63e2820-2929-11ed-82c2-3385aead5ab0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9fd89a256625d9e88f044c4e937fc4c7ed53c04 --- /dev/null +++ b/graph/incidents_graphml/f/f63e2820-2929-11ed-82c2-3385aead5ab0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.61 + 100.64.80.61 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1661949572 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f63e2820-2929-11ed-82c2-3385aead5ab0 + + + diff --git a/graph/incidents_graphml/f/f643a660-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f643a660-2929-11ed-82c2-3385aead5ab0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..610b72d8802542f3a8ee6d952be06a31434edd2e --- /dev/null +++ b/graph/incidents_graphml/f/f643a660-2929-11ed-82c2-3385aead5ab0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.80.61 + 100.64.80.61 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661949572 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f643a660-2929-11ed-82c2-3385aead5ab0 + + + diff --git a/graph/incidents_graphml/f/f64851c0-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/f64851c0-27a0-11ef-acb4-432fc0d170c1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da831c066f7a33b00c62588dd4477d2fbf7f9f4b --- /dev/null +++ b/graph/incidents_graphml/f/f64851c0-27a0-11ef-acb4-432fc0d170c1.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.193 + 100.64.37.193 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718075775 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f64851c0-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075775 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f64851c0-27a0-11ef-acb4-432fc0d170c1 + + + diff --git a/graph/incidents_graphml/f/f649e070-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f649e070-56ff-11ee-82f3-cfca3c4a6159.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2fb02959598e64ee641de10bce033b059d87602d --- /dev/null +++ b/graph/incidents_graphml/f/f649e070-56ff-11ee-82f3-cfca3c4a6159.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.42 + 100.64.64.42 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695136784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f649e070-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f649e070-56ff-11ee-82f3-cfca3c4a6159 + + +