Upload per-incident GraphML sharded batch 10/27
Browse filesThis view is limited to 50 files because it contains too many changes. See raw diff
- graph/incidents_graphml/5/5b579a40-2206-11ee-bfff-c38ddf5b615c.graphml +63 -0
- graph/incidents_graphml/5/5b58d120-1631-11ee-87fd-95133fbba576.graphml +63 -0
- graph/incidents_graphml/5/5b5cca30-5c79-11ee-a457-0b0c771a8e8f.graphml +85 -0
- graph/incidents_graphml/5/5b621130-61e6-11ee-b713-27a48af32cd1.graphml +63 -0
- graph/incidents_graphml/5/5b6a85d0-5c79-11ee-a457-0b0c771a8e8f.graphml +63 -0
- graph/incidents_graphml/5/5b6b4350-e327-11ee-8328-d19a3893d959.graphml +63 -0
- graph/incidents_graphml/5/5b6d4520-2206-11ee-bfff-c38ddf5b615c.graphml +63 -0
- graph/incidents_graphml/5/5b77da80-761b-11ee-8b7f-db490bea3fed.graphml +63 -0
- graph/incidents_graphml/5/5b7d44b0-e327-11ee-8328-d19a3893d959.graphml +63 -0
- graph/incidents_graphml/5/5b863d50-08e2-11ef-ae93-51753793321f.graphml +63 -0
- graph/incidents_graphml/5/5b889ed0-1d9b-11ed-a4d2-f740cdf36de9.graphml +63 -0
- graph/incidents_graphml/5/5b891890-761b-11ee-8b7f-db490bea3fed.graphml +63 -0
- graph/incidents_graphml/5/5b89f3b0-21ec-11ee-86db-6b99d218dc75.graphml +63 -0
- graph/incidents_graphml/5/5b8b2ce0-47e3-11ee-b585-ebe535390ebf.graphml +63 -0
- graph/incidents_graphml/5/5b90f9c0-2206-11ee-bfff-c38ddf5b615c.graphml +63 -0
- graph/incidents_graphml/5/5b979da0-2ff5-11ee-b00f-c1ca007fb916.graphml +63 -0
- graph/incidents_graphml/5/5b97f090-08e2-11ef-ae93-51753793321f.graphml +63 -0
- graph/incidents_graphml/5/5b9aa4c0-761b-11ee-8b7f-db490bea3fed.graphml +63 -0
- graph/incidents_graphml/5/5b9b26a0-4403-11ef-b0b5-17c176975c0f.graphml +63 -0
- graph/incidents_graphml/5/5ba05030-2ff5-11ee-b00f-c1ca007fb916.graphml +63 -0
- graph/incidents_graphml/5/5ba089a0-47e3-11ee-b585-ebe535390ebf.graphml +63 -0
- graph/incidents_graphml/5/5ba2f9f0-21ec-11ee-86db-6b99d218dc75.graphml +63 -0
- graph/incidents_graphml/5/5babbbc0-761b-11ee-8b7f-db490bea3fed.graphml +63 -0
- graph/incidents_graphml/5/5baf2e80-1631-11ee-87fd-95133fbba576.graphml +63 -0
- graph/incidents_graphml/5/5bb6f720-21ec-11ee-86db-6b99d218dc75.graphml +63 -0
- graph/incidents_graphml/5/5bba88d0-761b-11ee-8b7f-db490bea3fed.graphml +63 -0
- graph/incidents_graphml/5/5bbb5600-0c22-11ef-9a57-bba1bbebb052.graphml +63 -0
- graph/incidents_graphml/5/5bbb58d0-4403-11ef-b0b5-17c176975c0f.graphml +63 -0
- graph/incidents_graphml/5/5bc3f880-f52c-11ee-9bad-936e2aee478a.graphml +63 -0
- graph/incidents_graphml/5/5bcc1ee0-0c22-11ef-9a57-bba1bbebb052.graphml +63 -0
- graph/incidents_graphml/5/5bcd8bf0-1631-11ee-87fd-95133fbba576.graphml +63 -0
- graph/incidents_graphml/5/5bd9d7f0-794d-11ee-a719-91c3184b15ab.graphml +63 -0
- graph/incidents_graphml/5/5bdb87b0-9d12-11ee-a559-a1780370c51a.graphml +63 -0
- graph/incidents_graphml/5/5be04d40-a613-11ee-b304-ddeb750e6414.graphml +63 -0
- graph/incidents_graphml/5/5be66b50-9c9d-11ee-b60c-751684393f5d.graphml +77 -0
- graph/incidents_graphml/5/5beb6630-9d12-11ee-a559-a1780370c51a.graphml +63 -0
- graph/incidents_graphml/5/5bf2a020-1631-11ee-87fd-95133fbba576.graphml +129 -0
- graph/incidents_graphml/5/5bfa8160-9d12-11ee-a559-a1780370c51a.graphml +63 -0
- graph/incidents_graphml/5/5c097580-9d12-11ee-a559-a1780370c51a.graphml +63 -0
- graph/incidents_graphml/5/5c0a0420-2ade-11ed-961c-99a30b1a3145.graphml +77 -0
- graph/incidents_graphml/5/5c0b7090-61e6-11ee-b713-27a48af32cd1.graphml +63 -0
- graph/incidents_graphml/5/5c0f5150-5c79-11ee-a457-0b0c771a8e8f.graphml +655 -0
- graph/incidents_graphml/5/5c1a90d0-683e-11ee-bbb0-b746705ccafc.graphml +63 -0
- graph/incidents_graphml/5/5c1fa500-5c79-11ee-a457-0b0c771a8e8f.graphml +63 -0
- graph/incidents_graphml/5/5c2379c0-85f3-11ee-89b4-37c02fa13bd9.graphml +785 -0
- graph/incidents_graphml/5/5c276a10-73c2-11ed-85ba-bb75aa2d6818.graphml +77 -0
- graph/incidents_graphml/5/5c283600-254e-11ee-bba0-3d7b70aaa407.graphml +63 -0
- graph/incidents_graphml/5/5c28df20-01a8-11ee-a3af-a97ccd3b2ee2.graphml +77 -0
- graph/incidents_graphml/5/5c2a0760-140e-11ee-aa1e-3bafa1120b8e.graphml +77 -0
- graph/incidents_graphml/5/5c2a4840-683e-11ee-bbb0-b746705ccafc.graphml +63 -0
graph/incidents_graphml/5/5b579a40-2206-11ee-bfff-c38ddf5b615c.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.70.227</data>
|
| 35 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5e249d00-0667-11ee-875f-cdf975397eb0">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.14.216</data>
|
| 43 |
+
<data key="n_hostname">100.64.14.216</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-13083" target="HOST-14143">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689312119</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b579a40-2206-11ee-bfff-c38ddf5b615c</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b58d120-1631-11ee-87fd-95133fbba576.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ea971784-0668-11ee-904d-db08e2329d95">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.12.47</data>
|
| 35 |
+
<data key="n_hostname">100.64.12.47</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.18.96.192</data>
|
| 43 |
+
<data key="n_hostname">172.18.96.192</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-3385" target="HOST-2715">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688011173</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b58d120-1631-11ee-87fd-95133fbba576</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b5cca30-5c79-11ee-a457-0b0c771a8e8f.graphml
ADDED
|
@@ -0,0 +1,85 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="bc06ad62-32f3-11ee-8079-e506f9c15708">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.7.155</data>
|
| 35 |
+
<data key="n_hostname">100.64.7.155</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.54.66</data>
|
| 43 |
+
<data key="n_hostname">172.24.54.66</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="72c79372-0626-11ee-b19f-ed665a42340f">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">172.23.168.229</data>
|
| 51 |
+
<data key="n_hostname">172.23.168.229</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<edge id="e1" source="HOST-2782" target="HOST-2745">
|
| 57 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 58 |
+
<data key="e_timestamp">1695738678</data>
|
| 59 |
+
<data key="e_label_binary">malicious</data>
|
| 60 |
+
<data key="e_label_confidence">0.7</data>
|
| 61 |
+
<data key="e_suspicion_score">0.25</data>
|
| 62 |
+
<data key="e_mo_name">Data Theft</data>
|
| 63 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 64 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 65 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 66 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 67 |
+
<data key="e_disposition">Unprocessed</data>
|
| 68 |
+
<data key="e_incident_id">5b5cca30-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 69 |
+
</edge>
|
| 70 |
+
<edge id="e2" source="HOST-2782" target="HOST-2865">
|
| 71 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 72 |
+
<data key="e_timestamp">1695738678</data>
|
| 73 |
+
<data key="e_label_binary">malicious</data>
|
| 74 |
+
<data key="e_label_confidence">0.7</data>
|
| 75 |
+
<data key="e_suspicion_score">0.25</data>
|
| 76 |
+
<data key="e_mo_name">Data Theft</data>
|
| 77 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 78 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 79 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 80 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 81 |
+
<data key="e_disposition">Unprocessed</data>
|
| 82 |
+
<data key="e_incident_id">5b5cca30-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 83 |
+
</edge>
|
| 84 |
+
</graph>
|
| 85 |
+
</graphml>
|
graph/incidents_graphml/5/5b621130-61e6-11ee-b713-27a48af32cd1.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.27.202.53</data>
|
| 35 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="6740e5c5-062f-11ee-93cb-d5eb556fa913">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.7.81</data>
|
| 43 |
+
<data key="n_hostname">100.64.7.81</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2703" target="HOST-2718">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1696335249</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5b621130-61e6-11ee-b713-27a48af32cd1</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b6a85d0-5c79-11ee-a457-0b0c771a8e8f.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2f004ed1-0625-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.54.66</data>
|
| 35 |
+
<data key="n_hostname">172.24.54.66</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="bc06ad62-32f3-11ee-8079-e506f9c15708">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.7.155</data>
|
| 43 |
+
<data key="n_hostname">100.64.7.155</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2745" target="HOST-2782">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1695738679</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5b6a85d0-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b6b4350-e327-11ee-8328-d19a3893d959.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="d554a6d0-0627-11ee-a510-47d18ec77e75">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.33.154</data>
|
| 35 |
+
<data key="n_hostname">100.64.33.154</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="260096f4-062a-11ee-94f6-0d301f382bbb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.135.251.191</data>
|
| 43 |
+
<data key="n_hostname">10.135.251.191</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-6358" target="HOST-2751">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1710546867</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b6b4350-e327-11ee-8328-d19a3893d959</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b6d4520-2206-11ee-bfff-c38ddf5b615c.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="3faf7dc0-0650-11ee-b6e2-d3b1de8f6a7e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.76.137</data>
|
| 35 |
+
<data key="n_hostname">100.64.76.137</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.70.227</data>
|
| 43 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="3faf7dc0-0650-11ee-b6e2-d3b1de8f6a7e" target="HOST-13083">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689312119</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b6d4520-2206-11ee-bfff-c38ddf5b615c</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b77da80-761b-11ee-8b7f-db490bea3fed.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5e881e20-54a5-11ee-9269-11ff79be9d0b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.41.30</data>
|
| 35 |
+
<data key="n_hostname">100.64.41.30</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.217.8</data>
|
| 43 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="5e881e20-54a5-11ee-9269-11ff79be9d0b" target="HOST-2731">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1698557036</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b77da80-761b-11ee-8b7f-db490bea3fed</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b7d44b0-e327-11ee-8328-d19a3893d959.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="260096f4-062a-11ee-94f6-0d301f382bbb">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.135.251.191</data>
|
| 35 |
+
<data key="n_hostname">10.135.251.191</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="d554a6d0-0627-11ee-a510-47d18ec77e75">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.33.154</data>
|
| 43 |
+
<data key="n_hostname">100.64.33.154</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2751" target="HOST-6358">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1710546867</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b7d44b0-e327-11ee-8328-d19a3893d959</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b863d50-08e2-11ef-ae93-51753793321f.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ada0d4c9-1364-11ee-98ae-c11e532db376">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.95.124</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-2131.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5bef6045-163b-11ee-8f1b-851c95cb19a1">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.221.82.8</data>
|
| 43 |
+
<data key="n_hostname">100.64.6.199</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="ada0d4c9-1364-11ee-98ae-c11e532db376" target="HOST-17001">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1714695376</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b863d50-08e2-11ef-ae93-51753793321f</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b889ed0-1d9b-11ed-a4d2-f740cdf36de9.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5dfa0203-0d4a-11ed-895a-bbe206caf127">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.71.72</data>
|
| 35 |
+
<data key="n_hostname">100.64.71.72</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.70.227</data>
|
| 43 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="5dfa0203-0d4a-11ed-895a-bbe206caf127" target="HOST-12604">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1660678861</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b889ed0-1d9b-11ed-a4d2-f740cdf36de9</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b891890-761b-11ee-8b7f-db490bea3fed.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.217.8</data>
|
| 35 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5e881e20-54a5-11ee-9269-11ff79be9d0b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.41.30</data>
|
| 43 |
+
<data key="n_hostname">100.64.41.30</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2731" target="HOST-7366">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1698557036</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5b891890-761b-11ee-8b7f-db490bea3fed</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b89f3b0-21ec-11ee-86db-6b99d218dc75.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="1432aa94-064c-11ee-8134-ebd03022b92c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.18.88</data>
|
| 35 |
+
<data key="n_hostname">100.64.18.88</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.168.48</data>
|
| 43 |
+
<data key="n_hostname">172.30.168.48</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="1432aa94-064c-11ee-8134-ebd03022b92c" target="HOST-2842">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689300952</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5b89f3b0-21ec-11ee-86db-6b99d218dc75</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b8b2ce0-47e3-11ee-b585-ebe535390ebf.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="bfc9bcd3-0625-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.47.41</data>
|
| 35 |
+
<data key="n_hostname">100.64.47.41</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="97636251-062a-11ee-8860-f951c26910c1">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.201.119</data>
|
| 43 |
+
<data key="n_hostname">172.30.201.119</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="bfc9bcd3-0625-11ee-bea9-5f52a09eb73a" target="HOST-2760">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1693475231</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b8b2ce0-47e3-11ee-b585-ebe535390ebf</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b90f9c0-2206-11ee-bfff-c38ddf5b615c.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.70.227</data>
|
| 35 |
+
<data key="n_hostname">100.64.70.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="3faf7dc0-0650-11ee-b6e2-d3b1de8f6a7e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.76.137</data>
|
| 43 |
+
<data key="n_hostname">100.64.76.137</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-13083" target="HOST-14144">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689312119</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b90f9c0-2206-11ee-bfff-c38ddf5b615c</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b979da0-2ff5-11ee-b00f-c1ca007fb916.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="6fa7d709-0751-11ee-9fa7-6d3d4b7c298b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.21.146</data>
|
| 35 |
+
<data key="n_hostname">100.64.21.146</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.49375</data>
|
| 38 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="094cdc20-0626-11ee-9f36-61ae8743c399">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.68.14</data>
|
| 43 |
+
<data key="n_hostname">100.64.68.14</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.6625</data>
|
| 46 |
+
<data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="6fa7d709-0751-11ee-9fa7-6d3d4b7c298b" target="HOST-11377">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1690844134</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.6625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5b979da0-2ff5-11ee-b00f-c1ca007fb916</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b97f090-08e2-11ef-ae93-51753793321f.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="5bef6045-163b-11ee-8f1b-851c95cb19a1">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.221.82.8</data>
|
| 35 |
+
<data key="n_hostname">100.64.6.199</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="ada0d4c9-1364-11ee-98ae-c11e532db376">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.95.124</data>
|
| 43 |
+
<data key="n_hostname">USER-0015-2131.example.internal</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-17001" target="HOST-18805">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1714695376</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5b97f090-08e2-11ef-ae93-51753793321f</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b9aa4c0-761b-11ee-8b7f-db490bea3fed.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ed25a510-067d-11ee-8b7e-e7fa94c7e924">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.41.31</data>
|
| 35 |
+
<data key="n_hostname">100.64.41.31</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.217.8</data>
|
| 43 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="ed25a510-067d-11ee-8b7e-e7fa94c7e924" target="HOST-2731">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1698557036</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b9aa4c0-761b-11ee-8b7f-db490bea3fed</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5b9b26a0-4403-11ef-b0b5-17c176975c0f.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="a3cef120-28fd-11ef-8b71-dd8359e7840d">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.41.18</data>
|
| 35 |
+
<data key="n_hostname">100.64.41.18</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="f13df804-28fa-11ef-a65d-2d26b03b63f9">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.214.148</data>
|
| 43 |
+
<data key="n_hostname">172.30.214.148</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="a3cef120-28fd-11ef-8b71-dd8359e7840d" target="HOST-3831">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1721196668</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5b9b26a0-4403-11ef-b0b5-17c176975c0f</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5ba05030-2ff5-11ee-b00f-c1ca007fb916.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="094cdc20-0626-11ee-9f36-61ae8743c399">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.68.14</data>
|
| 35 |
+
<data key="n_hostname">100.64.68.14</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="6fa7d709-0751-11ee-9fa7-6d3d4b7c298b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.21.146</data>
|
| 43 |
+
<data key="n_hostname">100.64.21.146</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-11377" target="HOST-12169">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1690844134</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5ba05030-2ff5-11ee-b00f-c1ca007fb916</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5ba089a0-47e3-11ee-b585-ebe535390ebf.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="97636251-062a-11ee-8860-f951c26910c1">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.201.119</data>
|
| 35 |
+
<data key="n_hostname">172.30.201.119</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="bfc9bcd3-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.47.41</data>
|
| 43 |
+
<data key="n_hostname">100.64.47.41</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2760" target="HOST-8299">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1693475231</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5ba089a0-47e3-11ee-b585-ebe535390ebf</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5ba2f9f0-21ec-11ee-86db-6b99d218dc75.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.168.48</data>
|
| 35 |
+
<data key="n_hostname">172.30.168.48</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1432aa94-064c-11ee-8134-ebd03022b92c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.18.88</data>
|
| 43 |
+
<data key="n_hostname">100.64.18.88</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2842" target="HOST-4237">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689300952</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5ba2f9f0-21ec-11ee-86db-6b99d218dc75</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5babbbc0-761b-11ee-8b7f-db490bea3fed.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.217.8</data>
|
| 35 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="ed25a510-067d-11ee-8b7e-e7fa94c7e924">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.41.31</data>
|
| 43 |
+
<data key="n_hostname">100.64.41.31</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2731" target="HOST-7367">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1698557037</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5babbbc0-761b-11ee-8b7f-db490bea3fed</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5baf2e80-1631-11ee-87fd-95133fbba576.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="19971661-0e62-11ee-9c1c-03fde51c7569">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.11.90</data>
|
| 35 |
+
<data key="n_hostname">100.64.11.90</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="260096f4-062a-11ee-94f6-0d301f382bbb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.135.251.191</data>
|
| 43 |
+
<data key="n_hostname">10.135.251.191</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="19971661-0e62-11ee-9c1c-03fde51c7569" target="HOST-2751">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688011174</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5baf2e80-1631-11ee-87fd-95133fbba576</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5bb6f720-21ec-11ee-86db-6b99d218dc75.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2d2acb82-0625-11ee-b173-c9921719c2f8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.31.78.41</data>
|
| 35 |
+
<data key="n_hostname">172.31.78.41</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="673d79d1-0670-11ee-8a24-49ed3a2b8f1e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.11.44</data>
|
| 43 |
+
<data key="n_hostname">100.64.11.44</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2807" target="HOST-3271">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689300953</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5bb6f720-21ec-11ee-86db-6b99d218dc75</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5bba88d0-761b-11ee-8b7f-db490bea3fed.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b7c17f21-063c-11ee-9ae3-af0dfabd7155">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.41.34</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-1330.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.117.12.163</data>
|
| 43 |
+
<data key="n_hostname">10.117.12.163</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="b7c17f21-063c-11ee-9ae3-af0dfabd7155" target="HOST-2773">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1698557037</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5bba88d0-761b-11ee-8b7f-db490bea3fed</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5bbb5600-0c22-11ef-9a57-bba1bbebb052.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="02896bf2-ff6e-11ee-99da-1160037c2524">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.60.97</data>
|
| 35 |
+
<data key="n_hostname">100.64.60.97</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.217.8</data>
|
| 43 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="02896bf2-ff6e-11ee-99da-1160037c2524" target="HOST-2731">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1715052718</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5bbb5600-0c22-11ef-9a57-bba1bbebb052</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5bbb58d0-4403-11ef-b0b5-17c176975c0f.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="f13df804-28fa-11ef-a65d-2d26b03b63f9">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.214.148</data>
|
| 35 |
+
<data key="n_hostname">172.30.214.148</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="a3cef120-28fd-11ef-8b71-dd8359e7840d">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.41.18</data>
|
| 43 |
+
<data key="n_hostname">100.64.41.18</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-3831" target="HOST-8787">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1721196668</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5bbb58d0-4403-11ef-b0b5-17c176975c0f</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5bc3f880-f52c-11ee-9bad-936e2aee478a.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.31.182.227</data>
|
| 35 |
+
<data key="n_hostname">172.31.182.227</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="fd925910-3a77-11ee-85c6-7d2ca0c60d17">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.17.148</data>
|
| 43 |
+
<data key="n_hostname">100.64.17.148</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2761" target="HOST-9374">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1712528136</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5bc3f880-f52c-11ee-9bad-936e2aee478a</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5bcc1ee0-0c22-11ef-9a57-bba1bbebb052.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.217.8</data>
|
| 35 |
+
<data key="n_hostname">172.24.217.8</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="02896bf2-ff6e-11ee-99da-1160037c2524">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.60.97</data>
|
| 43 |
+
<data key="n_hostname">100.64.60.97</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.4375</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2731" target="HOST-10238">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1715052718</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5bcc1ee0-0c22-11ef-9a57-bba1bbebb052</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5bcd8bf0-1631-11ee-87fd-95133fbba576.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="260096f4-062a-11ee-94f6-0d301f382bbb">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">10.135.251.191</data>
|
| 35 |
+
<data key="n_hostname">10.135.251.191</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="19971661-0e62-11ee-9c1c-03fde51c7569">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.11.90</data>
|
| 43 |
+
<data key="n_hostname">100.64.11.90</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2751" target="HOST-7725">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1688011174</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5bcd8bf0-1631-11ee-87fd-95133fbba576</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5bd9d7f0-794d-11ee-a719-91c3184b15ab.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b4bcd08a-755f-11ee-83cf-a74c20bfed74">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.44.243</data>
|
| 35 |
+
<data key="n_hostname">100.64.44.243</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.27.202.53</data>
|
| 43 |
+
<data key="n_hostname">172.27.202.53</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="b4bcd08a-755f-11ee-83cf-a74c20bfed74" target="HOST-2703">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1698908365</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5bd9d7f0-794d-11ee-a719-91c3184b15ab</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5bdb87b0-9d12-11ee-a559-a1780370c51a.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.247.113</data>
|
| 35 |
+
<data key="n_hostname">172.24.247.113</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="5f273240-16b5-11ee-a068-3747caa8a6f3">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.7.131</data>
|
| 43 |
+
<data key="n_hostname">100.64.7.131</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2759" target="HOST-2766">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1702841267</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5bdb87b0-9d12-11ee-a559-a1780370c51a</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5be04d40-a613-11ee-b304-ddeb750e6414.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="94d5d591-a35a-11ee-9fc0-c543f3e67670">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.59.44</data>
|
| 35 |
+
<data key="n_hostname">100.64.59.44</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="260096f3-062a-11ee-94f6-0d301f382bbb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.174.172</data>
|
| 43 |
+
<data key="n_hostname">172.30.174.172</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="94d5d591-a35a-11ee-9fc0-c543f3e67670" target="HOST-2946">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1703831257</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5be04d40-a613-11ee-b304-ddeb750e6414</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5be66b50-9c9d-11ee-b60c-751684393f5d.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="291b8ee5-901c-11ee-9dd1-eb8813af19a1">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.8.174</data>
|
| 35 |
+
<data key="n_hostname">100.64.8.174</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","PAN NGFW"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="094cb515-0626-11ee-9f36-61ae8743c399">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.68.40</data>
|
| 43 |
+
<data key="n_hostname">100.64.68.40</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="291b8ee5-901c-11ee-9dd1-eb8813af19a1" target="HOST-11417">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1702791016</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5be66b50-9c9d-11ee-b60c-751684393f5d</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-11417" target="291b8ee5-901c-11ee-9dd1-eb8813af19a1">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1702791016</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7</data>
|
| 67 |
+
<data key="e_suspicion_score">0.25</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Unprocessed</data>
|
| 74 |
+
<data key="e_incident_id">5be66b50-9c9d-11ee-b60c-751684393f5d</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/5/5beb6630-9d12-11ee-a559-a1780370c51a.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="0cf59f32-9639-11ee-8e21-bf95e815edbc">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.22.66</data>
|
| 35 |
+
<data key="n_hostname">100.64.22.66</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="260096f4-062a-11ee-94f6-0d301f382bbb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.135.251.191</data>
|
| 43 |
+
<data key="n_hostname">10.135.251.191</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="0cf59f32-9639-11ee-8e21-bf95e815edbc" target="HOST-2751">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1702841267</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5beb6630-9d12-11ee-a559-a1780370c51a</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5bf2a020-1631-11ee-87fd-95133fbba576.graphml
ADDED
|
@@ -0,0 +1,129 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="598e5c80-095b-11ee-9741-793b9d38cfcd">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.43.134</data>
|
| 35 |
+
<data key="n_hostname">100.64.43.134</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.229.11</data>
|
| 43 |
+
<data key="n_hostname">172.30.229.11</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">172.21.61.66</data>
|
| 51 |
+
<data key="n_hostname">172.21.61.66</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">172.16.233.43</data>
|
| 59 |
+
<data key="n_hostname">172.16.233.43</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">172.29.40.149</data>
|
| 67 |
+
<data key="n_hostname">172.29.40.149</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<edge id="e1" source="598e5c80-095b-11ee-9741-793b9d38cfcd" target="HOST-2750">
|
| 73 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 74 |
+
<data key="e_timestamp">1688011174</data>
|
| 75 |
+
<data key="e_label_binary">malicious</data>
|
| 76 |
+
<data key="e_label_confidence">0.7</data>
|
| 77 |
+
<data key="e_suspicion_score">0.25</data>
|
| 78 |
+
<data key="e_mo_name">Data Theft</data>
|
| 79 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 80 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 81 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 82 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 83 |
+
<data key="e_disposition">Unprocessed</data>
|
| 84 |
+
<data key="e_incident_id">5bf2a020-1631-11ee-87fd-95133fbba576</data>
|
| 85 |
+
</edge>
|
| 86 |
+
<edge id="e2" source="598e5c80-095b-11ee-9741-793b9d38cfcd" target="HOST-2709">
|
| 87 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 88 |
+
<data key="e_timestamp">1688011174</data>
|
| 89 |
+
<data key="e_label_binary">malicious</data>
|
| 90 |
+
<data key="e_label_confidence">0.7</data>
|
| 91 |
+
<data key="e_suspicion_score">0.25</data>
|
| 92 |
+
<data key="e_mo_name">Data Theft</data>
|
| 93 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 94 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 95 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 96 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 97 |
+
<data key="e_disposition">Unprocessed</data>
|
| 98 |
+
<data key="e_incident_id">5bf2a020-1631-11ee-87fd-95133fbba576</data>
|
| 99 |
+
</edge>
|
| 100 |
+
<edge id="e3" source="598e5c80-095b-11ee-9741-793b9d38cfcd" target="HOST-2758">
|
| 101 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 102 |
+
<data key="e_timestamp">1688011174</data>
|
| 103 |
+
<data key="e_label_binary">malicious</data>
|
| 104 |
+
<data key="e_label_confidence">0.7</data>
|
| 105 |
+
<data key="e_suspicion_score">0.25</data>
|
| 106 |
+
<data key="e_mo_name">Data Theft</data>
|
| 107 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 108 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 109 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 110 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 111 |
+
<data key="e_disposition">Unprocessed</data>
|
| 112 |
+
<data key="e_incident_id">5bf2a020-1631-11ee-87fd-95133fbba576</data>
|
| 113 |
+
</edge>
|
| 114 |
+
<edge id="e4" source="598e5c80-095b-11ee-9741-793b9d38cfcd" target="HOST-2834">
|
| 115 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 116 |
+
<data key="e_timestamp">1688011174</data>
|
| 117 |
+
<data key="e_label_binary">malicious</data>
|
| 118 |
+
<data key="e_label_confidence">0.7</data>
|
| 119 |
+
<data key="e_suspicion_score">0.25</data>
|
| 120 |
+
<data key="e_mo_name">Data Theft</data>
|
| 121 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 122 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 123 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 124 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 125 |
+
<data key="e_disposition">Unprocessed</data>
|
| 126 |
+
<data key="e_incident_id">5bf2a020-1631-11ee-87fd-95133fbba576</data>
|
| 127 |
+
</edge>
|
| 128 |
+
</graph>
|
| 129 |
+
</graphml>
|
graph/incidents_graphml/5/5bfa8160-9d12-11ee-a559-a1780370c51a.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="446895a5-0627-11ee-9882-3f47c834d49b">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.22.68</data>
|
| 35 |
+
<data key="n_hostname">100.64.22.68</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.16.232.220</data>
|
| 43 |
+
<data key="n_hostname">172.16.232.220</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="446895a5-0627-11ee-9882-3f47c834d49b" target="HOST-2748">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1702841267</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5bfa8160-9d12-11ee-a559-a1780370c51a</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5c097580-9d12-11ee-a559-a1780370c51a.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.16.232.220</data>
|
| 35 |
+
<data key="n_hostname">172.16.232.220</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="446895a5-0627-11ee-9882-3f47c834d49b">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.22.68</data>
|
| 43 |
+
<data key="n_hostname">100.64.22.68</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2748" target="HOST-4781">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1702841267</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5c097580-9d12-11ee-a559-a1780370c51a</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5c0a0420-2ade-11ed-961c-99a30b1a3145.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="252504d0-eac6-11ec-8bb2-f309a5a1c43c">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.26.99</data>
|
| 35 |
+
<data key="n_hostname">USER-0015-1939.example.internal</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="de886140-ea91-11ec-90c7-eff83c975df3">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.71.123</data>
|
| 43 |
+
<data key="n_hostname">100.64.71.123</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="252504d0-eac6-11ec-8bb2-f309a5a1c43c" target="HOST-13214">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1662137003</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 53 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5c0a0420-2ade-11ed-961c-99a30b1a3145</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-13214" target="252504d0-eac6-11ec-8bb2-f309a5a1c43c">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1662137003</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7890625</data>
|
| 67 |
+
<data key="e_suspicion_score">0.7890625</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">5c0a0420-2ade-11ed-961c-99a30b1a3145</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/5/5c0b7090-61e6-11ee-b713-27a48af32cd1.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="8c715050-062f-11ee-b425-67ab9dfbd3f7">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.47.139</data>
|
| 35 |
+
<data key="n_hostname">100.64.47.139</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.117.12.163</data>
|
| 43 |
+
<data key="n_hostname">10.117.12.163</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="8c715050-062f-11ee-b425-67ab9dfbd3f7" target="HOST-2773">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1696335251</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5c0b7090-61e6-11ee-b713-27a48af32cd1</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5c0f5150-5c79-11ee-a457-0b0c771a8e8f.graphml
ADDED
|
@@ -0,0 +1,655 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="efc1f843-0624-11ee-bb6d-91e4d286acbc">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.16.10</data>
|
| 35 |
+
<data key="n_hostname">100.64.16.10</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.30.208.219</data>
|
| 43 |
+
<data key="n_hostname">172.30.208.219</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="6e1058a2-5c78-11ee-a34f-db0139013d12">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.16.11</data>
|
| 51 |
+
<data key="n_hostname">100.64.16.11</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">172.21.61.66</data>
|
| 59 |
+
<data key="n_hostname">172.21.61.66</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="f67323c4-5846-11ee-a7e3-271cfe423824">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.16.12</data>
|
| 67 |
+
<data key="n_hostname">100.64.16.12</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="733ed771-3fdb-11ee-8786-fda18d0d5bd8">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.16.13</data>
|
| 75 |
+
<data key="n_hostname">100.64.16.13</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="fa682572-0625-11ee-b404-ff2ea490fc35">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.13.59</data>
|
| 83 |
+
<data key="n_hostname">100.64.13.59</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="17e54080-57c8-11ee-b6c7-1d04248a12be">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.16.14</data>
|
| 91 |
+
<data key="n_hostname">100.64.16.14</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.25</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="c0df24a1-064a-11ee-9745-2f41befaec59">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.16.15</data>
|
| 99 |
+
<data key="n_hostname">100.64.16.15</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.25</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="00cb51c1-0627-11ee-9a87-6114210b307b">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.13.201</data>
|
| 107 |
+
<data key="n_hostname">100.64.13.201</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.25</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="44bd9e04-3bde-11ee-947a-edb098b7ee82">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.16.16</data>
|
| 115 |
+
<data key="n_hostname">100.64.16.16</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.25</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="2f50d881-5866-11ee-a9dc-e360b954cf13">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">100.64.16.17</data>
|
| 123 |
+
<data key="n_hostname">100.64.16.17</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.25</data>
|
| 126 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">172.29.40.149</data>
|
| 131 |
+
<data key="n_hostname">172.29.40.149</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.25</data>
|
| 134 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="2bd2e731-0626-11ee-b19f-ed665a42340f">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">172.25.222.10</data>
|
| 139 |
+
<data key="n_hostname">172.25.222.10</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.25</data>
|
| 142 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="d00be744-53ae-11ee-877e-8bc5a0f10bf9">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">100.64.11.126</data>
|
| 147 |
+
<data key="n_hostname">100.64.11.126</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.25</data>
|
| 150 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<node id="68268d94-06ad-11ee-b1b4-e35c0bd09b0c">
|
| 153 |
+
<data key="n_type">HOST</data>
|
| 154 |
+
<data key="n_ip">100.64.16.18</data>
|
| 155 |
+
<data key="n_hostname">100.64.16.18</data>
|
| 156 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 157 |
+
<data key="n_suspicion_score">0.25</data>
|
| 158 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 159 |
+
</node>
|
| 160 |
+
<node id="332b2c23-581c-11ee-a1b9-21ba758c1abb">
|
| 161 |
+
<data key="n_type">HOST</data>
|
| 162 |
+
<data key="n_ip">100.64.16.19</data>
|
| 163 |
+
<data key="n_hostname">100.64.16.19</data>
|
| 164 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 165 |
+
<data key="n_suspicion_score">0.25</data>
|
| 166 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 167 |
+
</node>
|
| 168 |
+
<node id="c8ca6110-5b7d-11ee-b04e-bff924170329">
|
| 169 |
+
<data key="n_type">HOST</data>
|
| 170 |
+
<data key="n_ip">100.64.16.20</data>
|
| 171 |
+
<data key="n_hostname">100.64.16.20</data>
|
| 172 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 173 |
+
<data key="n_suspicion_score">0.25</data>
|
| 174 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 175 |
+
</node>
|
| 176 |
+
<node id="c433cdb3-0625-11ee-9a87-6114210b307b">
|
| 177 |
+
<data key="n_type">HOST</data>
|
| 178 |
+
<data key="n_ip">100.64.16.21</data>
|
| 179 |
+
<data key="n_hostname">100.64.16.21</data>
|
| 180 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 181 |
+
<data key="n_suspicion_score">0.25</data>
|
| 182 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 183 |
+
</node>
|
| 184 |
+
<node id="0899b540-5816-11ee-904e-0f4c92ab5aea">
|
| 185 |
+
<data key="n_type">HOST</data>
|
| 186 |
+
<data key="n_ip">100.64.16.22</data>
|
| 187 |
+
<data key="n_hostname">100.64.16.22</data>
|
| 188 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 189 |
+
<data key="n_suspicion_score">0.25</data>
|
| 190 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 191 |
+
</node>
|
| 192 |
+
<edge id="e1" source="efc1f843-0624-11ee-bb6d-91e4d286acbc" target="HOST-2823">
|
| 193 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 194 |
+
<data key="e_timestamp">1695738680</data>
|
| 195 |
+
<data key="e_label_binary">malicious</data>
|
| 196 |
+
<data key="e_label_confidence">0.7</data>
|
| 197 |
+
<data key="e_suspicion_score">0.25</data>
|
| 198 |
+
<data key="e_mo_name">Data Theft</data>
|
| 199 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 200 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 201 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 202 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 203 |
+
<data key="e_disposition">Unprocessed</data>
|
| 204 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 205 |
+
</edge>
|
| 206 |
+
<edge id="e2" source="6e1058a2-5c78-11ee-a34f-db0139013d12" target="HOST-2709">
|
| 207 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 208 |
+
<data key="e_timestamp">1695738680</data>
|
| 209 |
+
<data key="e_label_binary">malicious</data>
|
| 210 |
+
<data key="e_label_confidence">0.7</data>
|
| 211 |
+
<data key="e_suspicion_score">0.25</data>
|
| 212 |
+
<data key="e_mo_name">Data Theft</data>
|
| 213 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 214 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 215 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 216 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 217 |
+
<data key="e_disposition">Unprocessed</data>
|
| 218 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 219 |
+
</edge>
|
| 220 |
+
<edge id="e3" source="HOST-2709" target="6e1058a2-5c78-11ee-a34f-db0139013d12">
|
| 221 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 222 |
+
<data key="e_timestamp">1695738680</data>
|
| 223 |
+
<data key="e_label_binary">malicious</data>
|
| 224 |
+
<data key="e_label_confidence">0.7</data>
|
| 225 |
+
<data key="e_suspicion_score">0.25</data>
|
| 226 |
+
<data key="e_mo_name">Data Theft</data>
|
| 227 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 228 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 229 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 230 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 231 |
+
<data key="e_disposition">Unprocessed</data>
|
| 232 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 233 |
+
</edge>
|
| 234 |
+
<edge id="e4" source="f67323c4-5846-11ee-a7e3-271cfe423824" target="HOST-2709">
|
| 235 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 236 |
+
<data key="e_timestamp">1695738680</data>
|
| 237 |
+
<data key="e_label_binary">malicious</data>
|
| 238 |
+
<data key="e_label_confidence">0.7</data>
|
| 239 |
+
<data key="e_suspicion_score">0.25</data>
|
| 240 |
+
<data key="e_mo_name">Data Theft</data>
|
| 241 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 242 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 243 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 244 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 245 |
+
<data key="e_disposition">Unprocessed</data>
|
| 246 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 247 |
+
</edge>
|
| 248 |
+
<edge id="e5" source="HOST-2709" target="f67323c4-5846-11ee-a7e3-271cfe423824">
|
| 249 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 250 |
+
<data key="e_timestamp">1695738680</data>
|
| 251 |
+
<data key="e_label_binary">malicious</data>
|
| 252 |
+
<data key="e_label_confidence">0.7</data>
|
| 253 |
+
<data key="e_suspicion_score">0.25</data>
|
| 254 |
+
<data key="e_mo_name">Data Theft</data>
|
| 255 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 256 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 257 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 258 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 259 |
+
<data key="e_disposition">Unprocessed</data>
|
| 260 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 261 |
+
</edge>
|
| 262 |
+
<edge id="e6" source="733ed771-3fdb-11ee-8786-fda18d0d5bd8" target="HOST-2709">
|
| 263 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 264 |
+
<data key="e_timestamp">1695738680</data>
|
| 265 |
+
<data key="e_label_binary">malicious</data>
|
| 266 |
+
<data key="e_label_confidence">0.7</data>
|
| 267 |
+
<data key="e_suspicion_score">0.25</data>
|
| 268 |
+
<data key="e_mo_name">Data Theft</data>
|
| 269 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 270 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 271 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 272 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 273 |
+
<data key="e_disposition">Unprocessed</data>
|
| 274 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 275 |
+
</edge>
|
| 276 |
+
<edge id="e7" source="HOST-2709" target="733ed771-3fdb-11ee-8786-fda18d0d5bd8">
|
| 277 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 278 |
+
<data key="e_timestamp">1695738680</data>
|
| 279 |
+
<data key="e_label_binary">malicious</data>
|
| 280 |
+
<data key="e_label_confidence">0.7</data>
|
| 281 |
+
<data key="e_suspicion_score">0.25</data>
|
| 282 |
+
<data key="e_mo_name">Data Theft</data>
|
| 283 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 284 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 285 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 286 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 287 |
+
<data key="e_disposition">Unprocessed</data>
|
| 288 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 289 |
+
</edge>
|
| 290 |
+
<edge id="e8" source="HOST-3530" target="HOST-2709">
|
| 291 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 292 |
+
<data key="e_timestamp">1695738680</data>
|
| 293 |
+
<data key="e_label_binary">malicious</data>
|
| 294 |
+
<data key="e_label_confidence">0.7</data>
|
| 295 |
+
<data key="e_suspicion_score">0.25</data>
|
| 296 |
+
<data key="e_mo_name">Data Theft</data>
|
| 297 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 298 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 299 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 300 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 301 |
+
<data key="e_disposition">Unprocessed</data>
|
| 302 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 303 |
+
</edge>
|
| 304 |
+
<edge id="e9" source="HOST-2709" target="HOST-3530">
|
| 305 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 306 |
+
<data key="e_timestamp">1695738680</data>
|
| 307 |
+
<data key="e_label_binary">malicious</data>
|
| 308 |
+
<data key="e_label_confidence">0.7</data>
|
| 309 |
+
<data key="e_suspicion_score">0.25</data>
|
| 310 |
+
<data key="e_mo_name">Data Theft</data>
|
| 311 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 312 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 313 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 314 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 315 |
+
<data key="e_disposition">Unprocessed</data>
|
| 316 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 317 |
+
</edge>
|
| 318 |
+
<edge id="e10" source="17e54080-57c8-11ee-b6c7-1d04248a12be" target="HOST-2709">
|
| 319 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 320 |
+
<data key="e_timestamp">1695738680</data>
|
| 321 |
+
<data key="e_label_binary">malicious</data>
|
| 322 |
+
<data key="e_label_confidence">0.7</data>
|
| 323 |
+
<data key="e_suspicion_score">0.25</data>
|
| 324 |
+
<data key="e_mo_name">Data Theft</data>
|
| 325 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 326 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 327 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 328 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 329 |
+
<data key="e_disposition">Unprocessed</data>
|
| 330 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 331 |
+
</edge>
|
| 332 |
+
<edge id="e11" source="HOST-2709" target="17e54080-57c8-11ee-b6c7-1d04248a12be">
|
| 333 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 334 |
+
<data key="e_timestamp">1695738680</data>
|
| 335 |
+
<data key="e_label_binary">malicious</data>
|
| 336 |
+
<data key="e_label_confidence">0.7</data>
|
| 337 |
+
<data key="e_suspicion_score">0.25</data>
|
| 338 |
+
<data key="e_mo_name">Data Theft</data>
|
| 339 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 340 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 341 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 342 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 343 |
+
<data key="e_disposition">Unprocessed</data>
|
| 344 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 345 |
+
</edge>
|
| 346 |
+
<edge id="e12" source="c0df24a1-064a-11ee-9745-2f41befaec59" target="HOST-2709">
|
| 347 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 348 |
+
<data key="e_timestamp">1695738680</data>
|
| 349 |
+
<data key="e_label_binary">malicious</data>
|
| 350 |
+
<data key="e_label_confidence">0.7</data>
|
| 351 |
+
<data key="e_suspicion_score">0.25</data>
|
| 352 |
+
<data key="e_mo_name">Data Theft</data>
|
| 353 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 354 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 355 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 356 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 357 |
+
<data key="e_disposition">Unprocessed</data>
|
| 358 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 359 |
+
</edge>
|
| 360 |
+
<edge id="e13" source="HOST-2709" target="c0df24a1-064a-11ee-9745-2f41befaec59">
|
| 361 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 362 |
+
<data key="e_timestamp">1695738680</data>
|
| 363 |
+
<data key="e_label_binary">malicious</data>
|
| 364 |
+
<data key="e_label_confidence">0.7</data>
|
| 365 |
+
<data key="e_suspicion_score">0.25</data>
|
| 366 |
+
<data key="e_mo_name">Data Theft</data>
|
| 367 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 368 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 369 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 370 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 371 |
+
<data key="e_disposition">Unprocessed</data>
|
| 372 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 373 |
+
</edge>
|
| 374 |
+
<edge id="e14" source="HOST-3606" target="HOST-2709">
|
| 375 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 376 |
+
<data key="e_timestamp">1695738680</data>
|
| 377 |
+
<data key="e_label_binary">malicious</data>
|
| 378 |
+
<data key="e_label_confidence">0.7</data>
|
| 379 |
+
<data key="e_suspicion_score">0.25</data>
|
| 380 |
+
<data key="e_mo_name">Data Theft</data>
|
| 381 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 382 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 383 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 384 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 385 |
+
<data key="e_disposition">Unprocessed</data>
|
| 386 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 387 |
+
</edge>
|
| 388 |
+
<edge id="e15" source="HOST-2709" target="HOST-3606">
|
| 389 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 390 |
+
<data key="e_timestamp">1695738680</data>
|
| 391 |
+
<data key="e_label_binary">malicious</data>
|
| 392 |
+
<data key="e_label_confidence">0.7</data>
|
| 393 |
+
<data key="e_suspicion_score">0.25</data>
|
| 394 |
+
<data key="e_mo_name">Data Theft</data>
|
| 395 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 396 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 397 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 398 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 399 |
+
<data key="e_disposition">Unprocessed</data>
|
| 400 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 401 |
+
</edge>
|
| 402 |
+
<edge id="e16" source="44bd9e04-3bde-11ee-947a-edb098b7ee82" target="HOST-2709">
|
| 403 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 404 |
+
<data key="e_timestamp">1695738680</data>
|
| 405 |
+
<data key="e_label_binary">malicious</data>
|
| 406 |
+
<data key="e_label_confidence">0.7</data>
|
| 407 |
+
<data key="e_suspicion_score">0.25</data>
|
| 408 |
+
<data key="e_mo_name">Data Theft</data>
|
| 409 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 410 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 411 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 412 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 413 |
+
<data key="e_disposition">Unprocessed</data>
|
| 414 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 415 |
+
</edge>
|
| 416 |
+
<edge id="e17" source="HOST-2709" target="44bd9e04-3bde-11ee-947a-edb098b7ee82">
|
| 417 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 418 |
+
<data key="e_timestamp">1695738680</data>
|
| 419 |
+
<data key="e_label_binary">malicious</data>
|
| 420 |
+
<data key="e_label_confidence">0.7</data>
|
| 421 |
+
<data key="e_suspicion_score">0.25</data>
|
| 422 |
+
<data key="e_mo_name">Data Theft</data>
|
| 423 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 424 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 425 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 426 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 427 |
+
<data key="e_disposition">Unprocessed</data>
|
| 428 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 429 |
+
</edge>
|
| 430 |
+
<edge id="e18" source="HOST-2709" target="2f50d881-5866-11ee-a9dc-e360b954cf13">
|
| 431 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 432 |
+
<data key="e_timestamp">1695738680</data>
|
| 433 |
+
<data key="e_label_binary">malicious</data>
|
| 434 |
+
<data key="e_label_confidence">0.7</data>
|
| 435 |
+
<data key="e_suspicion_score">0.25</data>
|
| 436 |
+
<data key="e_mo_name">Data Theft</data>
|
| 437 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 438 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 439 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 440 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 441 |
+
<data key="e_disposition">Unprocessed</data>
|
| 442 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 443 |
+
</edge>
|
| 444 |
+
<edge id="e19" source="2f50d881-5866-11ee-a9dc-e360b954cf13" target="HOST-2709">
|
| 445 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 446 |
+
<data key="e_timestamp">1695738680</data>
|
| 447 |
+
<data key="e_label_binary">malicious</data>
|
| 448 |
+
<data key="e_label_confidence">0.7</data>
|
| 449 |
+
<data key="e_suspicion_score">0.25</data>
|
| 450 |
+
<data key="e_mo_name">Data Theft</data>
|
| 451 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 452 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 453 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 454 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 455 |
+
<data key="e_disposition">Unprocessed</data>
|
| 456 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 457 |
+
</edge>
|
| 458 |
+
<edge id="e20" source="44bd9e04-3bde-11ee-947a-edb098b7ee82" target="HOST-2834">
|
| 459 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 460 |
+
<data key="e_timestamp">1695738680</data>
|
| 461 |
+
<data key="e_label_binary">malicious</data>
|
| 462 |
+
<data key="e_label_confidence">0.7</data>
|
| 463 |
+
<data key="e_suspicion_score">0.25</data>
|
| 464 |
+
<data key="e_mo_name">Data Theft</data>
|
| 465 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 466 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 467 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 468 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 469 |
+
<data key="e_disposition">Unprocessed</data>
|
| 470 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 471 |
+
</edge>
|
| 472 |
+
<edge id="e21" source="44bd9e04-3bde-11ee-947a-edb098b7ee82" target="HOST-2768">
|
| 473 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 474 |
+
<data key="e_timestamp">1695738680</data>
|
| 475 |
+
<data key="e_label_binary">malicious</data>
|
| 476 |
+
<data key="e_label_confidence">0.7</data>
|
| 477 |
+
<data key="e_suspicion_score">0.25</data>
|
| 478 |
+
<data key="e_mo_name">Data Theft</data>
|
| 479 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 480 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 481 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 482 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 483 |
+
<data key="e_disposition">Unprocessed</data>
|
| 484 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 485 |
+
</edge>
|
| 486 |
+
<edge id="e22" source="HOST-3304" target="HOST-2709">
|
| 487 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 488 |
+
<data key="e_timestamp">1695738680</data>
|
| 489 |
+
<data key="e_label_binary">malicious</data>
|
| 490 |
+
<data key="e_label_confidence">0.7</data>
|
| 491 |
+
<data key="e_suspicion_score">0.25</data>
|
| 492 |
+
<data key="e_mo_name">Data Theft</data>
|
| 493 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 494 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 495 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 496 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 497 |
+
<data key="e_disposition">Unprocessed</data>
|
| 498 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 499 |
+
</edge>
|
| 500 |
+
<edge id="e23" source="HOST-2709" target="HOST-3304">
|
| 501 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 502 |
+
<data key="e_timestamp">1695738680</data>
|
| 503 |
+
<data key="e_label_binary">malicious</data>
|
| 504 |
+
<data key="e_label_confidence">0.7</data>
|
| 505 |
+
<data key="e_suspicion_score">0.25</data>
|
| 506 |
+
<data key="e_mo_name">Data Theft</data>
|
| 507 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 508 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 509 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 510 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 511 |
+
<data key="e_disposition">Unprocessed</data>
|
| 512 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 513 |
+
</edge>
|
| 514 |
+
<edge id="e24" source="HOST-2709" target="68268d94-06ad-11ee-b1b4-e35c0bd09b0c">
|
| 515 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 516 |
+
<data key="e_timestamp">1695738680</data>
|
| 517 |
+
<data key="e_label_binary">malicious</data>
|
| 518 |
+
<data key="e_label_confidence">0.7</data>
|
| 519 |
+
<data key="e_suspicion_score">0.25</data>
|
| 520 |
+
<data key="e_mo_name">Data Theft</data>
|
| 521 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 522 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 523 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 524 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 525 |
+
<data key="e_disposition">Unprocessed</data>
|
| 526 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 527 |
+
</edge>
|
| 528 |
+
<edge id="e25" source="68268d94-06ad-11ee-b1b4-e35c0bd09b0c" target="HOST-2709">
|
| 529 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 530 |
+
<data key="e_timestamp">1695738680</data>
|
| 531 |
+
<data key="e_label_binary">malicious</data>
|
| 532 |
+
<data key="e_label_confidence">0.7</data>
|
| 533 |
+
<data key="e_suspicion_score">0.25</data>
|
| 534 |
+
<data key="e_mo_name">Data Theft</data>
|
| 535 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 536 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 537 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 538 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 539 |
+
<data key="e_disposition">Unprocessed</data>
|
| 540 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 541 |
+
</edge>
|
| 542 |
+
<edge id="e26" source="332b2c23-581c-11ee-a1b9-21ba758c1abb" target="HOST-2709">
|
| 543 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 544 |
+
<data key="e_timestamp">1695738680</data>
|
| 545 |
+
<data key="e_label_binary">malicious</data>
|
| 546 |
+
<data key="e_label_confidence">0.7</data>
|
| 547 |
+
<data key="e_suspicion_score">0.25</data>
|
| 548 |
+
<data key="e_mo_name">Data Theft</data>
|
| 549 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 550 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 551 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 552 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 553 |
+
<data key="e_disposition">Unprocessed</data>
|
| 554 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 555 |
+
</edge>
|
| 556 |
+
<edge id="e27" source="HOST-2709" target="332b2c23-581c-11ee-a1b9-21ba758c1abb">
|
| 557 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 558 |
+
<data key="e_timestamp">1695738680</data>
|
| 559 |
+
<data key="e_label_binary">malicious</data>
|
| 560 |
+
<data key="e_label_confidence">0.7</data>
|
| 561 |
+
<data key="e_suspicion_score">0.25</data>
|
| 562 |
+
<data key="e_mo_name">Data Theft</data>
|
| 563 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 564 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 565 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 566 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 567 |
+
<data key="e_disposition">Unprocessed</data>
|
| 568 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 569 |
+
</edge>
|
| 570 |
+
<edge id="e28" source="c8ca6110-5b7d-11ee-b04e-bff924170329" target="HOST-2709">
|
| 571 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 572 |
+
<data key="e_timestamp">1695738680</data>
|
| 573 |
+
<data key="e_label_binary">malicious</data>
|
| 574 |
+
<data key="e_label_confidence">0.7</data>
|
| 575 |
+
<data key="e_suspicion_score">0.25</data>
|
| 576 |
+
<data key="e_mo_name">Data Theft</data>
|
| 577 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 578 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 579 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 580 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 581 |
+
<data key="e_disposition">Unprocessed</data>
|
| 582 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 583 |
+
</edge>
|
| 584 |
+
<edge id="e29" source="HOST-2709" target="c8ca6110-5b7d-11ee-b04e-bff924170329">
|
| 585 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 586 |
+
<data key="e_timestamp">1695738680</data>
|
| 587 |
+
<data key="e_label_binary">malicious</data>
|
| 588 |
+
<data key="e_label_confidence">0.7</data>
|
| 589 |
+
<data key="e_suspicion_score">0.25</data>
|
| 590 |
+
<data key="e_mo_name">Data Theft</data>
|
| 591 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 592 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 593 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 594 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 595 |
+
<data key="e_disposition">Unprocessed</data>
|
| 596 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 597 |
+
</edge>
|
| 598 |
+
<edge id="e30" source="HOST-2709" target="c433cdb3-0625-11ee-9a87-6114210b307b">
|
| 599 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 600 |
+
<data key="e_timestamp">1695738680</data>
|
| 601 |
+
<data key="e_label_binary">malicious</data>
|
| 602 |
+
<data key="e_label_confidence">0.7</data>
|
| 603 |
+
<data key="e_suspicion_score">0.25</data>
|
| 604 |
+
<data key="e_mo_name">Data Theft</data>
|
| 605 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 606 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 607 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 608 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 609 |
+
<data key="e_disposition">Unprocessed</data>
|
| 610 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 611 |
+
</edge>
|
| 612 |
+
<edge id="e31" source="c433cdb3-0625-11ee-9a87-6114210b307b" target="HOST-2709">
|
| 613 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 614 |
+
<data key="e_timestamp">1695738680</data>
|
| 615 |
+
<data key="e_label_binary">malicious</data>
|
| 616 |
+
<data key="e_label_confidence">0.7</data>
|
| 617 |
+
<data key="e_suspicion_score">0.25</data>
|
| 618 |
+
<data key="e_mo_name">Data Theft</data>
|
| 619 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 620 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 621 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 622 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 623 |
+
<data key="e_disposition">Unprocessed</data>
|
| 624 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 625 |
+
</edge>
|
| 626 |
+
<edge id="e32" source="0899b540-5816-11ee-904e-0f4c92ab5aea" target="HOST-2709">
|
| 627 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 628 |
+
<data key="e_timestamp">1695738680</data>
|
| 629 |
+
<data key="e_label_binary">malicious</data>
|
| 630 |
+
<data key="e_label_confidence">0.7</data>
|
| 631 |
+
<data key="e_suspicion_score">0.25</data>
|
| 632 |
+
<data key="e_mo_name">Data Theft</data>
|
| 633 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 634 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 635 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 636 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 637 |
+
<data key="e_disposition">Unprocessed</data>
|
| 638 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 639 |
+
</edge>
|
| 640 |
+
<edge id="e33" source="HOST-2709" target="0899b540-5816-11ee-904e-0f4c92ab5aea">
|
| 641 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 642 |
+
<data key="e_timestamp">1695738680</data>
|
| 643 |
+
<data key="e_label_binary">malicious</data>
|
| 644 |
+
<data key="e_label_confidence">0.7</data>
|
| 645 |
+
<data key="e_suspicion_score">0.25</data>
|
| 646 |
+
<data key="e_mo_name">Data Theft</data>
|
| 647 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 648 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 649 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 650 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 651 |
+
<data key="e_disposition">Unprocessed</data>
|
| 652 |
+
<data key="e_incident_id">5c0f5150-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 653 |
+
</edge>
|
| 654 |
+
</graph>
|
| 655 |
+
</graphml>
|
graph/incidents_graphml/5/5c1a90d0-683e-11ee-bbb0-b746705ccafc.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="e99b1800-062b-11ee-9224-e5648f8494ad">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.2.213</data>
|
| 35 |
+
<data key="n_hostname">100.64.2.213</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.24.247.113</data>
|
| 43 |
+
<data key="n_hostname">172.24.247.113</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="e99b1800-062b-11ee-9224-e5648f8494ad" target="HOST-2759">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697032753</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5c1a90d0-683e-11ee-bbb0-b746705ccafc</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5c1fa500-5c79-11ee-a457-0b0c771a8e8f.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.30.208.219</data>
|
| 35 |
+
<data key="n_hostname">172.30.208.219</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="efc1f843-0624-11ee-bb6d-91e4d286acbc">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.16.10</data>
|
| 43 |
+
<data key="n_hostname">100.64.16.10</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2823" target="HOST-3927">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1695738680</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5c1fa500-5c79-11ee-a457-0b0c771a8e8f</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5c2379c0-85f3-11ee-89b4-37c02fa13bd9.graphml
ADDED
|
@@ -0,0 +1,785 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="a9a1b301-0624-11ee-b404-ff2ea490fc35">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.43.32</data>
|
| 35 |
+
<data key="n_hostname">100.64.43.32</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="260096f4-062a-11ee-94f6-0d301f382bbb">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">10.135.251.191</data>
|
| 43 |
+
<data key="n_hostname">10.135.251.191</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<node id="0f1926c0-48ae-11ee-8104-710781c5eae5">
|
| 49 |
+
<data key="n_type">HOST</data>
|
| 50 |
+
<data key="n_ip">100.64.43.33</data>
|
| 51 |
+
<data key="n_hostname">100.64.43.33</data>
|
| 52 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 53 |
+
<data key="n_suspicion_score">0.25</data>
|
| 54 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 55 |
+
</node>
|
| 56 |
+
<node id="95c64660-0625-11ee-9882-3f47c834d49b">
|
| 57 |
+
<data key="n_type">HOST</data>
|
| 58 |
+
<data key="n_ip">100.64.7.248</data>
|
| 59 |
+
<data key="n_hostname">100.64.7.248</data>
|
| 60 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 61 |
+
<data key="n_suspicion_score">0.25</data>
|
| 62 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 63 |
+
</node>
|
| 64 |
+
<node id="00c0ae50-2d82-11ee-b9f2-87a92e7bf443">
|
| 65 |
+
<data key="n_type">HOST</data>
|
| 66 |
+
<data key="n_ip">100.64.43.34</data>
|
| 67 |
+
<data key="n_hostname">100.64.43.34</data>
|
| 68 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 69 |
+
<data key="n_suspicion_score">0.25</data>
|
| 70 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 71 |
+
</node>
|
| 72 |
+
<node id="94193d94-0670-11ee-bdc5-13de008dc54e">
|
| 73 |
+
<data key="n_type">HOST</data>
|
| 74 |
+
<data key="n_ip">100.64.43.35</data>
|
| 75 |
+
<data key="n_hostname">100.64.43.35</data>
|
| 76 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 77 |
+
<data key="n_suspicion_score">0.25</data>
|
| 78 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 79 |
+
</node>
|
| 80 |
+
<node id="5ffca1e2-0626-11ee-a510-47d18ec77e75">
|
| 81 |
+
<data key="n_type">HOST</data>
|
| 82 |
+
<data key="n_ip">100.64.20.196</data>
|
| 83 |
+
<data key="n_hostname">100.64.20.196</data>
|
| 84 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 85 |
+
<data key="n_suspicion_score">0.25</data>
|
| 86 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 87 |
+
</node>
|
| 88 |
+
<node id="515c8855-2b54-11ee-b154-4fbc33f467bf">
|
| 89 |
+
<data key="n_type">HOST</data>
|
| 90 |
+
<data key="n_ip">100.64.43.36</data>
|
| 91 |
+
<data key="n_hostname">100.64.43.36</data>
|
| 92 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 93 |
+
<data key="n_suspicion_score">0.25</data>
|
| 94 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 95 |
+
</node>
|
| 96 |
+
<node id="76817f58-81c6-11ee-958e-7fddd09659d7">
|
| 97 |
+
<data key="n_type">HOST</data>
|
| 98 |
+
<data key="n_ip">100.64.43.37</data>
|
| 99 |
+
<data key="n_hostname">100.64.43.37</data>
|
| 100 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 101 |
+
<data key="n_suspicion_score">0.25</data>
|
| 102 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 103 |
+
</node>
|
| 104 |
+
<node id="d77f5b71-55ba-11ee-ab09-67617b335815">
|
| 105 |
+
<data key="n_type">HOST</data>
|
| 106 |
+
<data key="n_ip">100.64.43.38</data>
|
| 107 |
+
<data key="n_hostname">100.64.43.38</data>
|
| 108 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 109 |
+
<data key="n_suspicion_score">0.25</data>
|
| 110 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 111 |
+
</node>
|
| 112 |
+
<node id="4ebf9a62-7884-11ee-abcc-b1f82d06c40c">
|
| 113 |
+
<data key="n_type">HOST</data>
|
| 114 |
+
<data key="n_ip">100.64.43.39</data>
|
| 115 |
+
<data key="n_hostname">100.64.43.39</data>
|
| 116 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 117 |
+
<data key="n_suspicion_score">0.25</data>
|
| 118 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 119 |
+
</node>
|
| 120 |
+
<node id="2d2acb82-0625-11ee-b173-c9921719c2f8">
|
| 121 |
+
<data key="n_type">HOST</data>
|
| 122 |
+
<data key="n_ip">172.31.78.41</data>
|
| 123 |
+
<data key="n_hostname">172.31.78.41</data>
|
| 124 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 125 |
+
<data key="n_suspicion_score">0.25</data>
|
| 126 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 127 |
+
</node>
|
| 128 |
+
<node id="543afd20-0626-11ee-8860-f951c26910c1">
|
| 129 |
+
<data key="n_type">HOST</data>
|
| 130 |
+
<data key="n_ip">100.64.19.41</data>
|
| 131 |
+
<data key="n_hostname">100.64.19.41</data>
|
| 132 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 133 |
+
<data key="n_suspicion_score">0.25</data>
|
| 134 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 135 |
+
</node>
|
| 136 |
+
<node id="ecd9e450-23f0-11ee-b145-27539b163423">
|
| 137 |
+
<data key="n_type">HOST</data>
|
| 138 |
+
<data key="n_ip">100.64.43.40</data>
|
| 139 |
+
<data key="n_hostname">100.64.43.40</data>
|
| 140 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 141 |
+
<data key="n_suspicion_score">0.25</data>
|
| 142 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 143 |
+
</node>
|
| 144 |
+
<node id="9cc03c50-1ade-11ee-9e07-b37497d5dd32">
|
| 145 |
+
<data key="n_type">HOST</data>
|
| 146 |
+
<data key="n_ip">100.64.43.41</data>
|
| 147 |
+
<data key="n_hostname">100.64.43.41</data>
|
| 148 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 149 |
+
<data key="n_suspicion_score">0.25</data>
|
| 150 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 151 |
+
</node>
|
| 152 |
+
<node id="5b1cebd0-0626-11ee-9a87-6114210b307b">
|
| 153 |
+
<data key="n_type">HOST</data>
|
| 154 |
+
<data key="n_ip">100.64.7.79</data>
|
| 155 |
+
<data key="n_hostname">100.64.7.79</data>
|
| 156 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 157 |
+
<data key="n_suspicion_score">0.25</data>
|
| 158 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 159 |
+
</node>
|
| 160 |
+
<node id="c2b57461-85c4-11ee-9ff0-155d7ae626e4">
|
| 161 |
+
<data key="n_type">HOST</data>
|
| 162 |
+
<data key="n_ip">100.64.43.42</data>
|
| 163 |
+
<data key="n_hostname">100.64.43.42</data>
|
| 164 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 165 |
+
<data key="n_suspicion_score">0.25</data>
|
| 166 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 167 |
+
</node>
|
| 168 |
+
<node id="94f49820-284b-11ee-8e51-fdab319f8e4f">
|
| 169 |
+
<data key="n_type">HOST</data>
|
| 170 |
+
<data key="n_ip">100.64.43.43</data>
|
| 171 |
+
<data key="n_hostname">100.64.43.43</data>
|
| 172 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 173 |
+
<data key="n_suspicion_score">0.25</data>
|
| 174 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 175 |
+
</node>
|
| 176 |
+
<node id="20abfbd0-0626-11ee-bea9-5f52a09eb73a">
|
| 177 |
+
<data key="n_type">HOST</data>
|
| 178 |
+
<data key="n_ip">100.64.41.4</data>
|
| 179 |
+
<data key="n_hostname">100.64.41.4</data>
|
| 180 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 181 |
+
<data key="n_suspicion_score">0.25</data>
|
| 182 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 183 |
+
</node>
|
| 184 |
+
<node id="109ea420-0c3b-11ee-994d-59e2984a0f56">
|
| 185 |
+
<data key="n_type">HOST</data>
|
| 186 |
+
<data key="n_ip">100.64.26.101</data>
|
| 187 |
+
<data key="n_hostname">100.64.26.101</data>
|
| 188 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 189 |
+
<data key="n_suspicion_score">0.25</data>
|
| 190 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 191 |
+
</node>
|
| 192 |
+
<node id="65820f00-2adf-11ee-a5e2-05a229d1287d">
|
| 193 |
+
<data key="n_type">HOST</data>
|
| 194 |
+
<data key="n_ip">100.64.43.44</data>
|
| 195 |
+
<data key="n_hostname">100.64.43.44</data>
|
| 196 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 197 |
+
<data key="n_suspicion_score">0.25</data>
|
| 198 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 199 |
+
</node>
|
| 200 |
+
<node id="81ca8d70-324d-11ee-a2eb-3988b4dbf023">
|
| 201 |
+
<data key="n_type">HOST</data>
|
| 202 |
+
<data key="n_ip">100.64.43.45</data>
|
| 203 |
+
<data key="n_hostname">100.64.43.45</data>
|
| 204 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 205 |
+
<data key="n_suspicion_score">0.25</data>
|
| 206 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 207 |
+
</node>
|
| 208 |
+
<node id="72c79372-0626-11ee-b19f-ed665a42340f">
|
| 209 |
+
<data key="n_type">HOST</data>
|
| 210 |
+
<data key="n_ip">172.23.168.229</data>
|
| 211 |
+
<data key="n_hostname">172.23.168.229</data>
|
| 212 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 213 |
+
<data key="n_suspicion_score">0.25</data>
|
| 214 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 215 |
+
</node>
|
| 216 |
+
<node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
|
| 217 |
+
<data key="n_type">HOST</data>
|
| 218 |
+
<data key="n_ip">10.117.12.163</data>
|
| 219 |
+
<data key="n_hostname">10.117.12.163</data>
|
| 220 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 221 |
+
<data key="n_suspicion_score">0.25</data>
|
| 222 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 223 |
+
</node>
|
| 224 |
+
<edge id="e1" source="a9a1b301-0624-11ee-b404-ff2ea490fc35" target="HOST-2751">
|
| 225 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 226 |
+
<data key="e_timestamp">1700299076</data>
|
| 227 |
+
<data key="e_label_binary">malicious</data>
|
| 228 |
+
<data key="e_label_confidence">0.7</data>
|
| 229 |
+
<data key="e_suspicion_score">0.25</data>
|
| 230 |
+
<data key="e_mo_name">Data Theft</data>
|
| 231 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 232 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 233 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 234 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 235 |
+
<data key="e_disposition">Unprocessed</data>
|
| 236 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 237 |
+
</edge>
|
| 238 |
+
<edge id="e2" source="HOST-2751" target="a9a1b301-0624-11ee-b404-ff2ea490fc35">
|
| 239 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 240 |
+
<data key="e_timestamp">1700299076</data>
|
| 241 |
+
<data key="e_label_binary">malicious</data>
|
| 242 |
+
<data key="e_label_confidence">0.7</data>
|
| 243 |
+
<data key="e_suspicion_score">0.25</data>
|
| 244 |
+
<data key="e_mo_name">Data Theft</data>
|
| 245 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 246 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 247 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 248 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 249 |
+
<data key="e_disposition">Unprocessed</data>
|
| 250 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 251 |
+
</edge>
|
| 252 |
+
<edge id="e3" source="0f1926c0-48ae-11ee-8104-710781c5eae5" target="HOST-2751">
|
| 253 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 254 |
+
<data key="e_timestamp">1700299076</data>
|
| 255 |
+
<data key="e_label_binary">malicious</data>
|
| 256 |
+
<data key="e_label_confidence">0.7</data>
|
| 257 |
+
<data key="e_suspicion_score">0.25</data>
|
| 258 |
+
<data key="e_mo_name">Data Theft</data>
|
| 259 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 260 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 261 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 262 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 263 |
+
<data key="e_disposition">Unprocessed</data>
|
| 264 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 265 |
+
</edge>
|
| 266 |
+
<edge id="e4" source="HOST-2751" target="0f1926c0-48ae-11ee-8104-710781c5eae5">
|
| 267 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 268 |
+
<data key="e_timestamp">1700299076</data>
|
| 269 |
+
<data key="e_label_binary">malicious</data>
|
| 270 |
+
<data key="e_label_confidence">0.7</data>
|
| 271 |
+
<data key="e_suspicion_score">0.25</data>
|
| 272 |
+
<data key="e_mo_name">Data Theft</data>
|
| 273 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 274 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 275 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 276 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 277 |
+
<data key="e_disposition">Unprocessed</data>
|
| 278 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 279 |
+
</edge>
|
| 280 |
+
<edge id="e5" source="HOST-2825" target="HOST-2751">
|
| 281 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 282 |
+
<data key="e_timestamp">1700299076</data>
|
| 283 |
+
<data key="e_label_binary">malicious</data>
|
| 284 |
+
<data key="e_label_confidence">0.7</data>
|
| 285 |
+
<data key="e_suspicion_score">0.25</data>
|
| 286 |
+
<data key="e_mo_name">Data Theft</data>
|
| 287 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 288 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 289 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 290 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 291 |
+
<data key="e_disposition">Unprocessed</data>
|
| 292 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 293 |
+
</edge>
|
| 294 |
+
<edge id="e6" source="HOST-2751" target="HOST-2825">
|
| 295 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 296 |
+
<data key="e_timestamp">1700299076</data>
|
| 297 |
+
<data key="e_label_binary">malicious</data>
|
| 298 |
+
<data key="e_label_confidence">0.7</data>
|
| 299 |
+
<data key="e_suspicion_score">0.25</data>
|
| 300 |
+
<data key="e_mo_name">Data Theft</data>
|
| 301 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 302 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 303 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 304 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 305 |
+
<data key="e_disposition">Unprocessed</data>
|
| 306 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 307 |
+
</edge>
|
| 308 |
+
<edge id="e7" source="00c0ae50-2d82-11ee-b9f2-87a92e7bf443" target="HOST-2751">
|
| 309 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 310 |
+
<data key="e_timestamp">1700299076</data>
|
| 311 |
+
<data key="e_label_binary">malicious</data>
|
| 312 |
+
<data key="e_label_confidence">0.7</data>
|
| 313 |
+
<data key="e_suspicion_score">0.25</data>
|
| 314 |
+
<data key="e_mo_name">Data Theft</data>
|
| 315 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 316 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 317 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 318 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 319 |
+
<data key="e_disposition">Unprocessed</data>
|
| 320 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 321 |
+
</edge>
|
| 322 |
+
<edge id="e8" source="HOST-2751" target="00c0ae50-2d82-11ee-b9f2-87a92e7bf443">
|
| 323 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 324 |
+
<data key="e_timestamp">1700299076</data>
|
| 325 |
+
<data key="e_label_binary">malicious</data>
|
| 326 |
+
<data key="e_label_confidence">0.7</data>
|
| 327 |
+
<data key="e_suspicion_score">0.25</data>
|
| 328 |
+
<data key="e_mo_name">Data Theft</data>
|
| 329 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 330 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 331 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 332 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 333 |
+
<data key="e_disposition">Unprocessed</data>
|
| 334 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 335 |
+
</edge>
|
| 336 |
+
<edge id="e9" source="94193d94-0670-11ee-bdc5-13de008dc54e" target="HOST-2751">
|
| 337 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 338 |
+
<data key="e_timestamp">1700299076</data>
|
| 339 |
+
<data key="e_label_binary">malicious</data>
|
| 340 |
+
<data key="e_label_confidence">0.7</data>
|
| 341 |
+
<data key="e_suspicion_score">0.25</data>
|
| 342 |
+
<data key="e_mo_name">Data Theft</data>
|
| 343 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 344 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 345 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 346 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 347 |
+
<data key="e_disposition">Unprocessed</data>
|
| 348 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 349 |
+
</edge>
|
| 350 |
+
<edge id="e10" source="HOST-2751" target="94193d94-0670-11ee-bdc5-13de008dc54e">
|
| 351 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 352 |
+
<data key="e_timestamp">1700299076</data>
|
| 353 |
+
<data key="e_label_binary">malicious</data>
|
| 354 |
+
<data key="e_label_confidence">0.7</data>
|
| 355 |
+
<data key="e_suspicion_score">0.25</data>
|
| 356 |
+
<data key="e_mo_name">Data Theft</data>
|
| 357 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 358 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 359 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 360 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 361 |
+
<data key="e_disposition">Unprocessed</data>
|
| 362 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 363 |
+
</edge>
|
| 364 |
+
<edge id="e11" source="HOST-4561" target="HOST-2751">
|
| 365 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 366 |
+
<data key="e_timestamp">1700299076</data>
|
| 367 |
+
<data key="e_label_binary">malicious</data>
|
| 368 |
+
<data key="e_label_confidence">0.7</data>
|
| 369 |
+
<data key="e_suspicion_score">0.25</data>
|
| 370 |
+
<data key="e_mo_name">Data Theft</data>
|
| 371 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 372 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 373 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 374 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 375 |
+
<data key="e_disposition">Unprocessed</data>
|
| 376 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 377 |
+
</edge>
|
| 378 |
+
<edge id="e12" source="HOST-2751" target="HOST-4561">
|
| 379 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 380 |
+
<data key="e_timestamp">1700299076</data>
|
| 381 |
+
<data key="e_label_binary">malicious</data>
|
| 382 |
+
<data key="e_label_confidence">0.7</data>
|
| 383 |
+
<data key="e_suspicion_score">0.25</data>
|
| 384 |
+
<data key="e_mo_name">Data Theft</data>
|
| 385 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 386 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 387 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 388 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 389 |
+
<data key="e_disposition">Unprocessed</data>
|
| 390 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 391 |
+
</edge>
|
| 392 |
+
<edge id="e13" source="HOST-2751" target="515c8855-2b54-11ee-b154-4fbc33f467bf">
|
| 393 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 394 |
+
<data key="e_timestamp">1700299076</data>
|
| 395 |
+
<data key="e_label_binary">malicious</data>
|
| 396 |
+
<data key="e_label_confidence">0.7</data>
|
| 397 |
+
<data key="e_suspicion_score">0.25</data>
|
| 398 |
+
<data key="e_mo_name">Data Theft</data>
|
| 399 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 400 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 401 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 402 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 403 |
+
<data key="e_disposition">Unprocessed</data>
|
| 404 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 405 |
+
</edge>
|
| 406 |
+
<edge id="e14" source="76817f58-81c6-11ee-958e-7fddd09659d7" target="HOST-2751">
|
| 407 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 408 |
+
<data key="e_timestamp">1700299076</data>
|
| 409 |
+
<data key="e_label_binary">malicious</data>
|
| 410 |
+
<data key="e_label_confidence">0.7</data>
|
| 411 |
+
<data key="e_suspicion_score">0.25</data>
|
| 412 |
+
<data key="e_mo_name">Data Theft</data>
|
| 413 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 414 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 415 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 416 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 417 |
+
<data key="e_disposition">Unprocessed</data>
|
| 418 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 419 |
+
</edge>
|
| 420 |
+
<edge id="e15" source="HOST-2751" target="76817f58-81c6-11ee-958e-7fddd09659d7">
|
| 421 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 422 |
+
<data key="e_timestamp">1700299076</data>
|
| 423 |
+
<data key="e_label_binary">malicious</data>
|
| 424 |
+
<data key="e_label_confidence">0.7</data>
|
| 425 |
+
<data key="e_suspicion_score">0.25</data>
|
| 426 |
+
<data key="e_mo_name">Data Theft</data>
|
| 427 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 428 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 429 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 430 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 431 |
+
<data key="e_disposition">Unprocessed</data>
|
| 432 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 433 |
+
</edge>
|
| 434 |
+
<edge id="e16" source="d77f5b71-55ba-11ee-ab09-67617b335815" target="HOST-2751">
|
| 435 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 436 |
+
<data key="e_timestamp">1700299076</data>
|
| 437 |
+
<data key="e_label_binary">malicious</data>
|
| 438 |
+
<data key="e_label_confidence">0.7</data>
|
| 439 |
+
<data key="e_suspicion_score">0.25</data>
|
| 440 |
+
<data key="e_mo_name">Data Theft</data>
|
| 441 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 442 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 443 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 444 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 445 |
+
<data key="e_disposition">Unprocessed</data>
|
| 446 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 447 |
+
</edge>
|
| 448 |
+
<edge id="e17" source="HOST-2751" target="d77f5b71-55ba-11ee-ab09-67617b335815">
|
| 449 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 450 |
+
<data key="e_timestamp">1700299076</data>
|
| 451 |
+
<data key="e_label_binary">malicious</data>
|
| 452 |
+
<data key="e_label_confidence">0.7</data>
|
| 453 |
+
<data key="e_suspicion_score">0.25</data>
|
| 454 |
+
<data key="e_mo_name">Data Theft</data>
|
| 455 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 456 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 457 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 458 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 459 |
+
<data key="e_disposition">Unprocessed</data>
|
| 460 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 461 |
+
</edge>
|
| 462 |
+
<edge id="e18" source="4ebf9a62-7884-11ee-abcc-b1f82d06c40c" target="HOST-2807">
|
| 463 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 464 |
+
<data key="e_timestamp">1700299076</data>
|
| 465 |
+
<data key="e_label_binary">malicious</data>
|
| 466 |
+
<data key="e_label_confidence">0.7</data>
|
| 467 |
+
<data key="e_suspicion_score">0.25</data>
|
| 468 |
+
<data key="e_mo_name">Data Theft</data>
|
| 469 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 470 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 471 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 472 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 473 |
+
<data key="e_disposition">Unprocessed</data>
|
| 474 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 475 |
+
</edge>
|
| 476 |
+
<edge id="e19" source="HOST-2807" target="4ebf9a62-7884-11ee-abcc-b1f82d06c40c">
|
| 477 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 478 |
+
<data key="e_timestamp">1700299076</data>
|
| 479 |
+
<data key="e_label_binary">malicious</data>
|
| 480 |
+
<data key="e_label_confidence">0.7</data>
|
| 481 |
+
<data key="e_suspicion_score">0.25</data>
|
| 482 |
+
<data key="e_mo_name">Data Theft</data>
|
| 483 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 484 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 485 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 486 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 487 |
+
<data key="e_disposition">Unprocessed</data>
|
| 488 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 489 |
+
</edge>
|
| 490 |
+
<edge id="e20" source="HOST-4355" target="HOST-2807">
|
| 491 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 492 |
+
<data key="e_timestamp">1700299076</data>
|
| 493 |
+
<data key="e_label_binary">malicious</data>
|
| 494 |
+
<data key="e_label_confidence">0.7</data>
|
| 495 |
+
<data key="e_suspicion_score">0.25</data>
|
| 496 |
+
<data key="e_mo_name">Data Theft</data>
|
| 497 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 498 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 499 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 500 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 501 |
+
<data key="e_disposition">Unprocessed</data>
|
| 502 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 503 |
+
</edge>
|
| 504 |
+
<edge id="e21" source="HOST-2807" target="HOST-4355">
|
| 505 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 506 |
+
<data key="e_timestamp">1700299076</data>
|
| 507 |
+
<data key="e_label_binary">malicious</data>
|
| 508 |
+
<data key="e_label_confidence">0.7</data>
|
| 509 |
+
<data key="e_suspicion_score">0.25</data>
|
| 510 |
+
<data key="e_mo_name">Data Theft</data>
|
| 511 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 512 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 513 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 514 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 515 |
+
<data key="e_disposition">Unprocessed</data>
|
| 516 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 517 |
+
</edge>
|
| 518 |
+
<edge id="e22" source="00c0ae50-2d82-11ee-b9f2-87a92e7bf443" target="HOST-2807">
|
| 519 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 520 |
+
<data key="e_timestamp">1700299076</data>
|
| 521 |
+
<data key="e_label_binary">malicious</data>
|
| 522 |
+
<data key="e_label_confidence">0.7</data>
|
| 523 |
+
<data key="e_suspicion_score">0.25</data>
|
| 524 |
+
<data key="e_mo_name">Data Theft</data>
|
| 525 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 526 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 527 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 528 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 529 |
+
<data key="e_disposition">Unprocessed</data>
|
| 530 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 531 |
+
</edge>
|
| 532 |
+
<edge id="e23" source="HOST-2807" target="00c0ae50-2d82-11ee-b9f2-87a92e7bf443">
|
| 533 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 534 |
+
<data key="e_timestamp">1700299076</data>
|
| 535 |
+
<data key="e_label_binary">malicious</data>
|
| 536 |
+
<data key="e_label_confidence">0.7</data>
|
| 537 |
+
<data key="e_suspicion_score">0.25</data>
|
| 538 |
+
<data key="e_mo_name">Data Theft</data>
|
| 539 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 540 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 541 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 542 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 543 |
+
<data key="e_disposition">Unprocessed</data>
|
| 544 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 545 |
+
</edge>
|
| 546 |
+
<edge id="e24" source="HOST-2751" target="ecd9e450-23f0-11ee-b145-27539b163423">
|
| 547 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 548 |
+
<data key="e_timestamp">1700299076</data>
|
| 549 |
+
<data key="e_label_binary">malicious</data>
|
| 550 |
+
<data key="e_label_confidence">0.7</data>
|
| 551 |
+
<data key="e_suspicion_score">0.25</data>
|
| 552 |
+
<data key="e_mo_name">Data Theft</data>
|
| 553 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 554 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 555 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 556 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 557 |
+
<data key="e_disposition">Unprocessed</data>
|
| 558 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 559 |
+
</edge>
|
| 560 |
+
<edge id="e25" source="9cc03c50-1ade-11ee-9e07-b37497d5dd32" target="HOST-2807">
|
| 561 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 562 |
+
<data key="e_timestamp">1700299076</data>
|
| 563 |
+
<data key="e_label_binary">malicious</data>
|
| 564 |
+
<data key="e_label_confidence">0.7</data>
|
| 565 |
+
<data key="e_suspicion_score">0.25</data>
|
| 566 |
+
<data key="e_mo_name">Data Theft</data>
|
| 567 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 568 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 569 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 570 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 571 |
+
<data key="e_disposition">Unprocessed</data>
|
| 572 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 573 |
+
</edge>
|
| 574 |
+
<edge id="e26" source="HOST-2807" target="9cc03c50-1ade-11ee-9e07-b37497d5dd32">
|
| 575 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 576 |
+
<data key="e_timestamp">1700299076</data>
|
| 577 |
+
<data key="e_label_binary">malicious</data>
|
| 578 |
+
<data key="e_label_confidence">0.7</data>
|
| 579 |
+
<data key="e_suspicion_score">0.25</data>
|
| 580 |
+
<data key="e_mo_name">Data Theft</data>
|
| 581 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 582 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 583 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 584 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 585 |
+
<data key="e_disposition">Unprocessed</data>
|
| 586 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 587 |
+
</edge>
|
| 588 |
+
<edge id="e27" source="HOST-2714" target="HOST-2807">
|
| 589 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 590 |
+
<data key="e_timestamp">1700299076</data>
|
| 591 |
+
<data key="e_label_binary">malicious</data>
|
| 592 |
+
<data key="e_label_confidence">0.7</data>
|
| 593 |
+
<data key="e_suspicion_score">0.25</data>
|
| 594 |
+
<data key="e_mo_name">Data Theft</data>
|
| 595 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 596 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 597 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 598 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 599 |
+
<data key="e_disposition">Unprocessed</data>
|
| 600 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 601 |
+
</edge>
|
| 602 |
+
<edge id="e28" source="HOST-2807" target="HOST-2714">
|
| 603 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 604 |
+
<data key="e_timestamp">1700299076</data>
|
| 605 |
+
<data key="e_label_binary">malicious</data>
|
| 606 |
+
<data key="e_label_confidence">0.7</data>
|
| 607 |
+
<data key="e_suspicion_score">0.25</data>
|
| 608 |
+
<data key="e_mo_name">Data Theft</data>
|
| 609 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 610 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 611 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 612 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 613 |
+
<data key="e_disposition">Unprocessed</data>
|
| 614 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 615 |
+
</edge>
|
| 616 |
+
<edge id="e29" source="c2b57461-85c4-11ee-9ff0-155d7ae626e4" target="HOST-2807">
|
| 617 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 618 |
+
<data key="e_timestamp">1700299076</data>
|
| 619 |
+
<data key="e_label_binary">malicious</data>
|
| 620 |
+
<data key="e_label_confidence">0.7</data>
|
| 621 |
+
<data key="e_suspicion_score">0.25</data>
|
| 622 |
+
<data key="e_mo_name">Data Theft</data>
|
| 623 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 624 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 625 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 626 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 627 |
+
<data key="e_disposition">Unprocessed</data>
|
| 628 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 629 |
+
</edge>
|
| 630 |
+
<edge id="e30" source="HOST-2807" target="c2b57461-85c4-11ee-9ff0-155d7ae626e4">
|
| 631 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 632 |
+
<data key="e_timestamp">1700299076</data>
|
| 633 |
+
<data key="e_label_binary">malicious</data>
|
| 634 |
+
<data key="e_label_confidence">0.7</data>
|
| 635 |
+
<data key="e_suspicion_score">0.25</data>
|
| 636 |
+
<data key="e_mo_name">Data Theft</data>
|
| 637 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 638 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 639 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 640 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 641 |
+
<data key="e_disposition">Unprocessed</data>
|
| 642 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 643 |
+
</edge>
|
| 644 |
+
<edge id="e31" source="HOST-2807" target="94f49820-284b-11ee-8e51-fdab319f8e4f">
|
| 645 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 646 |
+
<data key="e_timestamp">1700299076</data>
|
| 647 |
+
<data key="e_label_binary">malicious</data>
|
| 648 |
+
<data key="e_label_confidence">0.7</data>
|
| 649 |
+
<data key="e_suspicion_score">0.25</data>
|
| 650 |
+
<data key="e_mo_name">Data Theft</data>
|
| 651 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 652 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 653 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 654 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 655 |
+
<data key="e_disposition">Unprocessed</data>
|
| 656 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 657 |
+
</edge>
|
| 658 |
+
<edge id="e32" source="HOST-7351" target="HOST-2751">
|
| 659 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 660 |
+
<data key="e_timestamp">1700299076</data>
|
| 661 |
+
<data key="e_label_binary">malicious</data>
|
| 662 |
+
<data key="e_label_confidence">0.7</data>
|
| 663 |
+
<data key="e_suspicion_score">0.25</data>
|
| 664 |
+
<data key="e_mo_name">Data Theft</data>
|
| 665 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 666 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 667 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 668 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 669 |
+
<data key="e_disposition">Unprocessed</data>
|
| 670 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 671 |
+
</edge>
|
| 672 |
+
<edge id="e33" source="HOST-2751" target="HOST-7351">
|
| 673 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 674 |
+
<data key="e_timestamp">1700299076</data>
|
| 675 |
+
<data key="e_label_binary">malicious</data>
|
| 676 |
+
<data key="e_label_confidence">0.7</data>
|
| 677 |
+
<data key="e_suspicion_score">0.25</data>
|
| 678 |
+
<data key="e_mo_name">Data Theft</data>
|
| 679 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 680 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 681 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 682 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 683 |
+
<data key="e_disposition">Unprocessed</data>
|
| 684 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 685 |
+
</edge>
|
| 686 |
+
<edge id="e34" source="HOST-2751" target="HOST-5365">
|
| 687 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 688 |
+
<data key="e_timestamp">1700299076</data>
|
| 689 |
+
<data key="e_label_binary">malicious</data>
|
| 690 |
+
<data key="e_label_confidence">0.7</data>
|
| 691 |
+
<data key="e_suspicion_score">0.25</data>
|
| 692 |
+
<data key="e_mo_name">Data Theft</data>
|
| 693 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 694 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 695 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 696 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 697 |
+
<data key="e_disposition">Unprocessed</data>
|
| 698 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 699 |
+
</edge>
|
| 700 |
+
<edge id="e35" source="HOST-5365" target="HOST-2751">
|
| 701 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 702 |
+
<data key="e_timestamp">1700299076</data>
|
| 703 |
+
<data key="e_label_binary">malicious</data>
|
| 704 |
+
<data key="e_label_confidence">0.7</data>
|
| 705 |
+
<data key="e_suspicion_score">0.25</data>
|
| 706 |
+
<data key="e_mo_name">Data Theft</data>
|
| 707 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 708 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 709 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 710 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 711 |
+
<data key="e_disposition">Unprocessed</data>
|
| 712 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 713 |
+
</edge>
|
| 714 |
+
<edge id="e36" source="65820f00-2adf-11ee-a5e2-05a229d1287d" target="HOST-2807">
|
| 715 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 716 |
+
<data key="e_timestamp">1700299076</data>
|
| 717 |
+
<data key="e_label_binary">malicious</data>
|
| 718 |
+
<data key="e_label_confidence">0.7</data>
|
| 719 |
+
<data key="e_suspicion_score">0.25</data>
|
| 720 |
+
<data key="e_mo_name">Data Theft</data>
|
| 721 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 722 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 723 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 724 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 725 |
+
<data key="e_disposition">Unprocessed</data>
|
| 726 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 727 |
+
</edge>
|
| 728 |
+
<edge id="e37" source="HOST-2807" target="65820f00-2adf-11ee-a5e2-05a229d1287d">
|
| 729 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 730 |
+
<data key="e_timestamp">1700299076</data>
|
| 731 |
+
<data key="e_label_binary">malicious</data>
|
| 732 |
+
<data key="e_label_confidence">0.7</data>
|
| 733 |
+
<data key="e_suspicion_score">0.25</data>
|
| 734 |
+
<data key="e_mo_name">Data Theft</data>
|
| 735 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 736 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 737 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 738 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 739 |
+
<data key="e_disposition">Unprocessed</data>
|
| 740 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 741 |
+
</edge>
|
| 742 |
+
<edge id="e38" source="81ca8d70-324d-11ee-a2eb-3988b4dbf023" target="HOST-2865">
|
| 743 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 744 |
+
<data key="e_timestamp">1700299076</data>
|
| 745 |
+
<data key="e_label_binary">malicious</data>
|
| 746 |
+
<data key="e_label_confidence">0.7</data>
|
| 747 |
+
<data key="e_suspicion_score">0.25</data>
|
| 748 |
+
<data key="e_mo_name">Data Theft</data>
|
| 749 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 750 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 751 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 752 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 753 |
+
<data key="e_disposition">Unprocessed</data>
|
| 754 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 755 |
+
</edge>
|
| 756 |
+
<edge id="e39" source="65820f00-2adf-11ee-a5e2-05a229d1287d" target="HOST-2865">
|
| 757 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 758 |
+
<data key="e_timestamp">1700299076</data>
|
| 759 |
+
<data key="e_label_binary">malicious</data>
|
| 760 |
+
<data key="e_label_confidence">0.7</data>
|
| 761 |
+
<data key="e_suspicion_score">0.25</data>
|
| 762 |
+
<data key="e_mo_name">Data Theft</data>
|
| 763 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 764 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 765 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 766 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 767 |
+
<data key="e_disposition">Unprocessed</data>
|
| 768 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 769 |
+
</edge>
|
| 770 |
+
<edge id="e40" source="00c0ae50-2d82-11ee-b9f2-87a92e7bf443" target="HOST-2773">
|
| 771 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 772 |
+
<data key="e_timestamp">1700299076</data>
|
| 773 |
+
<data key="e_label_binary">malicious</data>
|
| 774 |
+
<data key="e_label_confidence">0.7</data>
|
| 775 |
+
<data key="e_suspicion_score">0.25</data>
|
| 776 |
+
<data key="e_mo_name">Data Theft</data>
|
| 777 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 778 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 779 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 780 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 781 |
+
<data key="e_disposition">Unprocessed</data>
|
| 782 |
+
<data key="e_incident_id">5c2379c0-85f3-11ee-89b4-37c02fa13bd9</data>
|
| 783 |
+
</edge>
|
| 784 |
+
</graph>
|
| 785 |
+
</graphml>
|
graph/incidents_graphml/5/5c276a10-73c2-11ed-85ba-bb75aa2d6818.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="0b34fa20-7307-11ed-95c2-4183a345a6dd">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.82.130</data>
|
| 35 |
+
<data key="n_hostname">100.64.82.130</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="d0bb55d5-41a9-11ed-a587-21753cf039e4">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.72.130</data>
|
| 43 |
+
<data key="n_hostname">100.64.72.130</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="0b34fa20-7307-11ed-95c2-4183a345a6dd" target="HOST-12958">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1670151412</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5c276a10-73c2-11ed-85ba-bb75aa2d6818</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="HOST-12958" target="0b34fa20-7307-11ed-95c2-4183a345a6dd">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1670151412</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.7</data>
|
| 67 |
+
<data key="e_suspicion_score">0.25</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Unprocessed</data>
|
| 74 |
+
<data key="e_incident_id">5c276a10-73c2-11ed-85ba-bb75aa2d6818</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/5/5c283600-254e-11ee-bba0-3d7b70aaa407.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="1a774f63-066e-11ee-904d-db08e2329d95">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.41.122</data>
|
| 35 |
+
<data key="n_hostname">100.64.41.122</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.25</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="2d2acb82-0625-11ee-b173-c9921719c2f8">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">172.31.78.41</data>
|
| 43 |
+
<data key="n_hostname">172.31.78.41</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.25</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="1a774f63-066e-11ee-904d-db08e2329d95" target="HOST-2807">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1689672898</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.7</data>
|
| 53 |
+
<data key="e_suspicion_score">0.25</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Unprocessed</data>
|
| 60 |
+
<data key="e_incident_id">5c283600-254e-11ee-bba0-3d7b70aaa407</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|
graph/incidents_graphml/5/5c28df20-01a8-11ee-a3af-a97ccd3b2ee2.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="ce733dd2-c24e-11ed-8118-a129e7fcaaac">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">192.168.43.11</data>
|
| 35 |
+
<data key="n_hostname">192.168.43.11</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.859375</data>
|
| 38 |
+
<data key="n_products">["Precinct","Cisco Meraki Firewall","Meraki","Stealthwatch","FireEye Endpoint Security (HX Series)"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="cb5009a0-016c-11ee-ae49-6bc8e778d44a">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.75.239</data>
|
| 43 |
+
<data key="n_hostname">100.64.75.239</data>
|
| 44 |
+
<data key="n_set_roles">[]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.7890625</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="ce733dd2-c24e-11ed-8118-a129e7fcaaac" target="cb5009a0-016c-11ee-ae49-6bc8e778d44a">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1685753310</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.859375</data>
|
| 53 |
+
<data key="e_suspicion_score">0.859375</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5c28df20-01a8-11ee-a3af-a97ccd3b2ee2</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="cb5009a0-016c-11ee-ae49-6bc8e778d44a" target="ce733dd2-c24e-11ed-8118-a129e7fcaaac">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1685753310</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.859375</data>
|
| 67 |
+
<data key="e_suspicion_score">0.859375</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">5c28df20-01a8-11ee-a3af-a97ccd3b2ee2</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/5/5c2a0760-140e-11ee-aa1e-3bafa1120b8e.graphml
ADDED
|
@@ -0,0 +1,77 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="7bad9712-0648-11ee-9753-df91e10ae8c7">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">100.64.72.176</data>
|
| 35 |
+
<data key="n_hostname">100.64.72.176</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","Meraki","Umbrella"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="909da041-1235-11ee-811b-61657335b45c">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.82.230</data>
|
| 43 |
+
<data key="n_hostname">100.64.82.230</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.578125</data>
|
| 46 |
+
<data key="n_products">["Precinct","Meraki"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-15197" target="909da041-1235-11ee-811b-61657335b45c">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1687776240</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5c2a0760-140e-11ee-aa1e-3bafa1120b8e</data>
|
| 61 |
+
</edge>
|
| 62 |
+
<edge id="e2" source="909da041-1235-11ee-811b-61657335b45c" target="HOST-15197">
|
| 63 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 64 |
+
<data key="e_timestamp">1687776240</data>
|
| 65 |
+
<data key="e_label_binary">malicious</data>
|
| 66 |
+
<data key="e_label_confidence">0.71875</data>
|
| 67 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 68 |
+
<data key="e_mo_name">Data Theft</data>
|
| 69 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 70 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 71 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 72 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 73 |
+
<data key="e_disposition">Disrupted</data>
|
| 74 |
+
<data key="e_incident_id">5c2a0760-140e-11ee-aa1e-3bafa1120b8e</data>
|
| 75 |
+
</edge>
|
| 76 |
+
</graph>
|
| 77 |
+
</graphml>
|
graph/incidents_graphml/5/5c2a4840-683e-11ee-bbb0-b746705ccafc.graphml
ADDED
|
@@ -0,0 +1,63 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<?xml version="1.0" encoding="UTF-8"?>
|
| 2 |
+
<graphml xmlns="http://graphml.graphdrawing.org/xmlns"
|
| 3 |
+
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
| 4 |
+
xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
| 5 |
+
<key id="n_type" for="node" attr.name="type" attr.type="string"/>
|
| 6 |
+
<key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
|
| 7 |
+
<key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
|
| 8 |
+
<key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
|
| 9 |
+
<key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
|
| 10 |
+
<key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
|
| 11 |
+
<key id="n_products" for="node" attr.name="products" attr.type="string"/>
|
| 12 |
+
<key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
|
| 13 |
+
<key id="e_type" for="edge" attr.name="type" attr.type="string"/>
|
| 14 |
+
<key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
|
| 15 |
+
<key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
|
| 16 |
+
<key id="e_action" for="edge" attr.name="action" attr.type="string"/>
|
| 17 |
+
<key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
|
| 18 |
+
<key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
|
| 19 |
+
<key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
|
| 20 |
+
<key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
|
| 21 |
+
<key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
|
| 22 |
+
<key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
|
| 23 |
+
<key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
|
| 24 |
+
<key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
|
| 25 |
+
<key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
|
| 26 |
+
<key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
|
| 27 |
+
<key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
|
| 28 |
+
<key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
|
| 29 |
+
<key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
|
| 30 |
+
<key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
|
| 31 |
+
<graph id="G" edgedefault="directed">
|
| 32 |
+
<node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
|
| 33 |
+
<data key="n_type">HOST</data>
|
| 34 |
+
<data key="n_ip">172.24.247.113</data>
|
| 35 |
+
<data key="n_hostname">172.24.247.113</data>
|
| 36 |
+
<data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 37 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 38 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 39 |
+
</node>
|
| 40 |
+
<node id="e99b1800-062b-11ee-9224-e5648f8494ad">
|
| 41 |
+
<data key="n_type">HOST</data>
|
| 42 |
+
<data key="n_ip">100.64.2.213</data>
|
| 43 |
+
<data key="n_hostname">100.64.2.213</data>
|
| 44 |
+
<data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
|
| 45 |
+
<data key="n_suspicion_score">0.71875</data>
|
| 46 |
+
<data key="n_products">["Precinct","ASA Firewall"]</data>
|
| 47 |
+
</node>
|
| 48 |
+
<edge id="e1" source="HOST-2759" target="HOST-6084">
|
| 49 |
+
<data key="e_type">INCIDENT_LINK</data>
|
| 50 |
+
<data key="e_timestamp">1697032753</data>
|
| 51 |
+
<data key="e_label_binary">malicious</data>
|
| 52 |
+
<data key="e_label_confidence">0.71875</data>
|
| 53 |
+
<data key="e_suspicion_score">0.71875</data>
|
| 54 |
+
<data key="e_mo_name">Data Theft</data>
|
| 55 |
+
<data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
|
| 56 |
+
<data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
|
| 57 |
+
<data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
|
| 58 |
+
<data key="e_lifecycle_stage">complete-mission</data>
|
| 59 |
+
<data key="e_disposition">Disrupted</data>
|
| 60 |
+
<data key="e_incident_id">5c2a4840-683e-11ee-bbb0-b746705ccafc</data>
|
| 61 |
+
</edge>
|
| 62 |
+
</graph>
|
| 63 |
+
</graphml>
|