diff --git a/graph/incidents_graphml/5/5b579a40-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5b579a40-2206-11ee-bfff-c38ddf5b615c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3610831cef9c36269d30877e9d7b71ba2734e24
--- /dev/null
+++ b/graph/incidents_graphml/5/5b579a40-2206-11ee-bfff-c38ddf5b615c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.14.216
+ 100.64.14.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689312119
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5b579a40-2206-11ee-bfff-c38ddf5b615c
+
+
+
diff --git a/graph/incidents_graphml/5/5b58d120-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5b58d120-1631-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99067d16c7c56e617e54a8ae020664ae69975ba5
--- /dev/null
+++ b/graph/incidents_graphml/5/5b58d120-1631-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688011173
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b58d120-1631-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/5/5b5cca30-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5b5cca30-5c79-11ee-a457-0b0c771a8e8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2eef96ddad46fa2cc0783fe4ac809eaf0870b0ae
--- /dev/null
+++ b/graph/incidents_graphml/5/5b5cca30-5c79-11ee-a457-0b0c771a8e8f.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.155
+ 100.64.7.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695738678
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b5cca30-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738678
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b5cca30-5c79-11ee-a457-0b0c771a8e8f
+
+
+
diff --git a/graph/incidents_graphml/5/5b621130-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5b621130-61e6-11ee-b713-27a48af32cd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6eca381d67ecc55071f7d9655bb15a27152a0a1d
--- /dev/null
+++ b/graph/incidents_graphml/5/5b621130-61e6-11ee-b713-27a48af32cd1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.81
+ 100.64.7.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696335249
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b621130-61e6-11ee-b713-27a48af32cd1
+
+
+
diff --git a/graph/incidents_graphml/5/5b6a85d0-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5b6a85d0-5c79-11ee-a457-0b0c771a8e8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a72fadd2e8bbfdfaaed2bb4dd96ded932c317ed
--- /dev/null
+++ b/graph/incidents_graphml/5/5b6a85d0-5c79-11ee-a457-0b0c771a8e8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.155
+ 100.64.7.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695738679
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b6a85d0-5c79-11ee-a457-0b0c771a8e8f
+
+
+
diff --git a/graph/incidents_graphml/5/5b6b4350-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5b6b4350-e327-11ee-8328-d19a3893d959.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8dc86f1acd82441ab682e68f308f1ed260ff9981
--- /dev/null
+++ b/graph/incidents_graphml/5/5b6b4350-e327-11ee-8328-d19a3893d959.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.154
+ 100.64.33.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710546867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b6b4350-e327-11ee-8328-d19a3893d959
+
+
+
diff --git a/graph/incidents_graphml/5/5b6d4520-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5b6d4520-2206-11ee-bfff-c38ddf5b615c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6419274973257f74943295a33df9070dd16868d2
--- /dev/null
+++ b/graph/incidents_graphml/5/5b6d4520-2206-11ee-bfff-c38ddf5b615c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.137
+ 100.64.76.137
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689312119
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b6d4520-2206-11ee-bfff-c38ddf5b615c
+
+
+
diff --git a/graph/incidents_graphml/5/5b77da80-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/5b77da80-761b-11ee-8b7f-db490bea3fed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf7fbb2b4dccff0b584f77c91412e64fa8b2555c
--- /dev/null
+++ b/graph/incidents_graphml/5/5b77da80-761b-11ee-8b7f-db490bea3fed.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.30
+ 100.64.41.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698557036
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b77da80-761b-11ee-8b7f-db490bea3fed
+
+
+
diff --git a/graph/incidents_graphml/5/5b7d44b0-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5b7d44b0-e327-11ee-8328-d19a3893d959.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a795926b92fc65a75ab14108c3324b333ef8556
--- /dev/null
+++ b/graph/incidents_graphml/5/5b7d44b0-e327-11ee-8328-d19a3893d959.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.154
+ 100.64.33.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710546867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5b7d44b0-e327-11ee-8328-d19a3893d959
+
+
+
diff --git a/graph/incidents_graphml/5/5b863d50-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/5/5b863d50-08e2-11ef-ae93-51753793321f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b429bb97d59907310a2bef37f67771532a57f1e7
--- /dev/null
+++ b/graph/incidents_graphml/5/5b863d50-08e2-11ef-ae93-51753793321f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.124
+ USER-0015-2131.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1714695376
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b863d50-08e2-11ef-ae93-51753793321f
+
+
+
diff --git a/graph/incidents_graphml/5/5b889ed0-1d9b-11ed-a4d2-f740cdf36de9.graphml b/graph/incidents_graphml/5/5b889ed0-1d9b-11ed-a4d2-f740cdf36de9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a0146bd9aa1a2de8b6fda2651686ffce7413c7c
--- /dev/null
+++ b/graph/incidents_graphml/5/5b889ed0-1d9b-11ed-a4d2-f740cdf36de9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.72
+ 100.64.71.72
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660678861
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b889ed0-1d9b-11ed-a4d2-f740cdf36de9
+
+
+
diff --git a/graph/incidents_graphml/5/5b891890-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/5b891890-761b-11ee-8b7f-db490bea3fed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9e85484d2c13c8be9833566d29474ea6ec4f5b9
--- /dev/null
+++ b/graph/incidents_graphml/5/5b891890-761b-11ee-8b7f-db490bea3fed.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.30
+ 100.64.41.30
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698557036
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b891890-761b-11ee-8b7f-db490bea3fed
+
+
+
diff --git a/graph/incidents_graphml/5/5b89f3b0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5b89f3b0-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c909550bd2be8c69bf6529ce5725b4b9fa934f08
--- /dev/null
+++ b/graph/incidents_graphml/5/5b89f3b0-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.88
+ 100.64.18.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300952
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b89f3b0-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/5b8b2ce0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5b8b2ce0-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..168c4fcedf7ad281197ce884139346e8f8e35f2c
--- /dev/null
+++ b/graph/incidents_graphml/5/5b8b2ce0-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.41
+ 100.64.47.41
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475231
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b8b2ce0-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/5/5b90f9c0-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5b90f9c0-2206-11ee-bfff-c38ddf5b615c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec7376df9817f6b0151d4c0e7eedf43ba2ead818
--- /dev/null
+++ b/graph/incidents_graphml/5/5b90f9c0-2206-11ee-bfff-c38ddf5b615c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.137
+ 100.64.76.137
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689312119
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5b90f9c0-2206-11ee-bfff-c38ddf5b615c
+
+
+
diff --git a/graph/incidents_graphml/5/5b979da0-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/5/5b979da0-2ff5-11ee-b00f-c1ca007fb916.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62e74f4bdbab6e6ac5ff69e520db9f9cbeaa011a
--- /dev/null
+++ b/graph/incidents_graphml/5/5b979da0-2ff5-11ee-b00f-c1ca007fb916.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.146
+ 100.64.21.146
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1690844134
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5b979da0-2ff5-11ee-b00f-c1ca007fb916
+
+
+
diff --git a/graph/incidents_graphml/5/5b97f090-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/5/5b97f090-08e2-11ef-ae93-51753793321f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79506f96fe768a5d1eac04ae4f061a5222e3ef60
--- /dev/null
+++ b/graph/incidents_graphml/5/5b97f090-08e2-11ef-ae93-51753793321f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.124
+ USER-0015-2131.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714695376
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5b97f090-08e2-11ef-ae93-51753793321f
+
+
+
diff --git a/graph/incidents_graphml/5/5b9aa4c0-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/5b9aa4c0-761b-11ee-8b7f-db490bea3fed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2bdb93caaf8cf149a46423f0e097288a8057743e
--- /dev/null
+++ b/graph/incidents_graphml/5/5b9aa4c0-761b-11ee-8b7f-db490bea3fed.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.31
+ 100.64.41.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698557036
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b9aa4c0-761b-11ee-8b7f-db490bea3fed
+
+
+
diff --git a/graph/incidents_graphml/5/5b9b26a0-4403-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/5/5b9b26a0-4403-11ef-b0b5-17c176975c0f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..844f292ce400aa9b494e2a3a7fa36d7094c2f346
--- /dev/null
+++ b/graph/incidents_graphml/5/5b9b26a0-4403-11ef-b0b5-17c176975c0f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.18
+ 100.64.41.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721196668
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5b9b26a0-4403-11ef-b0b5-17c176975c0f
+
+
+
diff --git a/graph/incidents_graphml/5/5ba05030-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/5/5ba05030-2ff5-11ee-b00f-c1ca007fb916.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be844e9fb128f3ebca849732f183ad58424fe798
--- /dev/null
+++ b/graph/incidents_graphml/5/5ba05030-2ff5-11ee-b00f-c1ca007fb916.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.21.146
+ 100.64.21.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690844134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ba05030-2ff5-11ee-b00f-c1ca007fb916
+
+
+
diff --git a/graph/incidents_graphml/5/5ba089a0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5ba089a0-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..47a2b7f48bc4ea0b96e4cdb9efc14815c1ad6cb5
--- /dev/null
+++ b/graph/incidents_graphml/5/5ba089a0-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.41
+ 100.64.47.41
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475231
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ba089a0-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/5/5ba2f9f0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5ba2f9f0-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9f8415966aefefbac0c9e68ab5817cdbee03659
--- /dev/null
+++ b/graph/incidents_graphml/5/5ba2f9f0-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.88
+ 100.64.18.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300952
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ba2f9f0-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/5babbbc0-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/5babbbc0-761b-11ee-8b7f-db490bea3fed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c3070ea2b5660808ba71ba8825bba21ea659f3c7
--- /dev/null
+++ b/graph/incidents_graphml/5/5babbbc0-761b-11ee-8b7f-db490bea3fed.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.31
+ 100.64.41.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698557037
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5babbbc0-761b-11ee-8b7f-db490bea3fed
+
+
+
diff --git a/graph/incidents_graphml/5/5baf2e80-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5baf2e80-1631-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..972cb034b5a6bd83b781e60a57423592ae82ff68
--- /dev/null
+++ b/graph/incidents_graphml/5/5baf2e80-1631-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688011174
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5baf2e80-1631-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/5/5bb6f720-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5bb6f720-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ac67e46dad5c6aa2af49d56cfda11770b9102b7
--- /dev/null
+++ b/graph/incidents_graphml/5/5bb6f720-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.44
+ 100.64.11.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300953
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5bb6f720-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/5bba88d0-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/5bba88d0-761b-11ee-8b7f-db490bea3fed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a0431c20cd101bf58ef41cd76718ad17369d9da
--- /dev/null
+++ b/graph/incidents_graphml/5/5bba88d0-761b-11ee-8b7f-db490bea3fed.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.34
+ USER-0015-1330.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698557037
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5bba88d0-761b-11ee-8b7f-db490bea3fed
+
+
+
diff --git a/graph/incidents_graphml/5/5bbb5600-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/5bbb5600-0c22-11ef-9a57-bba1bbebb052.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e2d23f447659234659d552ccef436445d0b8bbe
--- /dev/null
+++ b/graph/incidents_graphml/5/5bbb5600-0c22-11ef-9a57-bba1bbebb052.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.97
+ 100.64.60.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715052718
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5bbb5600-0c22-11ef-9a57-bba1bbebb052
+
+
+
diff --git a/graph/incidents_graphml/5/5bbb58d0-4403-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/5/5bbb58d0-4403-11ef-b0b5-17c176975c0f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48b6b8e5a5be605b5f1ae5554166134634ee1c32
--- /dev/null
+++ b/graph/incidents_graphml/5/5bbb58d0-4403-11ef-b0b5-17c176975c0f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.18
+ 100.64.41.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721196668
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5bbb58d0-4403-11ef-b0b5-17c176975c0f
+
+
+
diff --git a/graph/incidents_graphml/5/5bc3f880-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/5bc3f880-f52c-11ee-9bad-936e2aee478a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84cb5b3d01876c79e9739775820ccc6e3b9130ad
--- /dev/null
+++ b/graph/incidents_graphml/5/5bc3f880-f52c-11ee-9bad-936e2aee478a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.148
+ 100.64.17.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712528136
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5bc3f880-f52c-11ee-9bad-936e2aee478a
+
+
+
diff --git a/graph/incidents_graphml/5/5bcc1ee0-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/5bcc1ee0-0c22-11ef-9a57-bba1bbebb052.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88aff1a90809a6bedb22bcc9ec9f3c7d2ebe0c0d
--- /dev/null
+++ b/graph/incidents_graphml/5/5bcc1ee0-0c22-11ef-9a57-bba1bbebb052.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.97
+ 100.64.60.97
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715052718
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5bcc1ee0-0c22-11ef-9a57-bba1bbebb052
+
+
+
diff --git a/graph/incidents_graphml/5/5bcd8bf0-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5bcd8bf0-1631-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30db18b1c24116ae30b245add620afcb3009fd60
--- /dev/null
+++ b/graph/incidents_graphml/5/5bcd8bf0-1631-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688011174
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5bcd8bf0-1631-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/5/5bd9d7f0-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/5bd9d7f0-794d-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6b760fa172cab91e0ee6c7a2462af2340c2297f
--- /dev/null
+++ b/graph/incidents_graphml/5/5bd9d7f0-794d-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.243
+ 100.64.44.243
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698908365
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5bd9d7f0-794d-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/5/5bdb87b0-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5bdb87b0-9d12-11ee-a559-a1780370c51a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe88cbd7432eb3a68088edb39bfbe54a3b3d3411
--- /dev/null
+++ b/graph/incidents_graphml/5/5bdb87b0-9d12-11ee-a559-a1780370c51a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.131
+ 100.64.7.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702841267
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5bdb87b0-9d12-11ee-a559-a1780370c51a
+
+
+
diff --git a/graph/incidents_graphml/5/5be04d40-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/5be04d40-a613-11ee-b304-ddeb750e6414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f813d342082c2ab09088598c9e59ae69592baa2e
--- /dev/null
+++ b/graph/incidents_graphml/5/5be04d40-a613-11ee-b304-ddeb750e6414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.44
+ 100.64.59.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703831257
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5be04d40-a613-11ee-b304-ddeb750e6414
+
+
+
diff --git a/graph/incidents_graphml/5/5be66b50-9c9d-11ee-b60c-751684393f5d.graphml b/graph/incidents_graphml/5/5be66b50-9c9d-11ee-b60c-751684393f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82333174d8679c3189e59d2b7bef4068204c0d5a
--- /dev/null
+++ b/graph/incidents_graphml/5/5be66b50-9c9d-11ee-b60c-751684393f5d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.174
+ 100.64.8.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1702791016
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5be66b50-9c9d-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702791016
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5be66b50-9c9d-11ee-b60c-751684393f5d
+
+
+
diff --git a/graph/incidents_graphml/5/5beb6630-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5beb6630-9d12-11ee-a559-a1780370c51a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf362a8048fccd6bcc2db687398f98819db4071d
--- /dev/null
+++ b/graph/incidents_graphml/5/5beb6630-9d12-11ee-a559-a1780370c51a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.66
+ 100.64.22.66
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702841267
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5beb6630-9d12-11ee-a559-a1780370c51a
+
+
+
diff --git a/graph/incidents_graphml/5/5bf2a020-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5bf2a020-1631-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a95f10e232dc10c5f08cb0f462ae7d05ae94f393
--- /dev/null
+++ b/graph/incidents_graphml/5/5bf2a020-1631-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,129 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.134
+ 100.64.43.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688011174
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5bf2a020-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011174
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5bf2a020-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011174
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5bf2a020-1631-11ee-87fd-95133fbba576
+
+
+ INCIDENT_LINK
+ 1688011174
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5bf2a020-1631-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/5/5bfa8160-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5bfa8160-9d12-11ee-a559-a1780370c51a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6506c43df8611aed79880fac2bc13306b83671f1
--- /dev/null
+++ b/graph/incidents_graphml/5/5bfa8160-9d12-11ee-a559-a1780370c51a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.68
+ 100.64.22.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702841267
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5bfa8160-9d12-11ee-a559-a1780370c51a
+
+
+
diff --git a/graph/incidents_graphml/5/5c097580-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5c097580-9d12-11ee-a559-a1780370c51a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b27e814ea9f09a4cb42f0be9b3736880dee7d521
--- /dev/null
+++ b/graph/incidents_graphml/5/5c097580-9d12-11ee-a559-a1780370c51a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.68
+ 100.64.22.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702841267
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5c097580-9d12-11ee-a559-a1780370c51a
+
+
+
diff --git a/graph/incidents_graphml/5/5c0a0420-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/5c0a0420-2ade-11ed-961c-99a30b1a3145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d5758cf021a9bdc26ccde041454066b38f1736b
--- /dev/null
+++ b/graph/incidents_graphml/5/5c0a0420-2ade-11ed-961c-99a30b1a3145.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.99
+ USER-0015-1939.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.123
+ 100.64.71.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662137003
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c0a0420-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662137003
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c0a0420-2ade-11ed-961c-99a30b1a3145
+
+
+
diff --git a/graph/incidents_graphml/5/5c0b7090-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5c0b7090-61e6-11ee-b713-27a48af32cd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67c05676f863132484d9276082e967a842ddab9c
--- /dev/null
+++ b/graph/incidents_graphml/5/5c0b7090-61e6-11ee-b713-27a48af32cd1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.139
+ 100.64.47.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696335251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0b7090-61e6-11ee-b713-27a48af32cd1
+
+
+
diff --git a/graph/incidents_graphml/5/5c0f5150-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5c0f5150-5c79-11ee-a457-0b0c771a8e8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4bf0c8ea52b96175276426ba98c18ff79e90c81f
--- /dev/null
+++ b/graph/incidents_graphml/5/5c0f5150-5c79-11ee-a457-0b0c771a8e8f.graphml
@@ -0,0 +1,655 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.10
+ 100.64.16.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.11
+ 100.64.16.11
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.12
+ 100.64.16.12
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.13
+ 100.64.16.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.59
+ 100.64.13.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.14
+ 100.64.16.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.15
+ 100.64.16.15
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.201
+ 100.64.13.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.16
+ 100.64.16.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.17
+ 100.64.16.17
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.126
+ 100.64.11.126
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.18
+ 100.64.16.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.19
+ 100.64.16.19
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.20
+ 100.64.16.20
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.21
+ 100.64.16.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.22
+ 100.64.16.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c0f5150-5c79-11ee-a457-0b0c771a8e8f
+
+
+
diff --git a/graph/incidents_graphml/5/5c1a90d0-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5c1a90d0-683e-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6cd6e3e6361e1c9c3ec7d03a402f318732b5c738
--- /dev/null
+++ b/graph/incidents_graphml/5/5c1a90d0-683e-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.213
+ 100.64.2.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697032753
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c1a90d0-683e-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/5/5c1fa500-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5c1fa500-5c79-11ee-a457-0b0c771a8e8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5afe5e90877543d62945677ec41dedfeed871390
--- /dev/null
+++ b/graph/incidents_graphml/5/5c1fa500-5c79-11ee-a457-0b0c771a8e8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.10
+ 100.64.16.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695738680
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5c1fa500-5c79-11ee-a457-0b0c771a8e8f
+
+
+
diff --git a/graph/incidents_graphml/5/5c2379c0-85f3-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/5/5c2379c0-85f3-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cec066130f83fd869b6349319361873d179d9836
--- /dev/null
+++ b/graph/incidents_graphml/5/5c2379c0-85f3-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,785 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.32
+ 100.64.43.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.33
+ 100.64.43.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.34
+ 100.64.43.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.35
+ 100.64.43.35
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.196
+ 100.64.20.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.36
+ 100.64.43.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.37
+ 100.64.43.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.38
+ 100.64.43.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.39
+ 100.64.43.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.41
+ 100.64.19.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.40
+ 100.64.43.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.41
+ 100.64.43.41
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.79
+ 100.64.7.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.42
+ 100.64.43.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.43
+ 100.64.43.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.4
+ 100.64.41.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.101
+ 100.64.26.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.44
+ 100.64.43.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.45
+ 100.64.43.45
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c2379c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/5/5c276a10-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/5/5c276a10-73c2-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc9496631e8cfdd8856856b7cfb27809128ac502
--- /dev/null
+++ b/graph/incidents_graphml/5/5c276a10-73c2-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.130
+ 100.64.82.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.130
+ 100.64.72.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1670151412
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c276a10-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151412
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c276a10-73c2-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/5/5c283600-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5c283600-254e-11ee-bba0-3d7b70aaa407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39bc304fec50808a44878091d2214df3117ee0a9
--- /dev/null
+++ b/graph/incidents_graphml/5/5c283600-254e-11ee-bba0-3d7b70aaa407.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.122
+ 100.64.41.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689672898
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c283600-254e-11ee-bba0-3d7b70aaa407
+
+
+
diff --git a/graph/incidents_graphml/5/5c28df20-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/5/5c28df20-01a8-11ee-a3af-a97ccd3b2ee2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3077dccf3a529261f3db8c6166bf97573a8bb8b6
--- /dev/null
+++ b/graph/incidents_graphml/5/5c28df20-01a8-11ee-a3af-a97ccd3b2ee2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.43.11
+ 192.168.43.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.859375
+ ["Precinct","Cisco Meraki Firewall","Meraki","Stealthwatch","FireEye Endpoint Security (HX Series)"]
+
+
+ HOST
+ 100.64.75.239
+ 100.64.75.239
+ []
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1685753310
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c28df20-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+ INCIDENT_LINK
+ 1685753310
+ malicious
+ 0.859375
+ 0.859375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c28df20-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+
diff --git a/graph/incidents_graphml/5/5c2a0760-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/5/5c2a0760-140e-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f0986149ea4bb6e1aea3bfca5497883ab3905cac
--- /dev/null
+++ b/graph/incidents_graphml/5/5c2a0760-140e-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.176
+ 100.64.72.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.230
+ 100.64.82.230
+ ["Exploiting Target","Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687776240
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5c2a0760-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776240
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5c2a0760-140e-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/5/5c2a4840-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5c2a4840-683e-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57e19270a3af4ea783ee4112f5811850c1450e77
--- /dev/null
+++ b/graph/incidents_graphml/5/5c2a4840-683e-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.213
+ 100.64.2.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697032753
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5c2a4840-683e-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/5/5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/5/5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..75951f7609e6a62a44f4872999e4b45f540016e7
--- /dev/null
+++ b/graph/incidents_graphml/5/5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2.graphml
@@ -0,0 +1,99 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.73
+ 100.64.29.73
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.235
+ 100.64.71.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.33
+ HOST-13950
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685753311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+ INCIDENT_LINK
+ 1685753311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+ INCIDENT_LINK
+ 1685753311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+
diff --git a/graph/incidents_graphml/5/5c4ab450-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5c4ab450-3403-11ee-94d6-7df16e3753d9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35a72b8d568e892594daa9d78b78ecbe56334ea1
--- /dev/null
+++ b/graph/incidents_graphml/5/5c4ab450-3403-11ee-94d6-7df16e3753d9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.200
+ 100.64.44.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691289953
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c4ab450-3403-11ee-94d6-7df16e3753d9
+
+
+
diff --git a/graph/incidents_graphml/5/5c519ec0-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5c519ec0-0c1a-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52ddba1a4f8541256b4fb92a91ba73faf6b857a6
--- /dev/null
+++ b/graph/incidents_graphml/5/5c519ec0-0c1a-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.231
+ 100.64.80.231
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.147
+ 100.64.71.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686901785
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5c519ec0-0c1a-11ee-a535-110da53c9d07
+
+
+ INCIDENT_LINK
+ 1686901785
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5c519ec0-0c1a-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/5/5c5671f0-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5c5671f0-254e-11ee-bba0-3d7b70aaa407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..128d34771fcb58a90343fce63d9e2ef2534f8398
--- /dev/null
+++ b/graph/incidents_graphml/5/5c5671f0-254e-11ee-bba0-3d7b70aaa407.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.122
+ 100.64.41.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689672898
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5c5671f0-254e-11ee-bba0-3d7b70aaa407
+
+
+
diff --git a/graph/incidents_graphml/5/5c6574e0-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5c6574e0-0c1a-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59b3c6ccb2e127c43207e1856c8ff7f9b7eafcac
--- /dev/null
+++ b/graph/incidents_graphml/5/5c6574e0-0c1a-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.106.234
+ 192.168.106.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.72.96
+ 100.64.72.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686901785
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c6574e0-0c1a-11ee-a535-110da53c9d07
+
+
+ INCIDENT_LINK
+ 1686901785
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c6574e0-0c1a-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/5/5c6df3c0-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5c6df3c0-3403-11ee-94d6-7df16e3753d9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d38be324fd7983aa4c970950a25834a89c766874
--- /dev/null
+++ b/graph/incidents_graphml/5/5c6df3c0-3403-11ee-94d6-7df16e3753d9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.200
+ 100.64.44.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691289953
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5c6df3c0-3403-11ee-94d6-7df16e3753d9
+
+
+
diff --git a/graph/incidents_graphml/5/5c72a730-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5c72a730-2206-11ee-bfff-c38ddf5b615c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd4aa73378e7dc3d5668774bf80d137694fc9e2d
--- /dev/null
+++ b/graph/incidents_graphml/5/5c72a730-2206-11ee-bfff-c38ddf5b615c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.180.49
+ 192.168.180.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 192.168.147.151
+ 192.168.147.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689312121
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c72a730-2206-11ee-bfff-c38ddf5b615c
+
+
+ INCIDENT_LINK
+ 1689312121
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c72a730-2206-11ee-bfff-c38ddf5b615c
+
+
+
diff --git a/graph/incidents_graphml/5/5c7e6100-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5c7e6100-e327-11ee-8328-d19a3893d959.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..165a2419aacfe64ede3da5fca3d1a2e2f5cdaa82
--- /dev/null
+++ b/graph/incidents_graphml/5/5c7e6100-e327-11ee-8328-d19a3893d959.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.202
+ 100.64.8.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710546869
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c7e6100-e327-11ee-8328-d19a3893d959
+
+
+ INCIDENT_LINK
+ 1710546869
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5c7e6100-e327-11ee-8328-d19a3893d959
+
+
+
diff --git a/graph/incidents_graphml/5/5c8591c0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5c8591c0-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..049f7d080afbc9a4a0ae4e01bd90d624aa059741
--- /dev/null
+++ b/graph/incidents_graphml/5/5c8591c0-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.89
+ 100.64.18.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300954
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c8591c0-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/5c92fa70-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5c92fa70-e327-11ee-8328-d19a3893d959.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52210d907282c19fd85824258e113b16bf74e2e0
--- /dev/null
+++ b/graph/incidents_graphml/5/5c92fa70-e327-11ee-8328-d19a3893d959.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.202
+ 100.64.8.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710546869
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5c92fa70-e327-11ee-8328-d19a3893d959
+
+
+
diff --git a/graph/incidents_graphml/5/5c9bd8e0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5c9bd8e0-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82dc8773a1a933f5554f1da8a4ba44bc18c2f74f
--- /dev/null
+++ b/graph/incidents_graphml/5/5c9bd8e0-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.89
+ 100.64.18.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300954
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5c9bd8e0-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/5c9c0f70-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/5/5c9c0f70-22d3-11ef-b7cc-27d8681b231b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8fb933b1a6c3b43585f281718dbc4eafebb94397
--- /dev/null
+++ b/graph/incidents_graphml/5/5c9c0f70-22d3-11ef-b7cc-27d8681b231b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.223.173
+ 172.21.223.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.234
+ 100.64.89.234
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717547666
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c9c0f70-22d3-11ef-b7cc-27d8681b231b
+
+
+ INCIDENT_LINK
+ 1717547666
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5c9c0f70-22d3-11ef-b7cc-27d8681b231b
+
+
+
diff --git a/graph/incidents_graphml/5/5ca6a980-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5ca6a980-e327-11ee-8328-d19a3893d959.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a816ee86d0acc4333bb3879490086d7bde7c7102
--- /dev/null
+++ b/graph/incidents_graphml/5/5ca6a980-e327-11ee-8328-d19a3893d959.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.190
+ 100.64.27.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710546869
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ca6a980-e327-11ee-8328-d19a3893d959
+
+
+
diff --git a/graph/incidents_graphml/5/5cae1b30-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/5/5cae1b30-f6bd-11ee-861e-3f1320280b96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf2e83f9898d02e5c343dd7cd59ff74500884b61
--- /dev/null
+++ b/graph/incidents_graphml/5/5cae1b30-f6bd-11ee-861e-3f1320280b96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.168
+ 100.64.6.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712700366
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cae1b30-f6bd-11ee-861e-3f1320280b96
+
+
+
diff --git a/graph/incidents_graphml/5/5cb1aad0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5cb1aad0-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9260b3f0fc1437f0e28277776ca75779d5164b7e
--- /dev/null
+++ b/graph/incidents_graphml/5/5cb1aad0-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.91
+ 100.64.18.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300954
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5cb1aad0-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/5cbeefb0-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/5/5cbeefb0-14fa-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..97930664afb5f92f3acb60c2f540b73aaec6296c
--- /dev/null
+++ b/graph/incidents_graphml/5/5cbeefb0-14fa-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.235
+ 100.64.95.235
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1659730104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5cbeefb0-14fa-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/5/5cc4c420-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5cc4c420-254e-11ee-bba0-3d7b70aaa407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e442e7ac795f3ae42c7d3b584fd8d7a33a13ecf4
--- /dev/null
+++ b/graph/incidents_graphml/5/5cc4c420-254e-11ee-bba0-3d7b70aaa407.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.124
+ 100.64.41.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689672899
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5cc4c420-254e-11ee-bba0-3d7b70aaa407
+
+
+
diff --git a/graph/incidents_graphml/5/5cc5c700-3b19-11ed-9b4c-29667546a453.graphml b/graph/incidents_graphml/5/5cc5c700-3b19-11ed-9b4c-29667546a453.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb76db98bfc1121145f7920c8295952572aac641
--- /dev/null
+++ b/graph/incidents_graphml/5/5cc5c700-3b19-11ed-9b4c-29667546a453.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.50
+ 100.64.96.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663921563
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cc5c700-3b19-11ed-9b4c-29667546a453
+
+
+
diff --git a/graph/incidents_graphml/5/5ccab110-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5ccab110-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f068fc9dd005da9f0e857c72630064f318e8ed2
--- /dev/null
+++ b/graph/incidents_graphml/5/5ccab110-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.91
+ 100.64.18.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300954
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ccab110-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/5/5ccf3ce0-3b19-11ed-9b4c-29667546a453.graphml b/graph/incidents_graphml/5/5ccf3ce0-3b19-11ed-9b4c-29667546a453.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40ef7cce36e1cc16c1188d0189ce007d2ee6dc0e
--- /dev/null
+++ b/graph/incidents_graphml/5/5ccf3ce0-3b19-11ed-9b4c-29667546a453.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.50
+ 100.64.96.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663921563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ccf3ce0-3b19-11ed-9b4c-29667546a453
+
+
+
diff --git a/graph/incidents_graphml/5/5cd5b8e0-41e5-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/5/5cd5b8e0-41e5-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2dd8ef3e52929633154b10e31fe43d94b21809f9
--- /dev/null
+++ b/graph/incidents_graphml/5/5cd5b8e0-41e5-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.212
+ 100.64.75.212
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.212
+ 100.64.72.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1664668887
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cd5b8e0-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668887
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cd5b8e0-41e5-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/5/5cd65080-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5cd65080-a1f6-11ee-aa63-351afb0017e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..685e5ee8b588ab5347586dbc8c7cf5ec1e1cb1d5
--- /dev/null
+++ b/graph/incidents_graphml/5/5cd65080-a1f6-11ee-aa63-351afb0017e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.78
+ 100.64.13.78
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703378998
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5cd65080-a1f6-11ee-aa63-351afb0017e4
+
+
+
diff --git a/graph/incidents_graphml/5/5cd8ac60-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5cd8ac60-9d12-11ee-a559-a1780370c51a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..148cbd7407acab180b483f1e4b5674da891066ec
--- /dev/null
+++ b/graph/incidents_graphml/5/5cd8ac60-9d12-11ee-a559-a1780370c51a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.244
+ 100.64.15.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702841268
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5cd8ac60-9d12-11ee-a559-a1780370c51a
+
+
+
diff --git a/graph/incidents_graphml/5/5cd9aee0-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/5/5cd9aee0-22e1-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77519bff460937cc008a5a48c6de2611b6a03fb3
--- /dev/null
+++ b/graph/incidents_graphml/5/5cd9aee0-22e1-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.127
+ 100.64.23.127
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689406181
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5cd9aee0-22e1-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/5/5cd9c430-3b19-11ed-9b4c-29667546a453.graphml b/graph/incidents_graphml/5/5cd9c430-3b19-11ed-9b4c-29667546a453.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e804c464fbbc3be1495de788bebbb4f2b745380
--- /dev/null
+++ b/graph/incidents_graphml/5/5cd9c430-3b19-11ed-9b4c-29667546a453.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.52
+ 100.64.96.52
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663921563
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5cd9c430-3b19-11ed-9b4c-29667546a453
+
+
+
diff --git a/graph/incidents_graphml/5/5ce67cf0-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5ce67cf0-254e-11ee-bba0-3d7b70aaa407.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58bbf2518a81ef129a174140f938c8eaf96b4ac7
--- /dev/null
+++ b/graph/incidents_graphml/5/5ce67cf0-254e-11ee-bba0-3d7b70aaa407.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.124
+ 100.64.41.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689672899
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ce67cf0-254e-11ee-bba0-3d7b70aaa407
+
+
+
diff --git a/graph/incidents_graphml/5/5ced45d0-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5ced45d0-9d12-11ee-a559-a1780370c51a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..720ca480fb1d0e19035bbd97291fc19b0b9d4e66
--- /dev/null
+++ b/graph/incidents_graphml/5/5ced45d0-9d12-11ee-a559-a1780370c51a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.244
+ 100.64.15.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702841269
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ced45d0-9d12-11ee-a559-a1780370c51a
+
+
+
diff --git a/graph/incidents_graphml/5/5cf59850-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5cf59850-a1f6-11ee-aa63-351afb0017e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0de2f5d0ee78917a84cee5769a2bd4cbf5b1acdf
--- /dev/null
+++ b/graph/incidents_graphml/5/5cf59850-a1f6-11ee-aa63-351afb0017e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.80
+ 100.64.13.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703378998
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5cf59850-a1f6-11ee-aa63-351afb0017e4
+
+
+
diff --git a/graph/incidents_graphml/5/5cfbd6b0-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/5/5cfbd6b0-2f33-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f9b1b7c685a9b56c8a9e9351795a81318c8f9f5
--- /dev/null
+++ b/graph/incidents_graphml/5/5cfbd6b0-2f33-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.170.59
+ 192.168.170.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.0.105
+ 100.64.0.105
+ ["Exploiting Target","Exploiting Host"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 192.168.235.180
+ 192.168.235.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 192.168.96.90
+ 192.168.96.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690760814
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760814
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760814
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760814
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760814
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760814
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/5/5cfe9a90-2f9b-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/5/5cfe9a90-2f9b-11ee-812f-67af952e62fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db7e8315befd5f39fa8f593cb6fa38bdce668bd7
--- /dev/null
+++ b/graph/incidents_graphml/5/5cfe9a90-2f9b-11ee-812f-67af952e62fd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.140
+ 100.64.68.140
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690805482
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cfe9a90-2f9b-11ee-812f-67af952e62fd
+
+
+ INCIDENT_LINK
+ 1690805482
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5cfe9a90-2f9b-11ee-812f-67af952e62fd
+
+
+
diff --git a/graph/incidents_graphml/5/5d028a30-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d028a30-4d3f-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..253b7ca0006d4261f8522791f7a525e036eed098
--- /dev/null
+++ b/graph/incidents_graphml/5/5d028a30-4d3f-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.73
+ 100.64.19.73
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694064503
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5d028a30-4d3f-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/5/5d0290a0-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d0290a0-a1f6-11ee-aa63-351afb0017e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f67e224d5a82a60c257bd41c36d4dbf7699daf40
--- /dev/null
+++ b/graph/incidents_graphml/5/5d0290a0-a1f6-11ee-aa63-351afb0017e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.80
+ 100.64.13.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703378999
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d0290a0-a1f6-11ee-aa63-351afb0017e4
+
+
+
diff --git a/graph/incidents_graphml/5/5d092350-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/5/5d092350-22e1-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b70b950032ab64e21583cefeb78b7fd7ae6b5945
--- /dev/null
+++ b/graph/incidents_graphml/5/5d092350-22e1-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.149
+ 100.64.9.149
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.107
+ 100.64.58.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.76
+ 100.64.42.76
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.42
+ 100.64.19.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.108
+ 100.64.58.108
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.109
+ 100.64.58.109
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.110
+ 100.64.58.110
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.111
+ 100.64.58.111
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.112
+ 100.64.58.112
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.1
+ 100.64.18.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.11
+ 100.64.33.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.113
+ 100.64.58.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.32
+ 100.64.42.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.172
+ 100.64.10.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.100
+ 100.64.43.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.173
+ 100.64.23.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.114
+ 100.64.58.114
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.202
+ 100.64.10.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689406182
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d092350-22e1-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/5/5d110850-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5d110850-8807-11ee-bd27-a396646abc8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aac95aa4a94c1fbe4aa72b39c109280f74e37bd5
--- /dev/null
+++ b/graph/incidents_graphml/5/5d110850-8807-11ee-bd27-a396646abc8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.129
+ 100.64.6.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700527570
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d110850-8807-11ee-bd27-a396646abc8f
+
+
+
diff --git a/graph/incidents_graphml/5/5d11f9f0-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d11f9f0-a1f6-11ee-aa63-351afb0017e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20a0fd0560c024a03b5c06f2a88ef4fdc3464fb7
--- /dev/null
+++ b/graph/incidents_graphml/5/5d11f9f0-a1f6-11ee-aa63-351afb0017e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703378999
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d11f9f0-a1f6-11ee-aa63-351afb0017e4
+
+
+
diff --git a/graph/incidents_graphml/5/5d135310-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d135310-4d3f-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55fbb2f1e22a134133950a2cb1ccbee82b11e08b
--- /dev/null
+++ b/graph/incidents_graphml/5/5d135310-4d3f-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.99
+ 100.64.38.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694064503
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d135310-4d3f-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/5/5d221f50-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5d221f50-8807-11ee-bd27-a396646abc8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c101861875d6bd0a0c1b639f35f7741a35553d43
--- /dev/null
+++ b/graph/incidents_graphml/5/5d221f50-8807-11ee-bd27-a396646abc8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.129
+ 100.64.6.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700527570
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d221f50-8807-11ee-bd27-a396646abc8f
+
+
+
diff --git a/graph/incidents_graphml/5/5d23b290-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d23b290-1687-11ed-af15-7bfc3a566021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc471e9038918aed245a3d46ff6ef0affeb9b5bd
--- /dev/null
+++ b/graph/incidents_graphml/5/5d23b290-1687-11ed-af15-7bfc3a566021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.64
+ USER-0015-1802.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659900615
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d23b290-1687-11ed-af15-7bfc3a566021
+
+
+
diff --git a/graph/incidents_graphml/5/5d2a50d0-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/5d2a50d0-d523-11ee-93b3-7df625b90bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a74ebf815d980726be3473c6c7dbec1cb048094
--- /dev/null
+++ b/graph/incidents_graphml/5/5d2a50d0-d523-11ee-93b3-7df625b90bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.37
+ 100.64.44.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709005835
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d2a50d0-d523-11ee-93b3-7df625b90bc2
+
+
+
diff --git a/graph/incidents_graphml/5/5d2aaba0-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d2aaba0-4d3f-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45677295635ceaada14ff93d5b9c86c68447a80c
--- /dev/null
+++ b/graph/incidents_graphml/5/5d2aaba0-4d3f-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.99
+ 100.64.38.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694064503
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d2aaba0-4d3f-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/5/5d2e8800-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d2e8800-1687-11ed-af15-7bfc3a566021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1345aca1b929599407dabf8c7c03eb36603e1f0b
--- /dev/null
+++ b/graph/incidents_graphml/5/5d2e8800-1687-11ed-af15-7bfc3a566021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.64
+ USER-0015-1802.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659900615
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d2e8800-1687-11ed-af15-7bfc3a566021
+
+
+
diff --git a/graph/incidents_graphml/5/5d325330-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d325330-a1f6-11ee-aa63-351afb0017e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9326e1028767e2abfa14823e8a52bdcc043108c2
--- /dev/null
+++ b/graph/incidents_graphml/5/5d325330-a1f6-11ee-aa63-351afb0017e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.82
+ 100.64.13.82
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703378999
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d325330-a1f6-11ee-aa63-351afb0017e4
+
+
+
diff --git a/graph/incidents_graphml/5/5d3366a0-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5d3366a0-3403-11ee-94d6-7df16e3753d9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5105696e1dc11f6ead62b3ce924aefd88fea241
--- /dev/null
+++ b/graph/incidents_graphml/5/5d3366a0-3403-11ee-94d6-7df16e3753d9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.202
+ 100.64.44.202
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691289954
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d3366a0-3403-11ee-94d6-7df16e3753d9
+
+
+
diff --git a/graph/incidents_graphml/5/5d33adb0-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/5/5d33adb0-fced-11ed-ae6a-5f6768ebee7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8316b606596b518f9441e7883efde08c559c5aa6
--- /dev/null
+++ b/graph/incidents_graphml/5/5d33adb0-fced-11ed-ae6a-5f6768ebee7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.57
+ 100.64.34.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685233192
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d33adb0-fced-11ed-ae6a-5f6768ebee7b
+
+
+
diff --git a/graph/incidents_graphml/5/5d355af0-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5d355af0-2206-11ee-bfff-c38ddf5b615c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79a7f32b978a84afb4463da1211779d05a2e16bb
--- /dev/null
+++ b/graph/incidents_graphml/5/5d355af0-2206-11ee-bfff-c38ddf5b615c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.93
+ 100.64.56.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689312122
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d355af0-2206-11ee-bfff-c38ddf5b615c
+
+
+
diff --git a/graph/incidents_graphml/5/5d36c560-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d36c560-1687-11ed-af15-7bfc3a566021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..534ade2713512434a31b5eb0dce30d653c506e43
--- /dev/null
+++ b/graph/incidents_graphml/5/5d36c560-1687-11ed-af15-7bfc3a566021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.134
+ 100.64.71.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659900615
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d36c560-1687-11ed-af15-7bfc3a566021
+
+
+
diff --git a/graph/incidents_graphml/5/5d37a550-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/5/5d37a550-0228-11ef-b1dd-bbcb3e283d29.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34bb6d7cc75632b53504520a457a4bf3058dd39a
--- /dev/null
+++ b/graph/incidents_graphml/5/5d37a550-0228-11ef-b1dd-bbcb3e283d29.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.96
+ 100.64.21.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713955785
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d37a550-0228-11ef-b1dd-bbcb3e283d29
+
+
+
diff --git a/graph/incidents_graphml/5/5d3a5660-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/5d3a5660-d523-11ee-93b3-7df625b90bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51643a88f81830e8a9807828326466d81282f03e
--- /dev/null
+++ b/graph/incidents_graphml/5/5d3a5660-d523-11ee-93b3-7df625b90bc2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.37
+ 100.64.44.37
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709005836
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d3a5660-d523-11ee-93b3-7df625b90bc2
+
+
+
diff --git a/graph/incidents_graphml/5/5d3c43a0-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d3c43a0-1687-11ed-af15-7bfc3a566021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..126ebbe59cbb4dcadb0c818f676426407b0b1c04
--- /dev/null
+++ b/graph/incidents_graphml/5/5d3c43a0-1687-11ed-af15-7bfc3a566021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.134
+ 100.64.71.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659900615
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d3c43a0-1687-11ed-af15-7bfc3a566021
+
+
+
diff --git a/graph/incidents_graphml/5/5d3d9760-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d3d9760-4d3f-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91a2a6f0e52454e8f5d79e7aeeb4acf755acd10d
--- /dev/null
+++ b/graph/incidents_graphml/5/5d3d9760-4d3f-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.31
+ USER-0015-1342.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694064503
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d3d9760-4d3f-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/5/5d43aac0-d773-11ed-b131-97a6b3859c17.graphml b/graph/incidents_graphml/5/5d43aac0-d773-11ed-b131-97a6b3859c17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5cfa89a1d4a5bc8f4286b9246aeb4fed3a9d7604
--- /dev/null
+++ b/graph/incidents_graphml/5/5d43aac0-d773-11ed-b131-97a6b3859c17.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.188
+ 100.64.3.188
+ []
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host"]
+ 0.981015625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.221
+ 100.64.16.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.981015625
+ 0.981015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d43aac0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.981015625
+ 0.981015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d43aac0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.981015625
+ 0.981015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d43aac0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.981015625
+ 0.981015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d43aac0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.981015625
+ 0.981015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d43aac0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.981015625
+ 0.981015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d43aac0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.981015625
+ 0.981015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d43aac0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.981015625
+ 0.981015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d43aac0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.981015625
+ 0.981015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d43aac0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.981015625
+ 0.981015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d43aac0-d773-11ed-b131-97a6b3859c17
+
+
+
diff --git a/graph/incidents_graphml/5/5d484c30-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d484c30-a1f6-11ee-aa63-351afb0017e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb762106ef9ed24aa097229b18d6e91b4458adc4
--- /dev/null
+++ b/graph/incidents_graphml/5/5d484c30-a1f6-11ee-aa63-351afb0017e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.84
+ 100.64.13.84
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703378999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5d484c30-a1f6-11ee-aa63-351afb0017e4
+
+
+
diff --git a/graph/incidents_graphml/5/5d48c6c0-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d48c6c0-1687-11ed-af15-7bfc3a566021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb58af5ed61ac022ae1311a95c94efe20bf83b50
--- /dev/null
+++ b/graph/incidents_graphml/5/5d48c6c0-1687-11ed-af15-7bfc3a566021.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.160
+ 100.64.76.160
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.220
+ 100.64.72.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.66
+ 100.64.79.66
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659900615
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d48c6c0-1687-11ed-af15-7bfc3a566021
+
+
+ INCIDENT_LINK
+ 1659900615
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d48c6c0-1687-11ed-af15-7bfc3a566021
+
+
+ INCIDENT_LINK
+ 1659900615
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d48c6c0-1687-11ed-af15-7bfc3a566021
+
+
+ INCIDENT_LINK
+ 1659900615
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d48c6c0-1687-11ed-af15-7bfc3a566021
+
+
+
diff --git a/graph/incidents_graphml/5/5d4d00b0-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d4d00b0-4d3f-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ac8f2db7e2267ac03bffc29be3c70fabd350a87
--- /dev/null
+++ b/graph/incidents_graphml/5/5d4d00b0-4d3f-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.31
+ USER-0015-1342.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694064503
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d4d00b0-4d3f-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/5/5d4dcc70-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5d4dcc70-3403-11ee-94d6-7df16e3753d9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a2990e5a3857132c4aec01be3eb964f74a3b6f6
--- /dev/null
+++ b/graph/incidents_graphml/5/5d4dcc70-3403-11ee-94d6-7df16e3753d9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.202
+ 100.64.44.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691289955
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5d4dcc70-3403-11ee-94d6-7df16e3753d9
+
+
+
diff --git a/graph/incidents_graphml/5/5d4e1380-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/5/5d4e1380-0228-11ef-b1dd-bbcb3e283d29.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34580cef5b685d82e74a5b74fd7392d9d0c5f04f
--- /dev/null
+++ b/graph/incidents_graphml/5/5d4e1380-0228-11ef-b1dd-bbcb3e283d29.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.96
+ 100.64.21.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713955786
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d4e1380-0228-11ef-b1dd-bbcb3e283d29
+
+
+
diff --git a/graph/incidents_graphml/5/5d4fbac0-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5d4fbac0-e327-11ee-8328-d19a3893d959.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5df2eae5553f45027925f2575a2b6591c00e215
--- /dev/null
+++ b/graph/incidents_graphml/5/5d4fbac0-e327-11ee-8328-d19a3893d959.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.171
+ 100.64.26.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710546870
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d4fbac0-e327-11ee-8328-d19a3893d959
+
+
+
diff --git a/graph/incidents_graphml/5/5d51bd00-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/5/5d51bd00-fced-11ed-ae6a-5f6768ebee7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6386ae10e95fcc369e474b074f52dbd9a72f2060
--- /dev/null
+++ b/graph/incidents_graphml/5/5d51bd00-fced-11ed-ae6a-5f6768ebee7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.34.57
+ 100.64.34.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685233192
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d51bd00-fced-11ed-ae6a-5f6768ebee7b
+
+
+
diff --git a/graph/incidents_graphml/5/5d5277d0-d773-11ed-b131-97a6b3859c17.graphml b/graph/incidents_graphml/5/5d5277d0-d773-11ed-b131-97a6b3859c17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16b372c0eb80374baa842cc2e91b6b5d71b1b651
--- /dev/null
+++ b/graph/incidents_graphml/5/5d5277d0-d773-11ed-b131-97a6b3859c17.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.224
+ 100.64.16.224
+ []
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.225
+ 100.64.16.225
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.226
+ 100.64.16.226
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5d5277d0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5d5277d0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5d5277d0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5d5277d0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5d5277d0-d773-11ed-b131-97a6b3859c17
+
+
+ INCIDENT_LINK
+ 1681112600
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5d5277d0-d773-11ed-b131-97a6b3859c17
+
+
+
diff --git a/graph/incidents_graphml/5/5d5396d0-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d5396d0-a1f6-11ee-aa63-351afb0017e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42ed965a295147d92f57b0d77a08b9b13d4dcbf6
--- /dev/null
+++ b/graph/incidents_graphml/5/5d5396d0-a1f6-11ee-aa63-351afb0017e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.70
+ 100.64.8.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703378999
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d5396d0-a1f6-11ee-aa63-351afb0017e4
+
+
+
diff --git a/graph/incidents_graphml/5/5d55b430-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5d55b430-2206-11ee-bfff-c38ddf5b615c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0acabc325d811e6caa507605f2c2042ace5a1ae
--- /dev/null
+++ b/graph/incidents_graphml/5/5d55b430-2206-11ee-bfff-c38ddf5b615c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.56.93
+ 100.64.56.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689312122
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5d55b430-2206-11ee-bfff-c38ddf5b615c
+
+
+
diff --git a/graph/incidents_graphml/5/5d5c75d0-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d5c75d0-1687-11ed-af15-7bfc3a566021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac7a9adad450f3bc0dc4afe654c8ce37bc80caba
--- /dev/null
+++ b/graph/incidents_graphml/5/5d5c75d0-1687-11ed-af15-7bfc3a566021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.67
+ 100.64.79.67
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659900616
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d5c75d0-1687-11ed-af15-7bfc3a566021
+
+
+
diff --git a/graph/incidents_graphml/5/5d5db190-10e5-11ed-98bd-158c7bf8b3a5.graphml b/graph/incidents_graphml/5/5d5db190-10e5-11ed-98bd-158c7bf8b3a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1364bd6dd9b7c129ea34991e4e1140efea9d20eb
--- /dev/null
+++ b/graph/incidents_graphml/5/5d5db190-10e5-11ed-98bd-158c7bf8b3a5.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.220
+ 100.64.74.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.221
+ 100.64.74.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.222
+ 100.64.74.222
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.250
+ 100.64.71.250
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.24.245
+ 100.64.24.245
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d5db190-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d5db190-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d5db190-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d5db190-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d5db190-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d5db190-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d5db190-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d5db190-10e5-11ed-98bd-158c7bf8b3a5
+
+
+
diff --git a/graph/incidents_graphml/5/5d5e17b0-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d5e17b0-4d3f-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..437384ad65118a2f3d961a43caa87aa9cf01f615
--- /dev/null
+++ b/graph/incidents_graphml/5/5d5e17b0-4d3f-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.135
+ 100.64.16.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694064504
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d5e17b0-4d3f-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/5/5d5f2a80-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/5/5d5f2a80-0228-11ef-b1dd-bbcb3e283d29.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27b3fd184faf87096e571b37b06cf7fb78a27087
--- /dev/null
+++ b/graph/incidents_graphml/5/5d5f2a80-0228-11ef-b1dd-bbcb3e283d29.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.178
+ 100.64.24.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713955786
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d5f2a80-0228-11ef-b1dd-bbcb3e283d29
+
+
+
diff --git a/graph/incidents_graphml/5/5d6146f0-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5d6146f0-e327-11ee-8328-d19a3893d959.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15ece067557cda606c10d99aa8941a6b94503f45
--- /dev/null
+++ b/graph/incidents_graphml/5/5d6146f0-e327-11ee-8328-d19a3893d959.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.171
+ 100.64.26.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710546870
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d6146f0-e327-11ee-8328-d19a3893d959
+
+
+
diff --git a/graph/incidents_graphml/5/5d614cc0-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5d614cc0-5c79-11ee-a457-0b0c771a8e8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9ac7abc7d02c5338955bd849f3f5c420d1e7efc
--- /dev/null
+++ b/graph/incidents_graphml/5/5d614cc0-5c79-11ee-a457-0b0c771a8e8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.36
+ 100.64.16.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695738682
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d614cc0-5c79-11ee-a457-0b0c771a8e8f
+
+
+
diff --git a/graph/incidents_graphml/5/5d617ee0-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d617ee0-1687-11ed-af15-7bfc3a566021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..870c9cfe2009b96501c180ac758277ec96029552
--- /dev/null
+++ b/graph/incidents_graphml/5/5d617ee0-1687-11ed-af15-7bfc3a566021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.67
+ 100.64.79.67
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659900616
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d617ee0-1687-11ed-af15-7bfc3a566021
+
+
+
diff --git a/graph/incidents_graphml/5/5d61a090-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d61a090-a1f6-11ee-aa63-351afb0017e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a00cd71cb36f915002cb3ef191d8dc7c335f67b6
--- /dev/null
+++ b/graph/incidents_graphml/5/5d61a090-a1f6-11ee-aa63-351afb0017e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.70
+ 100.64.8.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703378999
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d61a090-a1f6-11ee-aa63-351afb0017e4
+
+
+
diff --git a/graph/incidents_graphml/5/5d63a500-10e5-11ed-98bd-158c7bf8b3a5.graphml b/graph/incidents_graphml/5/5d63a500-10e5-11ed-98bd-158c7bf8b3a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9fbc7af234529a5da2fe496df8f5e6904e94a660
--- /dev/null
+++ b/graph/incidents_graphml/5/5d63a500-10e5-11ed-98bd-158c7bf8b3a5.graphml
@@ -0,0 +1,529 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.175
+ 100.64.71.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.223
+ 100.64.74.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.224
+ 100.64.74.224
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.225
+ 100.64.74.225
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.226
+ 100.64.74.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.227
+ 100.64.74.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.228
+ 100.64.74.228
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.105
+ 100.64.11.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.229
+ 100.64.74.229
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.43
+ 100.64.1.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.230
+ 100.64.74.230
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.231
+ 100.64.74.231
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281281
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d63a500-10e5-11ed-98bd-158c7bf8b3a5
+
+
+
diff --git a/graph/incidents_graphml/5/5d646510-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d646510-1687-11ed-af15-7bfc3a566021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a760285db9b92941550de9fb872cd4f1abff472
--- /dev/null
+++ b/graph/incidents_graphml/5/5d646510-1687-11ed-af15-7bfc3a566021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.35
+ 100.64.71.35
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659900616
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d646510-1687-11ed-af15-7bfc3a566021
+
+
+
diff --git a/graph/incidents_graphml/5/5d68f8f0-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d68f8f0-1687-11ed-af15-7bfc3a566021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae0f53ef9380835090eda7d449a13f41608fc4e0
--- /dev/null
+++ b/graph/incidents_graphml/5/5d68f8f0-1687-11ed-af15-7bfc3a566021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.35
+ 100.64.71.35
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659900616
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d68f8f0-1687-11ed-af15-7bfc3a566021
+
+
+
diff --git a/graph/incidents_graphml/5/5d6bdf20-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d6bdf20-1687-11ed-af15-7bfc3a566021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e770fc5e9d917cbf8390e6b09141ca75c7e361d
--- /dev/null
+++ b/graph/incidents_graphml/5/5d6bdf20-1687-11ed-af15-7bfc3a566021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.68
+ 100.64.79.68
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659900616
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d6bdf20-1687-11ed-af15-7bfc3a566021
+
+
+
diff --git a/graph/incidents_graphml/5/5d7019d0-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5d7019d0-5c79-11ee-a457-0b0c771a8e8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b74e26895526f17c6b4d2fb67cbc3828699b1b9
--- /dev/null
+++ b/graph/incidents_graphml/5/5d7019d0-5c79-11ee-a457-0b0c771a8e8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.36
+ 100.64.16.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695738682
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d7019d0-5c79-11ee-a457-0b0c771a8e8f
+
+
+
diff --git a/graph/incidents_graphml/5/5d70dc60-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d70dc60-4d3f-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7d39d21483a0200ca500d00556b48c1ee1ac9ed
--- /dev/null
+++ b/graph/incidents_graphml/5/5d70dc60-4d3f-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.135
+ 100.64.16.135
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694064504
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d70dc60-4d3f-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/5/5d7b9130-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d7b9130-a1f6-11ee-aa63-351afb0017e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d358aeda52443e77d1c890bddf93f4adf62effc5
--- /dev/null
+++ b/graph/incidents_graphml/5/5d7b9130-a1f6-11ee-aa63-351afb0017e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.23
+ 100.64.2.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703378999
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d7b9130-a1f6-11ee-aa63-351afb0017e4
+
+
+
diff --git a/graph/incidents_graphml/5/5d8b51a0-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/5/5d8b51a0-033b-11ef-835b-a3623a295d8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0cf84ffcc177ef6652987e57ce79fc01811c053
--- /dev/null
+++ b/graph/incidents_graphml/5/5d8b51a0-033b-11ef-835b-a3623a295d8b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.189
+ 100.64.14.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1714073897
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d8b51a0-033b-11ef-835b-a3623a295d8b
+
+
+
diff --git a/graph/incidents_graphml/5/5d9121b0-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/5/5d9121b0-01a8-11ee-a3af-a97ccd3b2ee2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b59e863ebcccf4aa60ebf6d3b976734bacc4df4
--- /dev/null
+++ b/graph/incidents_graphml/5/5d9121b0-01a8-11ee-a3af-a97ccd3b2ee2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.60
+ 100.64.59.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.157
+ HOST-13552
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1685753313
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d9121b0-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+ INCIDENT_LINK
+ 1685753313
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5d9121b0-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+
diff --git a/graph/incidents_graphml/5/5d9cf570-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d9cf570-4d3f-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2c4d28b6b7df119bc9fbb9e971ccc22678b6d76
--- /dev/null
+++ b/graph/incidents_graphml/5/5d9cf570-4d3f-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.85
+ 100.64.19.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694064504
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5d9cf570-4d3f-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/5/5d9de4c0-85f3-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/5/5d9de4c0-85f3-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2531206aa7be4d99bd1728cd991143a88438a18b
--- /dev/null
+++ b/graph/incidents_graphml/5/5d9de4c0-85f3-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.60
+ 100.64.43.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.45
+ 100.64.43.45
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.61
+ 100.64.43.61
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.62
+ 100.64.43.62
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.129
+ 100.64.37.129
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.63
+ 100.64.43.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700299079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/5/5dab42f0-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5dab42f0-683e-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d13b7cd495b3137ba676b1e429304537a24f797c
--- /dev/null
+++ b/graph/incidents_graphml/5/5dab42f0-683e-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.137
+ 100.64.31.137
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697032756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5dab42f0-683e-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/5/5dabfcb0-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/5/5dabfcb0-01a8-11ee-a3af-a97ccd3b2ee2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e917306f5a7c4e5860146ac65cbbee0f36d1723f
--- /dev/null
+++ b/graph/incidents_graphml/5/5dabfcb0-01a8-11ee-a3af-a97ccd3b2ee2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.240
+ 100.64.75.240
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685753313
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5dabfcb0-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+
diff --git a/graph/incidents_graphml/5/5db07910-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/5/5db07910-2611-11ee-a11d-5dcee9a57544.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bc2bdd7aa66aea8e33be22bcf2c561a2cbe0786
--- /dev/null
+++ b/graph/incidents_graphml/5/5db07910-2611-11ee-a11d-5dcee9a57544.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.121
+ USER-0015-1422.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689756652
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5db07910-2611-11ee-a11d-5dcee9a57544
+
+
+
diff --git a/graph/incidents_graphml/5/5db094a0-9a2e-11ed-8014-c5d8423138bb.graphml b/graph/incidents_graphml/5/5db094a0-9a2e-11ed-8014-c5d8423138bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72088cb67f94d87f08c54b77c8ed8766a1723eac
--- /dev/null
+++ b/graph/incidents_graphml/5/5db094a0-9a2e-11ed-8014-c5d8423138bb.graphml
@@ -0,0 +1,681 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.234.64.242
+ 10.234.64.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.132.138.113
+ 10.132.138.113
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.176.143.156
+ 10.176.143.156
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.20.9.75
+ 172.20.9.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 172.31.87.107
+ 172.31.87.107
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 172.31.149.232
+ 172.31.149.232
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.181.72.179
+ 10.181.72.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 172.17.151.175
+ 172.17.151.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 172.20.120.130
+ 172.20.120.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 172.21.160.184
+ 172.21.160.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 172.22.25.138
+ 172.22.25.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 10.62.139.7
+ 10.62.139.7
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.19.54.137
+ 172.19.54.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"]
+
+
+ HOST
+ 172.16.135.111
+ 172.16.135.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 10.88.59.124
+ 10.88.59.124
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.140.185
+ 172.22.140.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.0.149
+ 100.64.0.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.93671875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 172.16.175.139
+ 172.16.175.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+ INCIDENT_LINK
+ 1674375944
+ malicious
+ 0.93671875
+ 0.93671875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db094a0-9a2e-11ed-8014-c5d8423138bb
+
+
+
diff --git a/graph/incidents_graphml/5/5db11910-0938-11ee-a886-17db84346526.graphml b/graph/incidents_graphml/5/5db11910-0938-11ee-a886-17db84346526.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca4336088896d9e1fabe2a4626751df2e38866b9
--- /dev/null
+++ b/graph/incidents_graphml/5/5db11910-0938-11ee-a886-17db84346526.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.202
+ 100.64.8.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.45
+ USER-0015-1421.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.123
+ 100.64.8.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686584819
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db11910-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584819
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db11910-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584819
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db11910-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584819
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db11910-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584819
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db11910-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584819
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db11910-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584819
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db11910-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584819
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5db11910-0938-11ee-a886-17db84346526
+
+
+
diff --git a/graph/incidents_graphml/5/5dbaac40-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5dbaac40-683e-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7e86f888cc7a25964eb91d33a9ab5f1965749fc
--- /dev/null
+++ b/graph/incidents_graphml/5/5dbaac40-683e-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.137
+ 100.64.31.137
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697032756
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5dbaac40-683e-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/5/5dc32e30-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/5/5dc32e30-01a8-11ee-a3af-a97ccd3b2ee2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..749b418167779cb0eaa4dae5718ebdc6108e26b0
--- /dev/null
+++ b/graph/incidents_graphml/5/5dc32e30-01a8-11ee-a3af-a97ccd3b2ee2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.75.240
+ 100.64.75.240
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685753313
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5dc32e30-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+
diff --git a/graph/incidents_graphml/5/5dc62910-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5dc62910-5c79-11ee-a457-0b0c771a8e8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4138083ba6fbc4dfaef336b1d4a744f304dbd57c
--- /dev/null
+++ b/graph/incidents_graphml/5/5dc62910-5c79-11ee-a457-0b0c771a8e8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.38
+ 100.64.16.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695738682
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5dc62910-5c79-11ee-a457-0b0c771a8e8f
+
+
+
diff --git a/graph/incidents_graphml/5/5dc7f8b0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/5/5dc7f8b0-2611-11ee-a11d-5dcee9a57544.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a899cfd5bef9e0fa0359540e2a0c602dd5b4f2b
--- /dev/null
+++ b/graph/incidents_graphml/5/5dc7f8b0-2611-11ee-a11d-5dcee9a57544.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.123
+ 100.64.57.123
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689756652
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5dc7f8b0-2611-11ee-a11d-5dcee9a57544
+
+
+
diff --git a/graph/incidents_graphml/5/5dd0d2b0-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/5/5dd0d2b0-090f-11ee-8afe-6d26bac63fb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b71061a7aaa0de2f72b81e48445b4d359c13f174
--- /dev/null
+++ b/graph/incidents_graphml/5/5dd0d2b0-090f-11ee-8afe-6d26bac63fb3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.44
+ 100.64.78.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686567209
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5dd0d2b0-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567209
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5dd0d2b0-090f-11ee-8afe-6d26bac63fb3
+
+
+
diff --git a/graph/incidents_graphml/5/5dd432d0-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5dd432d0-5c79-11ee-a457-0b0c771a8e8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49f9339284c5eeba25e4af74ab61d42fb91539ab
--- /dev/null
+++ b/graph/incidents_graphml/5/5dd432d0-5c79-11ee-a457-0b0c771a8e8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.38
+ 100.64.16.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695738683
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5dd432d0-5c79-11ee-a457-0b0c771a8e8f
+
+
+
diff --git a/graph/incidents_graphml/5/5de02160-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5de02160-3403-11ee-94d6-7df16e3753d9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f67077101e08b5338da66c43818877781e63115
--- /dev/null
+++ b/graph/incidents_graphml/5/5de02160-3403-11ee-94d6-7df16e3753d9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.221
+ 100.64.24.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691289956
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5de02160-3403-11ee-94d6-7df16e3753d9
+
+
+
diff --git a/graph/incidents_graphml/5/5de13420-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/5de13420-b883-11ed-8865-15eeb644fed8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5d941370f4af2b8778ca23a3f62987c945636e6
--- /dev/null
+++ b/graph/incidents_graphml/5/5de13420-b883-11ed-8865-15eeb644fed8.graphml
@@ -0,0 +1,129 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.166
+ 100.64.91.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1984.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.190.96.179
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677710987
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5de13420-b883-11ed-8865-15eeb644fed8
+
+
+ INCIDENT_LINK
+ 1677710987
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5de13420-b883-11ed-8865-15eeb644fed8
+
+
+ INCIDENT_LINK
+ 1677710987
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5de13420-b883-11ed-8865-15eeb644fed8
+
+
+ INCIDENT_LINK
+ 1677710987
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5de13420-b883-11ed-8865-15eeb644fed8
+
+
+
diff --git a/graph/incidents_graphml/5/5de3be70-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/5/5de3be70-090f-11ee-8afe-6d26bac63fb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc0dbe7d93dea58adf2b3c4561674aba2d954746
--- /dev/null
+++ b/graph/incidents_graphml/5/5de3be70-090f-11ee-8afe-6d26bac63fb3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.47
+ 100.64.78.47
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.51
+ 100.64.72.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686567210
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5de3be70-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567210
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5de3be70-090f-11ee-8afe-6d26bac63fb3
+
+
+
diff --git a/graph/incidents_graphml/5/5de4b690-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/5de4b690-b883-11ed-8865-15eeb644fed8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21ee18151e9e5c9a4c9c8a1bb0819ecbfd0096ae
--- /dev/null
+++ b/graph/incidents_graphml/5/5de4b690-b883-11ed-8865-15eeb644fed8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.166
+ 100.64.91.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677710987
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5de4b690-b883-11ed-8865-15eeb644fed8
+
+
+
diff --git a/graph/incidents_graphml/5/5ded35f0-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/5/5ded35f0-73c2-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e216b1572d55c845e5550d762ee96f1008b75529
--- /dev/null
+++ b/graph/incidents_graphml/5/5ded35f0-73c2-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.131
+ 100.64.82.131
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.173
+ 100.64.1.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.82.132
+ 100.64.82.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.76
+ 100.64.74.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.81.94
+ 100.64.81.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1670151415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ded35f0-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ded35f0-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ded35f0-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ded35f0-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ded35f0-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ded35f0-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ded35f0-73c2-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670151415
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ded35f0-73c2-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/5/5df54aa0-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/5/5df54aa0-090f-11ee-8afe-6d26bac63fb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7203981649f90c4028c2ba14f122586f933dd3ba
--- /dev/null
+++ b/graph/incidents_graphml/5/5df54aa0-090f-11ee-8afe-6d26bac63fb3.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.60
+ 100.64.21.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.202
+ 100.64.72.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.48
+ 100.64.78.48
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686567210
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5df54aa0-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567210
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5df54aa0-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567210
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5df54aa0-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567210
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5df54aa0-090f-11ee-8afe-6d26bac63fb3
+
+
+
diff --git a/graph/incidents_graphml/5/5dfd1600-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5dfd1600-8807-11ee-bd27-a396646abc8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f243c020e17a4e2f842de5f882833b31414b60d
--- /dev/null
+++ b/graph/incidents_graphml/5/5dfd1600-8807-11ee-bd27-a396646abc8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.80
+ 100.64.15.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700527571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5dfd1600-8807-11ee-bd27-a396646abc8f
+
+
+
diff --git a/graph/incidents_graphml/5/5dffc380-00b8-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/5/5dffc380-00b8-11ef-8b56-b9c5ad676a8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6275ba77786556d728861e4fbacf08486695b79d
--- /dev/null
+++ b/graph/incidents_graphml/5/5dffc380-00b8-11ef-8b56-b9c5ad676a8a.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.224.126.31
+ 10.224.126.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW","Vulnerability Management","Windows Active Directory"]
+
+
+ HOST
+ 100.64.70.165
+ USER-0015-1593.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.166
+ 100.64.70.166
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.167
+ 100.64.70.167
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713797732
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5dffc380-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797732
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5dffc380-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797732
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5dffc380-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797732
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5dffc380-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797732
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5dffc380-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797732
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5dffc380-00b8-11ef-8b56-b9c5ad676a8a
+
+
+
diff --git a/graph/incidents_graphml/5/5e04c060-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5e04c060-3403-11ee-94d6-7df16e3753d9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..781675466a0c22c7513f1b986598ce3c8a92ba98
--- /dev/null
+++ b/graph/incidents_graphml/5/5e04c060-3403-11ee-94d6-7df16e3753d9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.221
+ 100.64.24.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691289956
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5e04c060-3403-11ee-94d6-7df16e3753d9
+
+
+
diff --git a/graph/incidents_graphml/5/5e04dc50-317b-11ef-927c-272449d34670.graphml b/graph/incidents_graphml/5/5e04dc50-317b-11ef-927c-272449d34670.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3c95fbf6c56f571bc3b63cffe9f3af7378ae2f9
--- /dev/null
+++ b/graph/incidents_graphml/5/5e04dc50-317b-11ef-927c-272449d34670.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.46.208
+ USER-0015-1982.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.198
+ USER-0015-2116.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719159140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5e04dc50-317b-11ef-927c-272449d34670
+
+
+
diff --git a/graph/incidents_graphml/5/5e0ccd70-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5e0ccd70-8807-11ee-bd27-a396646abc8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8283d5e60bb4689b673818b153aaa72c211ade2
--- /dev/null
+++ b/graph/incidents_graphml/5/5e0ccd70-8807-11ee-bd27-a396646abc8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.80
+ 100.64.15.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700527571
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e0ccd70-8807-11ee-bd27-a396646abc8f
+
+
+
diff --git a/graph/incidents_graphml/5/5e10bea0-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/5/5e10bea0-075e-11ee-a67b-a9ce333dbcaf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..496b8924ad523b87c487c7a5c6cc4975204ffe55
--- /dev/null
+++ b/graph/incidents_graphml/5/5e10bea0-075e-11ee-a67b-a9ce333dbcaf.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.129
+ 100.64.25.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.250
+ 100.64.70.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.195
+ 100.64.75.195
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.196
+ 100.64.75.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.197
+ 100.64.75.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.55
+ 100.64.1.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.21.68
+ 100.64.21.68
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.198
+ 100.64.75.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.199
+ 100.64.75.199
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.200
+ 100.64.75.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e10bea0-075e-11ee-a67b-a9ce333dbcaf
+
+
+
diff --git a/graph/incidents_graphml/5/5e15d760-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5e15d760-3403-11ee-94d6-7df16e3753d9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..181515d59b0c4d8a0f6b761c8afae513bdd7c251
--- /dev/null
+++ b/graph/incidents_graphml/5/5e15d760-3403-11ee-94d6-7df16e3753d9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.204
+ 100.64.44.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691289956
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5e15d760-3403-11ee-94d6-7df16e3753d9
+
+
+
diff --git a/graph/incidents_graphml/5/5e195250-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5e195250-2206-11ee-bfff-c38ddf5b615c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..629b4d19b0541561558e393b857cbf877fd95b1d
--- /dev/null
+++ b/graph/incidents_graphml/5/5e195250-2206-11ee-bfff-c38ddf5b615c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.7.24.192
+ 192.168.14.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.145
+ 100.64.76.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689312124
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e195250-2206-11ee-bfff-c38ddf5b615c
+
+
+ INCIDENT_LINK
+ 1689312124
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e195250-2206-11ee-bfff-c38ddf5b615c
+
+
+
diff --git a/graph/incidents_graphml/5/5e1db630-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/5/5e1db630-1f34-11ee-bd83-b52c9cbf0232.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0343ef568bfa8e762ae6208b420dbb009e4abc7a
--- /dev/null
+++ b/graph/incidents_graphml/5/5e1db630-1f34-11ee-bd83-b52c9cbf0232.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.42
+ 100.64.77.42
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689002027
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e1db630-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689002027
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e1db630-1f34-11ee-bd83-b52c9cbf0232
+
+
+
diff --git a/graph/incidents_graphml/5/5e1fe3b0-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/5/5e1fe3b0-dcdf-11ee-9697-039b254a6d03.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa9032566186a20bacba203fe41511ea45de6dc8
--- /dev/null
+++ b/graph/incidents_graphml/5/5e1fe3b0-dcdf-11ee-9697-039b254a6d03.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.25.11
+ 100.64.25.11
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709856241
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e1fe3b0-dcdf-11ee-9697-039b254a6d03
+
+
+
diff --git a/graph/incidents_graphml/5/5e256a60-41e5-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/5/5e256a60-41e5-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51f63cca671315266869f5570f1e313e7e18e7b5
--- /dev/null
+++ b/graph/incidents_graphml/5/5e256a60-41e5-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.213
+ 100.64.75.213
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.196
+ 100.64.75.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.75.214
+ 100.64.75.214
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.215
+ 100.64.75.215
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.62
+ 100.64.72.62
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.216
+ 100.64.75.216
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664668890
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e256a60-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668890
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e256a60-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668890
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e256a60-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668890
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e256a60-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668890
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e256a60-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668890
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e256a60-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668890
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e256a60-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668890
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e256a60-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668890
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e256a60-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668890
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e256a60-41e5-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/5/5e2e3580-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5e2e3580-552d-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..107d42aa000e6be9b5dbbf3ad5b93d0bec525a2e
--- /dev/null
+++ b/graph/incidents_graphml/5/5e2e3580-552d-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.66
+ 100.64.51.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694936383
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5e2e3580-552d-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/5/5e300230-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/5/5e300230-fe0c-11ec-809b-91d71d0233d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25d15e6ffe7b4d31f52012f77c8bb06b8923e735
--- /dev/null
+++ b/graph/incidents_graphml/5/5e300230-fe0c-11ec-809b-91d71d0233d6.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.17
+ 100.64.79.17
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.18
+ 100.64.79.18
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657208961
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e300230-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208961
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e300230-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208961
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e300230-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208961
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e300230-fe0c-11ec-809b-91d71d0233d6
+
+
+
diff --git a/graph/incidents_graphml/5/5e326010-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5e326010-3403-11ee-94d6-7df16e3753d9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d380226819564ea8c9685296ff97bb7c97a4a2a6
--- /dev/null
+++ b/graph/incidents_graphml/5/5e326010-3403-11ee-94d6-7df16e3753d9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.204
+ 100.64.44.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691289956
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5e326010-3403-11ee-94d6-7df16e3753d9
+
+
+
diff --git a/graph/incidents_graphml/5/5e3470c0-45bb-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/5/5e3470c0-45bb-11ee-853f-87a1872d184b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76ea942e26ab99b48c1a94b59b62fa1a20840abd
--- /dev/null
+++ b/graph/incidents_graphml/5/5e3470c0-45bb-11ee-853f-87a1872d184b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.110
+ 100.64.24.110
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693238153
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5e3470c0-45bb-11ee-853f-87a1872d184b
+
+
+
diff --git a/graph/incidents_graphml/5/5e34deb0-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5e34deb0-4dfa-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..661d5697347b8d81e891db2746a457979d9b9c58
--- /dev/null
+++ b/graph/incidents_graphml/5/5e34deb0-4dfa-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.151
+ 100.64.10.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694144821
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5e34deb0-4dfa-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/5/5e40ac10-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5e40ac10-552d-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78c10f864fd2cc0ecf0b9376403493c9b9efa0aa
--- /dev/null
+++ b/graph/incidents_graphml/5/5e40ac10-552d-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.66
+ 100.64.51.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694936383
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e40ac10-552d-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/5/5e44c470-45bb-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/5/5e44c470-45bb-11ee-853f-87a1872d184b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af8cb452aa4d86556988cb2724725fe7cb2ea353
--- /dev/null
+++ b/graph/incidents_graphml/5/5e44c470-45bb-11ee-853f-87a1872d184b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.110
+ 100.64.24.110
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693238153
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e44c470-45bb-11ee-853f-87a1872d184b
+
+
+
diff --git a/graph/incidents_graphml/5/5e4ac750-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5e4ac750-77e1-11ee-95df-1f31585c14cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9977c1a2d57a122a5345111b9feae50aca252164
--- /dev/null
+++ b/graph/incidents_graphml/5/5e4ac750-77e1-11ee-95df-1f31585c14cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.113
+ 100.64.40.113
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698752032
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e4ac750-77e1-11ee-95df-1f31585c14cb
+
+
+
diff --git a/graph/incidents_graphml/5/5e4c5e50-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5e4c5e50-4dfa-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba48413d80ec1660ec42206882e295ce7f298327
--- /dev/null
+++ b/graph/incidents_graphml/5/5e4c5e50-4dfa-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.151
+ 100.64.10.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694144821
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e4c5e50-4dfa-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/5/5e4e2510-fe5c-11ee-894d-f3eebee8c21c.graphml b/graph/incidents_graphml/5/5e4e2510-fe5c-11ee-894d-f3eebee8c21c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..390bcd7af9c7b7aadc29cf4e9511609f2e8344c2
--- /dev/null
+++ b/graph/incidents_graphml/5/5e4e2510-fe5c-11ee-894d-f3eebee8c21c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.146
+ 100.64.17.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1713538316
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e4e2510-fe5c-11ee-894d-f3eebee8c21c
+
+
+
diff --git a/graph/incidents_graphml/5/5e506f00-fe5c-11ee-894d-f3eebee8c21c.graphml b/graph/incidents_graphml/5/5e506f00-fe5c-11ee-894d-f3eebee8c21c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43967ef45a91c1d1e54989a7ce898c49a55b9eec
--- /dev/null
+++ b/graph/incidents_graphml/5/5e506f00-fe5c-11ee-894d-f3eebee8c21c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]
+
+
+ HOST
+ 100.64.17.146
+ 100.64.17.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713538316
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e506f00-fe5c-11ee-894d-f3eebee8c21c
+
+
+
diff --git a/graph/incidents_graphml/5/5e540610-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5e540610-683e-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..020dadf2e329f397d66166e29040def39516f077
--- /dev/null
+++ b/graph/incidents_graphml/5/5e540610-683e-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.139
+ 100.64.31.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697032757
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5e540610-683e-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/5/5e63f4a0-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5e63f4a0-77e1-11ee-95df-1f31585c14cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..815b175b1b4fd10891015815d272b14ad0b5eb29
--- /dev/null
+++ b/graph/incidents_graphml/5/5e63f4a0-77e1-11ee-95df-1f31585c14cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.12
+ 100.64.17.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698752033
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e63f4a0-77e1-11ee-95df-1f31585c14cb
+
+
+
diff --git a/graph/incidents_graphml/5/5e6432b0-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5e6432b0-683e-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf3fcba8493f29a7e0163107dde511e6687c3a8c
--- /dev/null
+++ b/graph/incidents_graphml/5/5e6432b0-683e-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.139
+ 100.64.31.139
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697032757
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e6432b0-683e-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/5/5e64c850-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5e64c850-4dfa-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ed055f088bc25cf314fe4889738c685c658c63c
--- /dev/null
+++ b/graph/incidents_graphml/5/5e64c850-4dfa-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.135
+ 100.64.16.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694144821
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5e64c850-4dfa-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/5/5e715210-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5e715210-683e-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c26dd3b30fa746c422797a28164d5f567c55678
--- /dev/null
+++ b/graph/incidents_graphml/5/5e715210-683e-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.77
+ 100.64.3.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697032757
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e715210-683e-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/5/5e747470-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/5e747470-2ade-11ed-961c-99a30b1a3145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c72511a8aa06d3351816b374d3cc15500ed6a4c
--- /dev/null
+++ b/graph/incidents_graphml/5/5e747470-2ade-11ed-961c-99a30b1a3145.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.149.125
+ 192.168.149.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.83.8
+ 100.64.83.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662137007
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e747470-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662137007
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5e747470-2ade-11ed-961c-99a30b1a3145
+
+
+
diff --git a/graph/incidents_graphml/5/5e78ec90-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5e78ec90-4dfa-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5999715839b653250c193a1c9b998455240d766
--- /dev/null
+++ b/graph/incidents_graphml/5/5e78ec90-4dfa-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.135
+ 100.64.16.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694144821
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5e78ec90-4dfa-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/5/5e7964e0-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5e7964e0-e13e-11ee-a61b-817c3085f6d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55760606f4e11fc3512502f04fc55477320e671a
--- /dev/null
+++ b/graph/incidents_graphml/5/5e7964e0-e13e-11ee-a61b-817c3085f6d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.212
+ 100.64.9.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710336848
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5e7964e0-e13e-11ee-a61b-817c3085f6d7
+
+
+
diff --git a/graph/incidents_graphml/5/5e8cc5d0-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5e8cc5d0-e13e-11ee-a61b-817c3085f6d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf125f6d676092509bd21712b9928107bf7411fa
--- /dev/null
+++ b/graph/incidents_graphml/5/5e8cc5d0-e13e-11ee-a61b-817c3085f6d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.212
+ 100.64.9.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710336848
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5e8cc5d0-e13e-11ee-a61b-817c3085f6d7
+
+
+
diff --git a/graph/incidents_graphml/5/5e8d9cb0-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5e8d9cb0-77e1-11ee-95df-1f31585c14cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be27b6777a94ab4d6c54a4524e1d05debd36afe3
--- /dev/null
+++ b/graph/incidents_graphml/5/5e8d9cb0-77e1-11ee-95df-1f31585c14cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.115
+ 100.64.40.115
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698752033
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5e8d9cb0-77e1-11ee-95df-1f31585c14cb
+
+
+
diff --git a/graph/incidents_graphml/5/5e98abe0-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5e98abe0-9d12-11ee-a559-a1780370c51a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b7274ea1171f6ca11b4901ee5d3b347db2c304d
--- /dev/null
+++ b/graph/incidents_graphml/5/5e98abe0-9d12-11ee-a559-a1780370c51a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.11
+ 100.64.2.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702841271
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5e98abe0-9d12-11ee-a559-a1780370c51a
+
+
+
diff --git a/graph/incidents_graphml/5/5e9ccb60-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5e9ccb60-e13e-11ee-a61b-817c3085f6d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a0c7cc7a105049a6aee4c4f7a72a4e8108e222a
--- /dev/null
+++ b/graph/incidents_graphml/5/5e9ccb60-e13e-11ee-a61b-817c3085f6d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.57
+ USER-0015-1203.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710336848
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5e9ccb60-e13e-11ee-a61b-817c3085f6d7
+
+
+
diff --git a/graph/incidents_graphml/5/5ea20990-fcd3-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/5/5ea20990-fcd3-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4fd4ad1f53ef0a50d0740a8b111ef3e5c7aa3e6
--- /dev/null
+++ b/graph/incidents_graphml/5/5ea20990-fcd3-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.13.129
+ 100.64.13.129
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685222027
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ea20990-fcd3-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/5/5ea3df20-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/5/5ea3df20-f286-11ec-babd-d5ed2eda1ac6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0b912eb7d39463d89bcd6bf8e8a4532286295d6
--- /dev/null
+++ b/graph/incidents_graphml/5/5ea3df20-f286-11ec-babd-d5ed2eda1ac6.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.101
+ 100.64.81.101
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.25
+ USER-0015-1893.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.112
+ 100.64.71.112
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.102
+ 100.64.81.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.21.111
+ 100.64.21.111
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655941946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ea3df20-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ea3df20-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ea3df20-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ea3df20-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ea3df20-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ea3df20-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ea3df20-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ea3df20-f286-11ec-babd-d5ed2eda1ac6
+
+
+
diff --git a/graph/incidents_graphml/5/5ea431f0-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5ea431f0-77e1-11ee-95df-1f31585c14cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d11c67009a2f0a5680daef4921c092564e341353
--- /dev/null
+++ b/graph/incidents_graphml/5/5ea431f0-77e1-11ee-95df-1f31585c14cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.115
+ 100.64.40.115
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698752033
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ea431f0-77e1-11ee-95df-1f31585c14cb
+
+
+
diff --git a/graph/incidents_graphml/5/5ea6c120-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/5/5ea6c120-4106-11ee-b538-995248355bc9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3608f2ddcae46adcbeeb35926d6a3ef869e5074
--- /dev/null
+++ b/graph/incidents_graphml/5/5ea6c120-4106-11ee-b538-995248355bc9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.7.75
+ 100.64.7.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692720610
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ea6c120-4106-11ee-b538-995248355bc9
+
+
+
diff --git a/graph/incidents_graphml/5/5eaf1ae0-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5eaf1ae0-e13e-11ee-a61b-817c3085f6d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2224207a44da3ad953f541e050320cfcf10422db
--- /dev/null
+++ b/graph/incidents_graphml/5/5eaf1ae0-e13e-11ee-a61b-817c3085f6d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.57
+ USER-0015-1203.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710336848
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5eaf1ae0-e13e-11ee-a61b-817c3085f6d7
+
+
+
diff --git a/graph/incidents_graphml/5/5eb599d0-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5eb599d0-3403-11ee-94d6-7df16e3753d9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4e371812e8baefb66fcfa495fe9cde1a2aa382d
--- /dev/null
+++ b/graph/incidents_graphml/5/5eb599d0-3403-11ee-94d6-7df16e3753d9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.216
+ 100.64.13.216
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691289957
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5eb599d0-3403-11ee-94d6-7df16e3753d9
+
+
+
diff --git a/graph/incidents_graphml/5/5eb5ce80-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5eb5ce80-4dfa-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ee65a1677e11b16a2aef9d2b1236d9de8253dcf
--- /dev/null
+++ b/graph/incidents_graphml/5/5eb5ce80-4dfa-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.137
+ 100.64.16.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694144822
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5eb5ce80-4dfa-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/5/5eba38d0-27e5-11ed-95a8-93fe9a2e5fea.graphml b/graph/incidents_graphml/5/5eba38d0-27e5-11ed-95a8-93fe9a2e5fea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9527da80830430247a1c911e8262c788e74e1dd3
--- /dev/null
+++ b/graph/incidents_graphml/5/5eba38d0-27e5-11ed-95a8-93fe9a2e5fea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.164
+ 100.64.84.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661810160
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5eba38d0-27e5-11ed-95a8-93fe9a2e5fea
+
+
+
diff --git a/graph/incidents_graphml/5/5ebbfca0-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/5/5ebbfca0-dcdf-11ee-9697-039b254a6d03.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c56b93d43983d0a984085771ca004cef649858be
--- /dev/null
+++ b/graph/incidents_graphml/5/5ebbfca0-dcdf-11ee-9697-039b254a6d03.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.27
+ 100.64.51.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1709856242
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ebbfca0-dcdf-11ee-9697-039b254a6d03
+
+
+
diff --git a/graph/incidents_graphml/5/5ebc27f0-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/5ebc27f0-402d-11ef-b594-eb5862a3661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5938434091b5f1d0acbba4569ad5d0ecb3696f8
--- /dev/null
+++ b/graph/incidents_graphml/5/5ebc27f0-402d-11ef-b594-eb5862a3661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.111
+ 100.64.85.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720774907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ebc27f0-402d-11ef-b594-eb5862a3661d
+
+
+
diff --git a/graph/incidents_graphml/5/5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13b37cb70ffc1d3e13a7ae6815f5c3a4a0bee4cd
--- /dev/null
+++ b/graph/incidents_graphml/5/5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,273 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.68
+ 100.64.51.68
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.69
+ 100.64.51.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.70
+ 100.64.51.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.110
+ 100.64.34.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.71
+ 100.64.51.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.72
+ 100.64.51.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/5/5ebd1120-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5ebd1120-77e1-11ee-95df-1f31585c14cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92ce73dcda792cbe1f628b6969498f2163db2d4e
--- /dev/null
+++ b/graph/incidents_graphml/5/5ebd1120-77e1-11ee-95df-1f31585c14cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.117
+ 100.64.40.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698752033
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ebd1120-77e1-11ee-95df-1f31585c14cb
+
+
+
diff --git a/graph/incidents_graphml/5/5ec1d930-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/5/5ec1d930-6e77-11ee-9076-51a308ac33b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6333803d6be6c1c993782444082ce533ceb5c279
--- /dev/null
+++ b/graph/incidents_graphml/5/5ec1d930-6e77-11ee-9076-51a308ac33b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.150
+ 100.64.15.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697716946
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ec1d930-6e77-11ee-9076-51a308ac33b9
+
+
+
diff --git a/graph/incidents_graphml/5/5ec2f740-8a91-11ed-a926-5baf9df8c45e.graphml b/graph/incidents_graphml/5/5ec2f740-8a91-11ed-a926-5baf9df8c45e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2947b1a0b1ee535285ff36d550bc8b582d188810
--- /dev/null
+++ b/graph/incidents_graphml/5/5ec2f740-8a91-11ed-a926-5baf9df8c45e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.56
+ 100.64.80.56
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1672659248
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ec2f740-8a91-11ed-a926-5baf9df8c45e
+
+
+
diff --git a/graph/incidents_graphml/5/5ec7cfe0-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5ec7cfe0-4dfa-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b231c48ff2e38a41806766d69d15959d94e2b82
--- /dev/null
+++ b/graph/incidents_graphml/5/5ec7cfe0-4dfa-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.137
+ 100.64.16.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694144822
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ec7cfe0-4dfa-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/5/5eca7580-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5eca7580-552d-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b9b1b9b0b48abe8027b440f84c127672536d72a
--- /dev/null
+++ b/graph/incidents_graphml/5/5eca7580-552d-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.68
+ 100.64.51.68
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694936384
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5eca7580-552d-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/5/5ed184b0-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/5ed184b0-402d-11ef-b594-eb5862a3661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a242b883fe81cb29cc8df2817290634bc55ca4ad
--- /dev/null
+++ b/graph/incidents_graphml/5/5ed184b0-402d-11ef-b594-eb5862a3661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.111
+ 100.64.85.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720774908
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ed184b0-402d-11ef-b594-eb5862a3661d
+
+
+
diff --git a/graph/incidents_graphml/5/5ed37490-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5ed37490-e327-11ee-8328-d19a3893d959.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9aed5dc6a0bdc40079677c70b9825408271f21c1
--- /dev/null
+++ b/graph/incidents_graphml/5/5ed37490-e327-11ee-8328-d19a3893d959.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.102
+ 100.64.20.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710546872
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ed37490-e327-11ee-8328-d19a3893d959
+
+
+
diff --git a/graph/incidents_graphml/5/5ed63b60-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/5/5ed63b60-dcdf-11ee-9697-039b254a6d03.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f46507bbba3c50499c508c8998acd6165174ca6e
--- /dev/null
+++ b/graph/incidents_graphml/5/5ed63b60-dcdf-11ee-9697-039b254a6d03.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.51.27
+ 100.64.51.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709856242
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ed63b60-dcdf-11ee-9697-039b254a6d03
+
+
+
diff --git a/graph/incidents_graphml/5/5ed699b0-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/5/5ed699b0-6e77-11ee-9076-51a308ac33b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..114fb0996b28644115030ce18eb1d93d2ae882d1
--- /dev/null
+++ b/graph/incidents_graphml/5/5ed699b0-6e77-11ee-9076-51a308ac33b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.150
+ 100.64.15.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697716946
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ed699b0-6e77-11ee-9076-51a308ac33b9
+
+
+
diff --git a/graph/incidents_graphml/5/5ed74aa0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5ed74aa0-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d478acf656e9ec3b8c425cbbf93aca18a2d05d48
--- /dev/null
+++ b/graph/incidents_graphml/5/5ed74aa0-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.37
+ 100.64.47.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475237
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ed74aa0-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/5/5ed84aa0-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5ed84aa0-4dfa-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d2963d73802c9aafdf4547cdbf2cd6b28cfb4866
--- /dev/null
+++ b/graph/incidents_graphml/5/5ed84aa0-4dfa-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.139
+ 100.64.16.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694144822
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ed84aa0-4dfa-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/5/5ee177e0-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/5/5ee177e0-fe0c-11ec-809b-91d71d0233d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3be178be43ce3b97bbbdc1e90b04c0997e1fa203
--- /dev/null
+++ b/graph/incidents_graphml/5/5ee177e0-fe0c-11ec-809b-91d71d0233d6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.221
+ 100.64.74.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.19
+ 100.64.79.19
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657208962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ee177e0-fe0c-11ec-809b-91d71d0233d6
+
+
+ INCIDENT_LINK
+ 1657208962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ee177e0-fe0c-11ec-809b-91d71d0233d6
+
+
+
diff --git a/graph/incidents_graphml/5/5ee247b0-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/5/5ee247b0-f286-11ec-babd-d5ed2eda1ac6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..addd73c87565d060aa2f163d465040ee9635aebf
--- /dev/null
+++ b/graph/incidents_graphml/5/5ee247b0-f286-11ec-babd-d5ed2eda1ac6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.103
+ 100.64.81.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.196
+ 100.64.72.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655941947
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ee247b0-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941947
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ee247b0-f286-11ec-babd-d5ed2eda1ac6
+
+
+
diff --git a/graph/incidents_graphml/5/5ee4aa90-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/5/5ee4aa90-08e2-11ef-ae93-51753793321f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1be438ba45e3ac2d71c558e7e32b174375a81bb
--- /dev/null
+++ b/graph/incidents_graphml/5/5ee4aa90-08e2-11ef-ae93-51753793321f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.20.255
+ 100.64.20.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714695382
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5ee4aa90-08e2-11ef-ae93-51753793321f
+
+
+
diff --git a/graph/incidents_graphml/5/5ee5c410-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5ee5c410-e327-11ee-8328-d19a3893d959.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af74a2469ab838e875aa853dd07346f94ebb99a1
--- /dev/null
+++ b/graph/incidents_graphml/5/5ee5c410-e327-11ee-8328-d19a3893d959.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.102
+ 100.64.20.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710546873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ee5c410-e327-11ee-8328-d19a3893d959
+
+
+
diff --git a/graph/incidents_graphml/5/5eeacf80-317b-11ef-927c-272449d34670.graphml b/graph/incidents_graphml/5/5eeacf80-317b-11ef-927c-272449d34670.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1fa154678082c68056ec48d62ec122ef8aa01a2f
--- /dev/null
+++ b/graph/incidents_graphml/5/5eeacf80-317b-11ef-927c-272449d34670.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ USER-0015-1979.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.34
+ USER-0015-2117.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719159141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5eeacf80-317b-11ef-927c-272449d34670
+
+
+
diff --git a/graph/incidents_graphml/5/5ef50c50-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5ef50c50-2206-11ee-bfff-c38ddf5b615c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e6965945b9151e74096f0b1b5fa7f6b72a04ad7
--- /dev/null
+++ b/graph/incidents_graphml/5/5ef50c50-2206-11ee-bfff-c38ddf5b615c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.146
+ 100.64.76.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689312125
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ef50c50-2206-11ee-bfff-c38ddf5b615c
+
+
+
diff --git a/graph/incidents_graphml/5/5ef9ac30-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5ef9ac30-0b89-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1774822e1f5fefa042d5439e1f1ac09aecb129f
--- /dev/null
+++ b/graph/incidents_graphml/5/5ef9ac30-0b89-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.249
+ 100.64.18.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.37
+ 100.64.76.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686839512
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ef9ac30-0b89-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/5/5efa2a80-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5efa2a80-4dfa-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c68aaaa9b96d6156d6291fb05efacf121dcde829
--- /dev/null
+++ b/graph/incidents_graphml/5/5efa2a80-4dfa-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.113
+ 100.64.7.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694144822
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5efa2a80-4dfa-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/5/5efb0de0-10e5-11ed-98bd-158c7bf8b3a5.graphml b/graph/incidents_graphml/5/5efb0de0-10e5-11ed-98bd-158c7bf8b3a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a14e61a37e816d9733fcc5baa2974405223d152
--- /dev/null
+++ b/graph/incidents_graphml/5/5efb0de0-10e5-11ed-98bd-158c7bf8b3a5.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.151
+ 100.64.71.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.25
+ 100.64.75.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659281284
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5efb0de0-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281284
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5efb0de0-10e5-11ed-98bd-158c7bf8b3a5
+
+
+
diff --git a/graph/incidents_graphml/5/5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3831fdc1e8a393c03453e62cca732aad166e71c
--- /dev/null
+++ b/graph/incidents_graphml/5/5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.32
+ 100.64.77.32
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.158
+ 100.64.1.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.77.33
+ 100.64.77.33
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.29
+ 100.64.73.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1665761960
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761960
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761960
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761960
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761960
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761960
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+
diff --git a/graph/incidents_graphml/5/5f0de350-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/5/5f0de350-075e-11ee-a67b-a9ce333dbcaf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab4ae2b6ad3ebd67ec77853d815b876383a3cf53
--- /dev/null
+++ b/graph/incidents_graphml/5/5f0de350-075e-11ee-a67b-a9ce333dbcaf.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.123
+ 100.64.71.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.49.202
+ 100.64.49.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.49.61
+ 100.64.49.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.201
+ 100.64.75.201
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.137
+ 100.64.72.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686381239
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5f0de350-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381239
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5f0de350-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381239
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5f0de350-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381239
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5f0de350-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381239
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5f0de350-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381239
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5f0de350-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381239
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5f0de350-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381239
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5f0de350-075e-11ee-a67b-a9ce333dbcaf
+
+
+
diff --git a/graph/incidents_graphml/5/5f1152e0-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5f1152e0-0b89-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43dbb6c1711be9320354fe8c2ab9bf14a67bf85b
--- /dev/null
+++ b/graph/incidents_graphml/5/5f1152e0-0b89-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.37
+ 100.64.76.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.18.249
+ 100.64.18.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686839512
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5f1152e0-0b89-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/5/5f17b800-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/5/5f17b800-33f8-11ee-8ffe-d166de7672c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5c440e062354fb8eb324b9f90082c08935dc104
--- /dev/null
+++ b/graph/incidents_graphml/5/5f17b800-33f8-11ee-8ffe-d166de7672c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.138
+ 100.64.19.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691285233
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5f17b800-33f8-11ee-8ffe-d166de7672c0
+
+
+
diff --git a/graph/incidents_graphml/5/5f1d6d10-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5f1d6d10-e13e-11ee-a61b-817c3085f6d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4493ba66e53cce068029deaa3408681ceb231e4
--- /dev/null
+++ b/graph/incidents_graphml/5/5f1d6d10-e13e-11ee-a61b-817c3085f6d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.226
+ 100.64.36.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710336849
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5f1d6d10-e13e-11ee-a61b-817c3085f6d7
+
+
+
diff --git a/graph/incidents_graphml/5/5f1f8770-ea27-11ee-9c4f-25cb7d94c0ce.graphml b/graph/incidents_graphml/5/5f1f8770-ea27-11ee-9c4f-25cb7d94c0ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..440e884b190e85e8543b24eb3edd7609fea6284d
--- /dev/null
+++ b/graph/incidents_graphml/5/5f1f8770-ea27-11ee-9c4f-25cb7d94c0ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.169
+ 100.64.52.169
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711316531
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5f1f8770-ea27-11ee-9c4f-25cb7d94c0ce
+
+
+
diff --git a/graph/incidents_graphml/5/5f21ec30-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/5/5f21ec30-ed09-11ec-8ab6-b3d858f740e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f6d0ef4cb3a2ad4956c7e6b01c6a7c5bf3b6b96
--- /dev/null
+++ b/graph/incidents_graphml/5/5f21ec30-ed09-11ec-8ab6-b3d858f740e7.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.176
+ 100.64.80.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.51
+ 100.64.73.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655338504
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5f21ec30-ed09-11ec-8ab6-b3d858f740e7
+
+
+ INCIDENT_LINK
+ 1655338504
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5f21ec30-ed09-11ec-8ab6-b3d858f740e7
+
+
+
diff --git a/graph/incidents_graphml/5/5f259e30-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5f259e30-0b89-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9ffe0b4f4c9cb935b7d40ee337b618d61d88b26
--- /dev/null
+++ b/graph/incidents_graphml/5/5f259e30-0b89-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.245
+ 100.64.80.245
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686839513
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5f259e30-0b89-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/5/5f2a2990-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/5/5f2a2990-ed09-11ec-8ab6-b3d858f740e7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5d152f7ee5427de5dcf86adb6150221d8387cca
--- /dev/null
+++ b/graph/incidents_graphml/5/5f2a2990-ed09-11ec-8ab6-b3d858f740e7.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.60
+ 100.64.59.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655338504
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f2a2990-ed09-11ec-8ab6-b3d858f740e7
+
+
+ INCIDENT_LINK
+ 1655338504
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f2a2990-ed09-11ec-8ab6-b3d858f740e7
+
+
+
diff --git a/graph/incidents_graphml/5/5f35b000-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5f35b000-e13e-11ee-a61b-817c3085f6d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6fda5e5eb5b8301338c68468da55b4cadaed33af
--- /dev/null
+++ b/graph/incidents_graphml/5/5f35b000-e13e-11ee-a61b-817c3085f6d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.154
+ 100.64.19.154
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710336849
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5f35b000-e13e-11ee-a61b-817c3085f6d7
+
+
+
diff --git a/graph/incidents_graphml/5/5f382a00-a8b4-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/5/5f382a00-a8b4-11ee-bb9e-f554981233b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43878289d3f728bce7e5cce3330db76c27d2d8d1
--- /dev/null
+++ b/graph/incidents_graphml/5/5f382a00-a8b4-11ee-bb9e-f554981233b0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.154
+ 100.64.68.154
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ INCIDENT_LINK
+ 1704120314
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f382a00-a8b4-11ee-bb9e-f554981233b0
+
+
+ INCIDENT_LINK
+ 1704120314
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f382a00-a8b4-11ee-bb9e-f554981233b0
+
+
+
diff --git a/graph/incidents_graphml/5/5f3ccfb0-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5f3ccfb0-0b89-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e479c6d9dd42076613649f8f933554039109a9a
--- /dev/null
+++ b/graph/incidents_graphml/5/5f3ccfb0-0b89-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.245
+ 100.64.80.245
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686839513
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5f3ccfb0-0b89-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/5/5f498ee0-1b60-11ed-9931-5799b48b5de2.graphml b/graph/incidents_graphml/5/5f498ee0-1b60-11ed-9931-5799b48b5de2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29d354a5db90ab8bd14590c6e57a21cb12954c09
--- /dev/null
+++ b/graph/incidents_graphml/5/5f498ee0-1b60-11ed-9931-5799b48b5de2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.133
+ 100.64.71.133
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660433624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5f498ee0-1b60-11ed-9931-5799b48b5de2
+
+
+
diff --git a/graph/incidents_graphml/5/5f4b8d20-317b-11ef-927c-272449d34670.graphml b/graph/incidents_graphml/5/5f4b8d20-317b-11ef-927c-272449d34670.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4aa502930c3122247227fafc9ddde46b561fc0b
--- /dev/null
+++ b/graph/incidents_graphml/5/5f4b8d20-317b-11ef-927c-272449d34670.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.46.208
+ USER-0015-1982.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.122
+ USER-0015-2118.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719159142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5f4b8d20-317b-11ef-927c-272449d34670
+
+
+
diff --git a/graph/incidents_graphml/5/5f4f0460-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5f4f0460-e13e-11ee-a61b-817c3085f6d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91f796828c7703021c630583ba004ec9e4e2bb73
--- /dev/null
+++ b/graph/incidents_graphml/5/5f4f0460-e13e-11ee-a61b-817c3085f6d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.154
+ 100.64.19.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710336849
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5f4f0460-e13e-11ee-a61b-817c3085f6d7
+
+
+
diff --git a/graph/incidents_graphml/5/5f510d40-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5f510d40-8807-11ee-bd27-a396646abc8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1626212cf2c45bb464d827410849bd7fce988ef0
--- /dev/null
+++ b/graph/incidents_graphml/5/5f510d40-8807-11ee-bd27-a396646abc8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.10
+ 100.64.41.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700527574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5f510d40-8807-11ee-bd27-a396646abc8f
+
+
+
diff --git a/graph/incidents_graphml/5/5f5f0d70-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5f5f0d70-683e-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd6ca9f4406c552da04ff30b1b739a9f5454f830
--- /dev/null
+++ b/graph/incidents_graphml/5/5f5f0d70-683e-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.141
+ 100.64.31.141
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697032759
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5f5f0d70-683e-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/5/5f627260-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5f627260-8807-11ee-bd27-a396646abc8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c998b35de339ef123d0ef7d54d5ff0358c36151
--- /dev/null
+++ b/graph/incidents_graphml/5/5f627260-8807-11ee-bd27-a396646abc8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.10
+ 100.64.41.10
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700527574
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5f627260-8807-11ee-bd27-a396646abc8f
+
+
+
diff --git a/graph/incidents_graphml/5/5f707c20-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5f707c20-8807-11ee-bd27-a396646abc8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b2859787c03e9cf06d5865b2d944ad0ad2f537f
--- /dev/null
+++ b/graph/incidents_graphml/5/5f707c20-8807-11ee-bd27-a396646abc8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.12
+ 100.64.41.12
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700527574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5f707c20-8807-11ee-bd27-a396646abc8f
+
+
+
diff --git a/graph/incidents_graphml/5/5f729260-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/5/5f729260-f6bd-11ee-861e-3f1320280b96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d50417194c887483b06021354bc52627e41a145
--- /dev/null
+++ b/graph/incidents_graphml/5/5f729260-f6bd-11ee-861e-3f1320280b96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.162
+ 100.64.61.162
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712700370
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f729260-f6bd-11ee-861e-3f1320280b96
+
+
+
diff --git a/graph/incidents_graphml/5/5f77ba80-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/5f77ba80-4bd6-11ed-a7c5-958e7a84b2a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd49d73de0c6f008d54149b1b78390cb6d12da58
--- /dev/null
+++ b/graph/incidents_graphml/5/5f77ba80-4bd6-11ed-a7c5-958e7a84b2a2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.34
+ 100.64.77.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.255
+ 100.64.70.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1665761961
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f77ba80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761961
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f77ba80-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+
diff --git a/graph/incidents_graphml/5/5f7d32d0-ea5e-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/5/5f7d32d0-ea5e-11ee-b380-23a0be8babf0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5679db9e03be835b4e90321eb9d4e04eb26d872
--- /dev/null
+++ b/graph/incidents_graphml/5/5f7d32d0-ea5e-11ee-b380-23a0be8babf0.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.199
+ 100.64.10.199
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.137
+ 100.64.39.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.138
+ 100.64.39.138
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.139
+ 100.64.39.139
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711340154
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f7d32d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340154
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f7d32d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340154
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f7d32d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340154
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f7d32d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340154
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f7d32d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340154
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f7d32d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340154
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f7d32d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340154
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f7d32d0-ea5e-11ee-b380-23a0be8babf0
+
+
+
diff --git a/graph/incidents_graphml/5/5f7eacf0-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5f7eacf0-8807-11ee-bd27-a396646abc8f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46e0fb6f2b0a5cab5a1aade2e1bc149d8e67b481
--- /dev/null
+++ b/graph/incidents_graphml/5/5f7eacf0-8807-11ee-bd27-a396646abc8f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.12
+ 100.64.41.12
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700527574
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f7eacf0-8807-11ee-bd27-a396646abc8f
+
+
+
diff --git a/graph/incidents_graphml/5/5f8a6020-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/5/5f8a6020-f6bd-11ee-861e-3f1320280b96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7060cea66bedc917f35770de1c5148043a591f9
--- /dev/null
+++ b/graph/incidents_graphml/5/5f8a6020-f6bd-11ee-861e-3f1320280b96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.162
+ 100.64.61.162
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712700370
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5f8a6020-f6bd-11ee-861e-3f1320280b96
+
+
+
diff --git a/graph/incidents_graphml/5/5f8b0a40-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5f8b0a40-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8be56a666afd2742ccc7d39a2f05f3f03a04b4b
--- /dev/null
+++ b/graph/incidents_graphml/5/5f8b0a40-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.84
+ 100.64.16.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475238
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5f8b0a40-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/5/5f91c640-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5f91c640-77e1-11ee-95df-1f31585c14cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdfdfb7f757de29bcfe2eb6fa73c9afa82d5974f
--- /dev/null
+++ b/graph/incidents_graphml/5/5f91c640-77e1-11ee-95df-1f31585c14cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.119
+ 100.64.40.119
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698752035
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5f91c640-77e1-11ee-95df-1f31585c14cb
+
+
+
diff --git a/graph/incidents_graphml/5/5f994410-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/5/5f994410-33f8-11ee-8ffe-d166de7672c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb718601c82853be00f9a263bddcd49dda08842a
--- /dev/null
+++ b/graph/incidents_graphml/5/5f994410-33f8-11ee-8ffe-d166de7672c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.22
+ 100.64.41.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691285234
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5f994410-33f8-11ee-8ffe-d166de7672c0
+
+
+
diff --git a/graph/incidents_graphml/5/5fa24100-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5fa24100-77e1-11ee-95df-1f31585c14cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d13e7dfcaab7af872dec2a8346621918a1a5cae
--- /dev/null
+++ b/graph/incidents_graphml/5/5fa24100-77e1-11ee-95df-1f31585c14cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.124
+ 100.64.14.124
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698752035
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5fa24100-77e1-11ee-95df-1f31585c14cb
+
+
+
diff --git a/graph/incidents_graphml/5/5fab2e20-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5fab2e20-e13e-11ee-a61b-817c3085f6d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a000fcbc4cb5939398f85c22f6f207387d4e6f53
--- /dev/null
+++ b/graph/incidents_graphml/5/5fab2e20-e13e-11ee-a61b-817c3085f6d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.216
+ 100.64.13.216
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710336850
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5fab2e20-e13e-11ee-a61b-817c3085f6d7
+
+
+
diff --git a/graph/incidents_graphml/5/5fab55a0-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/5/5fab55a0-f6bd-11ee-861e-3f1320280b96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68558b1ae6628a78daa87d4616eb260e31dcdb4d
--- /dev/null
+++ b/graph/incidents_graphml/5/5fab55a0-f6bd-11ee-861e-3f1320280b96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.164
+ 100.64.61.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712700371
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5fab55a0-f6bd-11ee-861e-3f1320280b96
+
+
+
diff --git a/graph/incidents_graphml/5/5fb26da0-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5fb26da0-77e1-11ee-95df-1f31585c14cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..334884ea70b8d9cdf76e47c61bbe8a88c143674d
--- /dev/null
+++ b/graph/incidents_graphml/5/5fb26da0-77e1-11ee-95df-1f31585c14cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.124
+ 100.64.14.124
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698752035
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5fb26da0-77e1-11ee-95df-1f31585c14cb
+
+
+
diff --git a/graph/incidents_graphml/5/5fb8b2f0-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/5/5fb8b2f0-33f8-11ee-8ffe-d166de7672c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d78d2de58b2453ba352e9449350d59e51b1a8f1
--- /dev/null
+++ b/graph/incidents_graphml/5/5fb8b2f0-33f8-11ee-8ffe-d166de7672c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.22
+ 100.64.41.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691285234
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5fb8b2f0-33f8-11ee-8ffe-d166de7672c0
+
+
+
diff --git a/graph/incidents_graphml/5/5fbc0db0-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/5fbc0db0-f52c-11ee-9bad-936e2aee478a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78dedba0b6c3cf3c760d74d52d2f5ee380ed91d0
--- /dev/null
+++ b/graph/incidents_graphml/5/5fbc0db0-f52c-11ee-9bad-936e2aee478a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.42
+ 100.64.65.42
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712528142
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5fbc0db0-f52c-11ee-9bad-936e2aee478a
+
+
+
diff --git a/graph/incidents_graphml/5/5fbc72c0-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/5/5fbc72c0-452b-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..039857feebf77d6d8620db122d0a347300c407e7
--- /dev/null
+++ b/graph/incidents_graphml/5/5fbc72c0-452b-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.92
+ 100.64.9.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176308
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5fbc72c0-452b-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/5/5fc1afe0-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5fc1afe0-77e1-11ee-95df-1f31585c14cb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17fa96fb7a471926e2426903772dc9194716c7c3
--- /dev/null
+++ b/graph/incidents_graphml/5/5fc1afe0-77e1-11ee-95df-1f31585c14cb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.121
+ 100.64.40.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698752035
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5fc1afe0-77e1-11ee-95df-1f31585c14cb
+
+
+
diff --git a/graph/incidents_graphml/5/5fc9cb90-41e5-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/5/5fc9cb90-41e5-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..027049b03dc8744b58dbe66d79cf48852962e5b2
--- /dev/null
+++ b/graph/incidents_graphml/5/5fc9cb90-41e5-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.217
+ 100.64.75.217
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.51
+ 100.64.72.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.53
+ 100.64.73.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.218
+ 100.64.75.218
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664668892
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5fc9cb90-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668892
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5fc9cb90-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668892
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5fc9cb90-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668892
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5fc9cb90-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668892
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5fc9cb90-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668892
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5fc9cb90-41e5-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/5/5fca4700-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/5/5fca4700-3eec-11ee-a139-b35fd7c3aeb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3390593964d53bff0b0ec127c9a3db62e28bf28e
--- /dev/null
+++ b/graph/incidents_graphml/5/5fca4700-3eec-11ee-a139-b35fd7c3aeb6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.194
+ 100.64.47.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692489543
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5fca4700-3eec-11ee-a139-b35fd7c3aeb6
+
+
+
diff --git a/graph/incidents_graphml/5/5fcc5b30-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/5/5fcc5b30-dcdf-11ee-9697-039b254a6d03.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bd02c07ca8efa32fd7a30761d6fddfbe0a0b713
--- /dev/null
+++ b/graph/incidents_graphml/5/5fcc5b30-dcdf-11ee-9697-039b254a6d03.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.69
+ USER-0015-2000.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1709856243
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5fcc5b30-dcdf-11ee-9697-039b254a6d03
+
+
+
diff --git a/graph/incidents_graphml/5/5fd5a010-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/5/5fd5a010-452b-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5791dd5ca7ef326b1cf9980152791015d09e3ff4
--- /dev/null
+++ b/graph/incidents_graphml/5/5fd5a010-452b-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.92
+ 100.64.9.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176308
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5fd5a010-452b-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/5/5fd8c5f0-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/5/5fd8c5f0-3eec-11ee-a139-b35fd7c3aeb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d72b1d573c07d0069ca7b38f896e327f20195f5f
--- /dev/null
+++ b/graph/incidents_graphml/5/5fd8c5f0-3eec-11ee-a139-b35fd7c3aeb6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.196
+ 100.64.47.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692489543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5fd8c5f0-3eec-11ee-a139-b35fd7c3aeb6
+
+
+
diff --git a/graph/incidents_graphml/5/5fd99cf0-3820-11ee-8fd0-65f18d6f9b41.graphml b/graph/incidents_graphml/5/5fd99cf0-3820-11ee-8fd0-65f18d6f9b41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19558e46543ffc1427bc882c926ddef63c062770
--- /dev/null
+++ b/graph/incidents_graphml/5/5fd99cf0-3820-11ee-8fd0-65f18d6f9b41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.129
+ 100.64.11.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1691742219
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5fd99cf0-3820-11ee-8fd0-65f18d6f9b41
+
+
+
diff --git a/graph/incidents_graphml/5/5fdb2230-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5fdb2230-552d-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfa671828e3f9b54e5eb236409236dcd50260d7b
--- /dev/null
+++ b/graph/incidents_graphml/5/5fdb2230-552d-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.70
+ 100.64.51.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694936386
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5fdb2230-552d-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/5/5fdd2ae0-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/5/5fdd2ae0-33f8-11ee-8ffe-d166de7672c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7733adc0a3e25812cb4286c39365c54fe02d46a0
--- /dev/null
+++ b/graph/incidents_graphml/5/5fdd2ae0-33f8-11ee-8ffe-d166de7672c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.249
+ USER-0015-1295.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691285235
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5fdd2ae0-33f8-11ee-8ffe-d166de7672c0
+
+
+
diff --git a/graph/incidents_graphml/5/5fdd3870-909e-11ee-9a83-8f2a027a2cd3.graphml b/graph/incidents_graphml/5/5fdd3870-909e-11ee-9a83-8f2a027a2cd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90a7d1603476f9491decf7d3dbe8233782b446fa
--- /dev/null
+++ b/graph/incidents_graphml/5/5fdd3870-909e-11ee-9a83-8f2a027a2cd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.145
+ 100.64.8.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701472038
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5fdd3870-909e-11ee-9a83-8f2a027a2cd3
+
+
+
diff --git a/graph/incidents_graphml/5/5fe07ac0-3820-11ee-8fd0-65f18d6f9b41.graphml b/graph/incidents_graphml/5/5fe07ac0-3820-11ee-8fd0-65f18d6f9b41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ed7369dea4306ba99ed6dd0c91dedb592c89c0e
--- /dev/null
+++ b/graph/incidents_graphml/5/5fe07ac0-3820-11ee-8fd0-65f18d6f9b41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.129
+ 100.64.11.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1691742219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5fe07ac0-3820-11ee-8fd0-65f18d6f9b41
+
+
+
diff --git a/graph/incidents_graphml/5/5fe70a70-3820-11ee-8fd0-65f18d6f9b41.graphml b/graph/incidents_graphml/5/5fe70a70-3820-11ee-8fd0-65f18d6f9b41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..31010b60d49d979238be9dd24533a3c85124e3e8
--- /dev/null
+++ b/graph/incidents_graphml/5/5fe70a70-3820-11ee-8fd0-65f18d6f9b41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1691742219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5fe70a70-3820-11ee-8fd0-65f18d6f9b41
+
+
+
diff --git a/graph/incidents_graphml/5/5fe80830-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/5/5fe80830-3eec-11ee-a139-b35fd7c3aeb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df95e1d104f6618bd93399036bba7f906d8bd12f
--- /dev/null
+++ b/graph/incidents_graphml/5/5fe80830-3eec-11ee-a139-b35fd7c3aeb6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.196
+ 100.64.47.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692489543
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5fe80830-3eec-11ee-a139-b35fd7c3aeb6
+
+
+
diff --git a/graph/incidents_graphml/5/5fe83300-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5fe83300-0c1a-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b48df240fedb8f65d847aae7c1b3b027c3e1bb76
--- /dev/null
+++ b/graph/incidents_graphml/5/5fe83300-0c1a-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.232
+ 100.64.80.232
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.93
+ 100.64.71.93
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686901791
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5fe83300-0c1a-11ee-a535-110da53c9d07
+
+
+ INCIDENT_LINK
+ 1686901791
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5fe83300-0c1a-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/5/5fe847a0-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/5/5fe847a0-dcdf-11ee-9697-039b254a6d03.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c3586e3dd793acb664e2c7397ce95a0c17b1c83b
--- /dev/null
+++ b/graph/incidents_graphml/5/5fe847a0-dcdf-11ee-9697-039b254a6d03.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.32.69
+ USER-0015-2000.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1709856244
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5fe847a0-dcdf-11ee-9697-039b254a6d03
+
+
+
diff --git a/graph/incidents_graphml/5/5fecc8d0-909e-11ee-9a83-8f2a027a2cd3.graphml b/graph/incidents_graphml/5/5fecc8d0-909e-11ee-9a83-8f2a027a2cd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..783c9ba784bb10a14b01a6a114eeb8d0a1f2f0d5
--- /dev/null
+++ b/graph/incidents_graphml/5/5fecc8d0-909e-11ee-9a83-8f2a027a2cd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.145
+ 100.64.8.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701472038
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 5fecc8d0-909e-11ee-9a83-8f2a027a2cd3
+
+
+
diff --git a/graph/incidents_graphml/5/5fecd570-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5fecd570-552d-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e622f08dc1f166938f0fd8feb05573d3b05c87a
--- /dev/null
+++ b/graph/incidents_graphml/5/5fecd570-552d-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.78
+ 100.64.51.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694936386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5fecd570-552d-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/5/5ffb4210-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/5/5ffb4210-3eec-11ee-a139-b35fd7c3aeb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a89b1cc68c36d74262e66dc81274c1c70207c65
--- /dev/null
+++ b/graph/incidents_graphml/5/5ffb4210-3eec-11ee-a139-b35fd7c3aeb6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.215
+ 100.64.30.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692489543
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 5ffb4210-3eec-11ee-a139-b35fd7c3aeb6
+
+
+
diff --git a/graph/incidents_graphml/5/5ffb47c0-909e-11ee-9a83-8f2a027a2cd3.graphml b/graph/incidents_graphml/5/5ffb47c0-909e-11ee-9a83-8f2a027a2cd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9534b7ac3e57f3f44e0952e5f3a7d0b3cf7a41d0
--- /dev/null
+++ b/graph/incidents_graphml/5/5ffb47c0-909e-11ee-9a83-8f2a027a2cd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.163
+ 100.64.12.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701472038
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 5ffb47c0-909e-11ee-9a83-8f2a027a2cd3
+
+
+
diff --git a/graph/incidents_graphml/5/5ffbf0a0-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5ffbf0a0-552d-11ee-add4-2b9be3bdfcf6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f54f875c932b286f06b4493d53fadff65e9ae223
--- /dev/null
+++ b/graph/incidents_graphml/5/5ffbf0a0-552d-11ee-add4-2b9be3bdfcf6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.78
+ 100.64.51.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694936386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 5ffbf0a0-552d-11ee-add4-2b9be3bdfcf6
+
+
+
diff --git a/graph/incidents_graphml/6/6002f280-6183-11ee-a390-cde4d9cd4c71.graphml b/graph/incidents_graphml/6/6002f280-6183-11ee-a390-cde4d9cd4c71.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d65aadd8050a244c4ca07eaabbb8f64db696dcc8
--- /dev/null
+++ b/graph/incidents_graphml/6/6002f280-6183-11ee-a390-cde4d9cd4c71.graphml
@@ -0,0 +1,481 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.54.215
+ 100.64.54.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"]
+
+
+ HOST
+ 100.64.19.166
+ 100.64.19.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.40.143
+ 100.64.40.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.119
+ 100.64.11.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.17.176
+ 100.64.17.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.58.41
+ 100.64.58.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+ INCIDENT_LINK
+ 1696292737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6002f280-6183-11ee-a390-cde4d9cd4c71
+
+
+
diff --git a/graph/incidents_graphml/6/600a62f0-909e-11ee-9a83-8f2a027a2cd3.graphml b/graph/incidents_graphml/6/600a62f0-909e-11ee-9a83-8f2a027a2cd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5bfc7d33673fe8a1a7037ceb0875e96e4830798d
--- /dev/null
+++ b/graph/incidents_graphml/6/600a62f0-909e-11ee-9a83-8f2a027a2cd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.163
+ 100.64.12.163
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701472038
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 600a62f0-909e-11ee-9a83-8f2a027a2cd3
+
+
+
diff --git a/graph/incidents_graphml/6/600dee30-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/600dee30-075e-11ee-a67b-a9ce333dbcaf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a27ee4d48e4fdad7291f5bf1596d90d012a28cab
--- /dev/null
+++ b/graph/incidents_graphml/6/600dee30-075e-11ee-a67b-a9ce333dbcaf.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.202
+ 100.64.75.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.58
+ 100.64.72.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686381241
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 600dee30-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381241
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 600dee30-075e-11ee-a67b-a9ce333dbcaf
+
+
+
diff --git a/graph/incidents_graphml/6/60139790-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/6/60139790-4106-11ee-b538-995248355bc9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f6b53bceb5a55b8c8175a66dc0edfc2a4668c1d
--- /dev/null
+++ b/graph/incidents_graphml/6/60139790-4106-11ee-b538-995248355bc9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.205
+ 100.64.69.205
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692720613
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60139790-4106-11ee-b538-995248355bc9
+
+
+
diff --git a/graph/incidents_graphml/6/60167dc0-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/6/60167dc0-4106-11ee-b538-995248355bc9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf1a2572044c07e7b00cecda7160abb7e28e3976
--- /dev/null
+++ b/graph/incidents_graphml/6/60167dc0-4106-11ee-b538-995248355bc9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.205
+ 100.64.69.205
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692720613
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60167dc0-4106-11ee-b538-995248355bc9
+
+
+
diff --git a/graph/incidents_graphml/6/601979f0-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/601979f0-6e77-11ee-9076-51a308ac33b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..905f66cc557deb61831a8f54e7800f87acd4907e
--- /dev/null
+++ b/graph/incidents_graphml/6/601979f0-6e77-11ee-9076-51a308ac33b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.152
+ 100.64.15.152
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697716948
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 601979f0-6e77-11ee-9076-51a308ac33b9
+
+
+
diff --git a/graph/incidents_graphml/6/601c26b0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/6/601c26b0-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3e6ecfacc0fa61b63ec09fef00596faa84e20fa
--- /dev/null
+++ b/graph/incidents_graphml/6/601c26b0-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.43
+ 100.64.47.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475239
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 601c26b0-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475239
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 601c26b0-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/6/60278580-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60278580-ec7e-11ec-8d79-47d8ab3639ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a975b7ba7fb29838ce24b9d0bc57673133f7d1fa
--- /dev/null
+++ b/graph/incidents_graphml/6/60278580-ec7e-11ec-8d79-47d8ab3639ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.4
+ USER-0015-1777.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655278806
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60278580-ec7e-11ec-8d79-47d8ab3639ae
+
+
+
diff --git a/graph/incidents_graphml/6/602b45d0-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/602b45d0-ff3d-11ed-97b1-dfa052c79ac3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7d29cf2bbe40ed8cd9c9879417033d23e89b5cd
--- /dev/null
+++ b/graph/incidents_graphml/6/602b45d0-ff3d-11ed-97b1-dfa052c79ac3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.4
+ 100.64.8.4
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685487459
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 602b45d0-ff3d-11ed-97b1-dfa052c79ac3
+
+
+
diff --git a/graph/incidents_graphml/6/602c5350-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/6/602c5350-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e0ea588e7460e950d65715d13388037a40e396f
--- /dev/null
+++ b/graph/incidents_graphml/6/602c5350-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.43
+ 100.64.47.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475239
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 602c5350-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/6/6032f560-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/6032f560-6e77-11ee-9076-51a308ac33b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a551130ffadb7e339672df87bca1e09f3bf12110
--- /dev/null
+++ b/graph/incidents_graphml/6/6032f560-6e77-11ee-9076-51a308ac33b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.152
+ 100.64.15.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697716948
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6032f560-6e77-11ee-9076-51a308ac33b9
+
+
+
diff --git a/graph/incidents_graphml/6/603391f0-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/6/603391f0-01a8-11ee-a3af-a97ccd3b2ee2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c228fd35215cef73b01addbeff418e8b20def19
--- /dev/null
+++ b/graph/incidents_graphml/6/603391f0-01a8-11ee-a3af-a97ccd3b2ee2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.75
+ 100.64.7.75
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.158
+ HOST-13435
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.23.137
+ 100.64.23.137
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685753317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 603391f0-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+ INCIDENT_LINK
+ 1685753317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 603391f0-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+ INCIDENT_LINK
+ 1685753317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 603391f0-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+ INCIDENT_LINK
+ 1685753317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 603391f0-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+
diff --git a/graph/incidents_graphml/6/6034f790-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/6/6034f790-e13e-11ee-a61b-817c3085f6d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91b5778655bbede6d83ee34b8883fb4d397bda3d
--- /dev/null
+++ b/graph/incidents_graphml/6/6034f790-e13e-11ee-a61b-817c3085f6d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.228
+ 100.64.36.228
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710336851
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6034f790-e13e-11ee-a61b-817c3085f6d7
+
+
+
diff --git a/graph/incidents_graphml/6/603ed2e0-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/6/603ed2e0-22e1-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3add0be0bbaa0c68e2d6cb8fd1e1fe70517b0de
--- /dev/null
+++ b/graph/incidents_graphml/6/603ed2e0-22e1-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.149
+ 100.64.9.149
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689406187
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 603ed2e0-22e1-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/6/60478f20-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/6/60478f20-01a8-11ee-a3af-a97ccd3b2ee2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6017190580451db39d8b4ff85f4331c7e9ee71d5
--- /dev/null
+++ b/graph/incidents_graphml/6/60478f20-01a8-11ee-a3af-a97ccd3b2ee2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.153
+ 100.64.72.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.152
+ 100.64.72.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685753317
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60478f20-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+ INCIDENT_LINK
+ 1685753317
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60478f20-01a8-11ee-a3af-a97ccd3b2ee2
+
+
+
diff --git a/graph/incidents_graphml/6/604a0630-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/6/604a0630-e13e-11ee-a61b-817c3085f6d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92588beaf18af93755d078cde9e7e74eb0b265e7
--- /dev/null
+++ b/graph/incidents_graphml/6/604a0630-e13e-11ee-a61b-817c3085f6d7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.228
+ 100.64.36.228
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710336851
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 604a0630-e13e-11ee-a61b-817c3085f6d7
+
+
+
diff --git a/graph/incidents_graphml/6/604a5e30-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/604a5e30-1eaf-11ed-a2eb-f90f4aab4c31.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..044096647a80013caaf371953e6dbf80fee24e56
--- /dev/null
+++ b/graph/incidents_graphml/6/604a5e30-1eaf-11ed-a2eb-f90f4aab4c31.graphml
@@ -0,0 +1,481 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.76
+ 100.64.80.76
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.20
+ 100.64.74.20
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.77
+ 100.64.80.77
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.69.113
+ 100.64.69.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.78
+ 100.64.80.78
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.234
+ 100.64.70.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.22.113
+ 100.64.22.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.74
+ 100.64.75.74
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.102
+ 100.64.1.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.79
+ 100.64.80.79
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.80
+ 100.64.80.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.81
+ 100.64.80.81
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.82
+ 100.64.80.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+
diff --git a/graph/incidents_graphml/6/6054c4b0-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/6054c4b0-69d6-11ee-b4c0-f17986d6e969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77283d34507a84fc207a7555db815251433e9c56
--- /dev/null
+++ b/graph/incidents_graphml/6/6054c4b0-69d6-11ee-b4c0-f17986d6e969.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.65
+ 100.64.38.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697207995
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6054c4b0-69d6-11ee-b4c0-f17986d6e969
+
+
+
diff --git a/graph/incidents_graphml/6/60588310-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/60588310-2d6e-11ee-86c4-f93b83b6b0bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92c032832dede6018c124d9105d8d4390008425a
--- /dev/null
+++ b/graph/incidents_graphml/6/60588310-2d6e-11ee-86c4-f93b83b6b0bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690566258
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60588310-2d6e-11ee-86c4-f93b83b6b0bc
+
+
+
diff --git a/graph/incidents_graphml/6/6058a210-10e5-11ed-98bd-158c7bf8b3a5.graphml b/graph/incidents_graphml/6/6058a210-10e5-11ed-98bd-158c7bf8b3a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a0964ae5a15b0d0267395212370e141a34c453b
--- /dev/null
+++ b/graph/incidents_graphml/6/6058a210-10e5-11ed-98bd-158c7bf8b3a5.graphml
@@ -0,0 +1,537 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.129
+ 100.64.71.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.216
+ 100.64.71.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.93
+ 100.64.71.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.26
+ 100.64.75.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.5.18
+ 100.64.5.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.40
+ 100.64.71.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.27
+ 100.64.75.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.28
+ 100.64.75.28
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.100
+ USER-0015-1617.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.130
+ 100.64.71.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.29
+ 100.64.75.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.30
+ 100.64.75.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.31
+ 100.64.75.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6058a210-10e5-11ed-98bd-158c7bf8b3a5
+
+
+
diff --git a/graph/incidents_graphml/6/605ac9e0-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/605ac9e0-5627-11ee-a521-41f4addc913f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e08df76c51a555483bc502b81cd92bd29bdd965d
--- /dev/null
+++ b/graph/incidents_graphml/6/605ac9e0-5627-11ee-a521-41f4addc913f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.121
+ 100.64.95.121
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695043761
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 605ac9e0-5627-11ee-a521-41f4addc913f
+
+
+
diff --git a/graph/incidents_graphml/6/605d0ee0-10e5-11ed-98bd-158c7bf8b3a5.graphml b/graph/incidents_graphml/6/605d0ee0-10e5-11ed-98bd-158c7bf8b3a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b54706c61a7dbfe800f22caf6e856f7395b62ed5
--- /dev/null
+++ b/graph/incidents_graphml/6/605d0ee0-10e5-11ed-98bd-158c7bf8b3a5.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.109
+ 100.64.73.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.32
+ 100.64.75.32
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 605d0ee0-10e5-11ed-98bd-158c7bf8b3a5
+
+
+ INCIDENT_LINK
+ 1659281286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 605d0ee0-10e5-11ed-98bd-158c7bf8b3a5
+
+
+
diff --git a/graph/incidents_graphml/6/605d3000-8d3f-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/6/605d3000-8d3f-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d2fc4ab8a4daf1c69935014c06e612fcd5c42632
--- /dev/null
+++ b/graph/incidents_graphml/6/605d3000-8d3f-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.85
+ 100.64.63.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.86
+ 100.64.63.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.87
+ 100.64.63.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.203
+ 100.64.26.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.102
+ 100.64.21.102
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.167
+ 100.64.20.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.88
+ 100.64.63.88
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.131
+ 100.64.33.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.89
+ 100.64.63.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.90
+ 100.64.63.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.54
+ 100.64.37.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.91
+ USER-0015-1453.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.226
+ 100.64.50.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.92
+ 100.64.63.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.188
+ 100.64.10.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.15
+ 100.64.27.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.138
+ 100.64.19.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.123
+ 100.64.26.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 605d3000-8d3f-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/6/60626ba0-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60626ba0-ec7e-11ec-8d79-47d8ab3639ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..784180fb3d2d980b6ea0a11338df5098523aaf70
--- /dev/null
+++ b/graph/incidents_graphml/6/60626ba0-ec7e-11ec-8d79-47d8ab3639ae.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.76
+ 100.64.78.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.102
+ USER-0015-1720.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655278806
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60626ba0-ec7e-11ec-8d79-47d8ab3639ae
+
+
+ INCIDENT_LINK
+ 1655278806
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60626ba0-ec7e-11ec-8d79-47d8ab3639ae
+
+
+
diff --git a/graph/incidents_graphml/6/60643d10-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/6/60643d10-3eec-11ee-a139-b35fd7c3aeb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95517674d3f258142fbde44124124f6b26ae6640
--- /dev/null
+++ b/graph/incidents_graphml/6/60643d10-3eec-11ee-a139-b35fd7c3aeb6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.105
+ 100.64.28.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692489544
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60643d10-3eec-11ee-a139-b35fd7c3aeb6
+
+
+
diff --git a/graph/incidents_graphml/6/60657840-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/60657840-5627-11ee-a521-41f4addc913f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12d271ddb5ee39f0f90c86aaf74dbbac1ebcd2a1
--- /dev/null
+++ b/graph/incidents_graphml/6/60657840-5627-11ee-a521-41f4addc913f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.122
+ 100.64.95.122
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695043761
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60657840-5627-11ee-a521-41f4addc913f
+
+
+
diff --git a/graph/incidents_graphml/6/6066f7d0-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/6/6066f7d0-0b89-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52126d28b4553497ca5a5f46543ac4dc8513428d
--- /dev/null
+++ b/graph/incidents_graphml/6/6066f7d0-0b89-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.30.207
+ 192.168.30.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.0.196
+ 100.64.0.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686839515
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6066f7d0-0b89-11ee-a535-110da53c9d07
+
+
+ INCIDENT_LINK
+ 1686839515
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6066f7d0-0b89-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/6/6069da30-8d3f-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/6/6069da30-8d3f-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6168f22ea5b7aac2dcb5abfe154bcb8156d0795a
--- /dev/null
+++ b/graph/incidents_graphml/6/6069da30-8d3f-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.103
+ 100.64.63.103
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.159
+ USER-0015-1382.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.104
+ 100.64.63.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.105
+ 100.64.63.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.106
+ 100.64.63.106
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.223
+ 100.64.25.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.107
+ 100.64.63.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.49
+ 100.64.62.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.108
+ 100.64.63.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.109
+ 100.64.63.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.110
+ 100.64.63.110
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.255
+ 100.64.41.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.111
+ 100.64.63.111
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.153
+ USER-0015-1454.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.112
+ 100.64.63.112
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.113
+ 100.64.63.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.114
+ 100.64.63.114
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.252
+ 100.64.7.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.51
+ 100.64.7.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1701101383
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6069da30-8d3f-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/6/60715200-5aaf-11ee-892e-3b87e68adb1a.graphml b/graph/incidents_graphml/6/60715200-5aaf-11ee-892e-3b87e68adb1a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8152b9f1b7ff7f3c5c109185ba14ec349c8c1be5
--- /dev/null
+++ b/graph/incidents_graphml/6/60715200-5aaf-11ee-892e-3b87e68adb1a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.10
+ 100.64.37.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1695541977
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60715200-5aaf-11ee-892e-3b87e68adb1a
+
+
+
diff --git a/graph/incidents_graphml/6/60738200-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/60738200-5627-11ee-a521-41f4addc913f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..146591e6d92d6e5b567a6f8f618b0520e4ddfbda
--- /dev/null
+++ b/graph/incidents_graphml/6/60738200-5627-11ee-a521-41f4addc913f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.122
+ 100.64.95.122
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695043761
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60738200-5627-11ee-a521-41f4addc913f
+
+
+
diff --git a/graph/incidents_graphml/6/6075c4e0-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/6/6075c4e0-0b89-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70c5ddf0b5c4a94e9837e24e0f75a98dab60a57d
--- /dev/null
+++ b/graph/incidents_graphml/6/6075c4e0-0b89-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.249
+ 100.64.24.249
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.92
+ 100.64.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686839515
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6075c4e0-0b89-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/6/60773a90-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/6/60773a90-090f-11ee-8afe-6d26bac63fb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2963d7437db3a5dbb302044d96faad4d4e5e7dd5
--- /dev/null
+++ b/graph/incidents_graphml/6/60773a90-090f-11ee-8afe-6d26bac63fb3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.58
+ 100.64.24.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.255
+ 100.64.73.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686567214
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60773a90-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567214
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60773a90-090f-11ee-8afe-6d26bac63fb3
+
+
+
diff --git a/graph/incidents_graphml/6/6077ec20-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/6/6077ec20-3eec-11ee-a139-b35fd7c3aeb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d1e19d2b34b460789c1d4caa2d75f9dc6fe4f2f
--- /dev/null
+++ b/graph/incidents_graphml/6/6077ec20-3eec-11ee-a139-b35fd7c3aeb6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.105
+ 100.64.28.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692489544
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6077ec20-3eec-11ee-a139-b35fd7c3aeb6
+
+
+
diff --git a/graph/incidents_graphml/6/60814d80-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/6/60814d80-4106-11ee-b538-995248355bc9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f1136646c2d39c47f4c36e9c86cb8910be9b8b8
--- /dev/null
+++ b/graph/incidents_graphml/6/60814d80-4106-11ee-b538-995248355bc9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.14.83
+ USER-0015-1534.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692720613
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60814d80-4106-11ee-b538-995248355bc9
+
+
+
diff --git a/graph/incidents_graphml/6/6083a410-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/6083a410-33f8-11ee-8ffe-d166de7672c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e123e9874637f329932b491accac609d63cbe862
--- /dev/null
+++ b/graph/incidents_graphml/6/6083a410-33f8-11ee-8ffe-d166de7672c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.9
+ 100.64.22.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691285236
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6083a410-33f8-11ee-8ffe-d166de7672c0
+
+
+
diff --git a/graph/incidents_graphml/6/60875570-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/6/60875570-3eec-11ee-a139-b35fd7c3aeb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1182aff8c1f9e164f2e995139ec486a0c2b30a70
--- /dev/null
+++ b/graph/incidents_graphml/6/60875570-3eec-11ee-a139-b35fd7c3aeb6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.203
+ 100.64.34.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692489544
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 60875570-3eec-11ee-a139-b35fd7c3aeb6
+
+
+
diff --git a/graph/incidents_graphml/6/6088b460-ea27-11ee-9c4f-25cb7d94c0ce.graphml b/graph/incidents_graphml/6/6088b460-ea27-11ee-9c4f-25cb7d94c0ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e090738d2cbc3f3e360a09d93145696721ee1b79
--- /dev/null
+++ b/graph/incidents_graphml/6/6088b460-ea27-11ee-9c4f-25cb7d94c0ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.66
+ 100.64.23.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711316534
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6088b460-ea27-11ee-9c4f-25cb7d94c0ce
+
+
+
diff --git a/graph/incidents_graphml/6/6088edd0-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/6/6088edd0-090f-11ee-8afe-6d26bac63fb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a5fbb24a87817fa8f2c48c8a8dfebcdb9adc7d0
--- /dev/null
+++ b/graph/incidents_graphml/6/6088edd0-090f-11ee-8afe-6d26bac63fb3.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.130
+ 100.64.11.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.9634375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.180
+ 100.64.71.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.49
+ 100.64.78.49
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.50
+ 100.64.78.50
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.51
+ 100.64.78.51
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686567214
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6088edd0-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567214
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6088edd0-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567214
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6088edd0-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567214
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6088edd0-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567214
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6088edd0-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567214
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6088edd0-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567214
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6088edd0-090f-11ee-8afe-6d26bac63fb3
+
+
+ INCIDENT_LINK
+ 1686567214
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6088edd0-090f-11ee-8afe-6d26bac63fb3
+
+
+
diff --git a/graph/incidents_graphml/6/60892d80-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60892d80-ec7e-11ec-8d79-47d8ab3639ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d008a0d77b8eb512dc10496beb1ecd157cf4406d
--- /dev/null
+++ b/graph/incidents_graphml/6/60892d80-ec7e-11ec-8d79-47d8ab3639ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.211
+ USER-0015-1778.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655278807
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60892d80-ec7e-11ec-8d79-47d8ab3639ae
+
+
+
diff --git a/graph/incidents_graphml/6/608f3bf0-dd61-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/6/608f3bf0-dd61-11ee-aed8-bd6bc51fe73f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2b359ec6dada763c7b5b98bcfa0c592a2ade324
--- /dev/null
+++ b/graph/incidents_graphml/6/608f3bf0-dd61-11ee-aed8-bd6bc51fe73f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.123
+ USER-0015-1971.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1709912079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 608f3bf0-dd61-11ee-aed8-bd6bc51fe73f
+
+
+
diff --git a/graph/incidents_graphml/6/60936930-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/60936930-2d6e-11ee-86c4-f93b83b6b0bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e57149ab76ae82567e0e2645f4c6fb2ff40ed289
--- /dev/null
+++ b/graph/incidents_graphml/6/60936930-2d6e-11ee-86c4-f93b83b6b0bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690566258
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60936930-2d6e-11ee-86c4-f93b83b6b0bc
+
+
+
diff --git a/graph/incidents_graphml/6/60937a80-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/6/60937a80-fced-11ed-ae6a-5f6768ebee7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f75054b37f00fae8fce634d169c8f0774d3016b9
--- /dev/null
+++ b/graph/incidents_graphml/6/60937a80-fced-11ed-ae6a-5f6768ebee7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.59
+ 100.64.34.59
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685233197
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60937a80-fced-11ed-ae6a-5f6768ebee7b
+
+
+
diff --git a/graph/incidents_graphml/6/609dd560-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/609dd560-1eaf-11ed-a2eb-f90f4aab4c31.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af3e14eb42cbc40978f013020571c4a70a7e421b
--- /dev/null
+++ b/graph/incidents_graphml/6/609dd560-1eaf-11ed-a2eb-f90f4aab4c31.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.84
+ 100.64.80.84
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.119
+ 100.64.77.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.100
+ USER-0015-1617.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.85
+ 100.64.80.85
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.228
+ 100.64.79.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.115
+ 100.64.72.115
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.86
+ 100.64.80.86
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 609dd560-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+
diff --git a/graph/incidents_graphml/6/60a04660-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/60a04660-1eaf-11ed-a2eb-f90f4aab4c31.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..938c5f3bbb7816a9980439f3016a2ac46b10ad83
--- /dev/null
+++ b/graph/incidents_graphml/6/60a04660-1eaf-11ed-a2eb-f90f4aab4c31.graphml
@@ -0,0 +1,143 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.87
+ 100.64.80.87
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.71
+ 100.64.73.71
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.88
+ 100.64.80.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.6.187
+ 100.64.6.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.240
+ 100.64.1.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60a04660-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60a04660-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60a04660-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60a04660-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60a04660-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+
diff --git a/graph/incidents_graphml/6/60a200a0-dd61-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/6/60a200a0-dd61-11ee-aed8-bd6bc51fe73f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8e8a6d46f23871ea10cd070abf6d7ec106285cd
--- /dev/null
+++ b/graph/incidents_graphml/6/60a200a0-dd61-11ee-aed8-bd6bc51fe73f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 100.64.85.123
+ USER-0015-1971.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709912079
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 60a200a0-dd61-11ee-aed8-bd6bc51fe73f
+
+
+
diff --git a/graph/incidents_graphml/6/60a48c20-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/60a48c20-1eaf-11ed-a2eb-f90f4aab4c31.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed1295df79ec73ab0b9544769cfe3c38fbc996bc
--- /dev/null
+++ b/graph/incidents_graphml/6/60a48c20-1eaf-11ed-a2eb-f90f4aab4c31.graphml
@@ -0,0 +1,697 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.235
+ 100.64.6.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.196
+ 100.64.75.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.87
+ 100.64.74.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.20.68
+ 100.64.20.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.89
+ 100.64.80.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.226
+ 100.64.1.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.90
+ 100.64.80.90
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.198
+ 100.64.79.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.20.44
+ 100.64.20.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.2
+ 100.64.76.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.91
+ 100.64.80.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.40
+ 100.64.73.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.92
+ 100.64.80.92
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.93
+ 100.64.80.93
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.202
+ 100.64.76.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.44
+ 100.64.73.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.94
+ 100.64.80.94
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.228
+ 100.64.79.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.95
+ 100.64.80.95
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797410
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+
diff --git a/graph/incidents_graphml/6/60ac3a80-ad8c-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/6/60ac3a80-ad8c-11ed-a9cd-bdbbd3b810c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4fedcea02955e1a29ed27a0d45c02f36c4067c21
--- /dev/null
+++ b/graph/incidents_graphml/6/60ac3a80-ad8c-11ed-a9cd-bdbbd3b810c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.125
+ 100.64.83.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.46.208.212
+ 10.46.208.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1676505394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 60ac3a80-ad8c-11ed-a9cd-bdbbd3b810c7
+
+
+
diff --git a/graph/incidents_graphml/6/60afbcf0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/6/60afbcf0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c7d03894e1ec925d35dac66bb8bff8e9319eb29
--- /dev/null
+++ b/graph/incidents_graphml/6/60afbcf0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.46.208.212
+ 10.46.208.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.125
+ 100.64.83.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1676505394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 60afbcf0-ad8c-11ed-a9cd-bdbbd3b810c7
+
+
+
diff --git a/graph/incidents_graphml/6/60afef60-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60afef60-ec7e-11ec-8d79-47d8ab3639ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a9a8cf9f44553b6225cc383d3317d7f08e2214c
--- /dev/null
+++ b/graph/incidents_graphml/6/60afef60-ec7e-11ec-8d79-47d8ab3639ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.75
+ 100.64.78.75
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655278807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60afef60-ec7e-11ec-8d79-47d8ab3639ae
+
+
+
diff --git a/graph/incidents_graphml/6/60b1dfd0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/6/60b1dfd0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44e4835e5764d35eedea48360c6914485ddd3b25
--- /dev/null
+++ b/graph/incidents_graphml/6/60b1dfd0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.126
+ 100.64.83.126
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.46.208.212
+ 10.46.208.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1676505394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60b1dfd0-ad8c-11ed-a9cd-bdbbd3b810c7
+
+
+
diff --git a/graph/incidents_graphml/6/60b2b3d0-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/6/60b2b3d0-08e2-11ef-ae93-51753793321f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1bed504b5d25907f805e27c3b2773fa22503a07
--- /dev/null
+++ b/graph/incidents_graphml/6/60b2b3d0-08e2-11ef-ae93-51753793321f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.126
+ 100.64.95.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1714695385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60b2b3d0-08e2-11ef-ae93-51753793321f
+
+
+
diff --git a/graph/incidents_graphml/6/60b56240-ad8c-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/6/60b56240-ad8c-11ed-a9cd-bdbbd3b810c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65a02562fa2990dec794aa528d004924ca58ced0
--- /dev/null
+++ b/graph/incidents_graphml/6/60b56240-ad8c-11ed-a9cd-bdbbd3b810c7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.46.208.212
+ 10.46.208.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.126
+ 100.64.83.126
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1676505394
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60b56240-ad8c-11ed-a9cd-bdbbd3b810c7
+
+
+
diff --git a/graph/incidents_graphml/6/60ba4550-0c4d-11ef-8e07-3732a564a2cf.graphml b/graph/incidents_graphml/6/60ba4550-0c4d-11ef-8e07-3732a564a2cf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7036fd1c4bce7683d392bb95165af3489e8fdb58
--- /dev/null
+++ b/graph/incidents_graphml/6/60ba4550-0c4d-11ef-8e07-3732a564a2cf.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.65
+ 100.64.31.65
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715071194
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60ba4550-0c4d-11ef-8e07-3732a564a2cf
+
+
+ INCIDENT_LINK
+ 1715071194
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60ba4550-0c4d-11ef-8e07-3732a564a2cf
+
+
+
diff --git a/graph/incidents_graphml/6/60c28c60-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/60c28c60-5627-11ee-a521-41f4addc913f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fe98ccd1a1b2221f8e20710dbaf55a09f3fabe9
--- /dev/null
+++ b/graph/incidents_graphml/6/60c28c60-5627-11ee-a521-41f4addc913f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.52
+ 100.64.31.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695043762
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 60c28c60-5627-11ee-a521-41f4addc913f
+
+
+
diff --git a/graph/incidents_graphml/6/60cb1dd0-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/6/60cb1dd0-08e2-11ef-ae93-51753793321f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e525806c85a1bdb276df9fb9b1dc7b3c41e8d1a
--- /dev/null
+++ b/graph/incidents_graphml/6/60cb1dd0-08e2-11ef-ae93-51753793321f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.126
+ 100.64.95.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714695385
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60cb1dd0-08e2-11ef-ae93-51753793321f
+
+
+
diff --git a/graph/incidents_graphml/6/60cc2c70-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/60cc2c70-2d6e-11ee-86c4-f93b83b6b0bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b556a205b3ea3770b0621c69e2322f2438371364
--- /dev/null
+++ b/graph/incidents_graphml/6/60cc2c70-2d6e-11ee-86c4-f93b83b6b0bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.23
+ 100.64.62.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690566259
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60cc2c70-2d6e-11ee-86c4-f93b83b6b0bc
+
+
+
diff --git a/graph/incidents_graphml/6/60d21cc0-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/60d21cc0-5627-11ee-a521-41f4addc913f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9071bf9a609c5d7792687bfe4c12f0ca7d7813fb
--- /dev/null
+++ b/graph/incidents_graphml/6/60d21cc0-5627-11ee-a521-41f4addc913f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.31.52
+ 100.64.31.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695043762
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60d21cc0-5627-11ee-a521-41f4addc913f
+
+
+
diff --git a/graph/incidents_graphml/6/60d37cf0-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60d37cf0-ec7e-11ec-8d79-47d8ab3639ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20b1669568eeb2a501f88b695d8184b8341d114b
--- /dev/null
+++ b/graph/incidents_graphml/6/60d37cf0-ec7e-11ec-8d79-47d8ab3639ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.75
+ 100.64.78.75
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655278807
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60d37cf0-ec7e-11ec-8d79-47d8ab3639ae
+
+
+
diff --git a/graph/incidents_graphml/6/60d84ac0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/6/60d84ac0-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..602a6b8e4f87611b4be1bc35c3945e34db9103e7
--- /dev/null
+++ b/graph/incidents_graphml/6/60d84ac0-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.45
+ 100.64.47.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60d84ac0-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/6/60e56b60-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/60e56b60-5850-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f522923974f6a3d3c9aefc610b2963c8cfb5ea7
--- /dev/null
+++ b/graph/incidents_graphml/6/60e56b60-5850-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.126
+ 100.64.11.126
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695281274
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60e56b60-5850-11ee-8dda-91d41ca493d8
+
+
+ INCIDENT_LINK
+ 1695281274
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60e56b60-5850-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/6/60f66e40-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60f66e40-ec7e-11ec-8d79-47d8ab3639ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca4f75d525ffd34998342d53e901e93eb93226fd
--- /dev/null
+++ b/graph/incidents_graphml/6/60f66e40-ec7e-11ec-8d79-47d8ab3639ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.133
+ USER-0015-1621.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655278807
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60f66e40-ec7e-11ec-8d79-47d8ab3639ae
+
+
+
diff --git a/graph/incidents_graphml/6/60f71ea0-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/60f71ea0-5850-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9c5c6d3acecc5961db1332e5f39a00e67e52550
--- /dev/null
+++ b/graph/incidents_graphml/6/60f71ea0-5850-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.126
+ 100.64.11.126
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695281274
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60f71ea0-5850-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/6/60f92fc0-909e-11ee-9a83-8f2a027a2cd3.graphml b/graph/incidents_graphml/6/60f92fc0-909e-11ee-9a83-8f2a027a2cd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3359de4e36aa4fe05d064b4d84f7382a380856d
--- /dev/null
+++ b/graph/incidents_graphml/6/60f92fc0-909e-11ee-9a83-8f2a027a2cd3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.165
+ 100.64.12.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701472040
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60f92fc0-909e-11ee-9a83-8f2a027a2cd3
+
+
+
diff --git a/graph/incidents_graphml/6/60fe0430-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/60fe0430-33f8-11ee-8ffe-d166de7672c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7570f457f9e650beef9f3bcc4c6c2c9f403b3880
--- /dev/null
+++ b/graph/incidents_graphml/6/60fe0430-33f8-11ee-8ffe-d166de7672c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.174
+ 100.64.14.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691285236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60fe0430-33f8-11ee-8ffe-d166de7672c0
+
+
+
diff --git a/graph/incidents_graphml/6/60fe68c0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/60fe68c0-572b-11ee-a5b9-039463966207.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..142615897d5e43a66013a93eac51831515a10d04
--- /dev/null
+++ b/graph/incidents_graphml/6/60fe68c0-572b-11ee-a5b9-039463966207.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.37
+ 100.64.14.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695155431
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 60fe68c0-572b-11ee-a5b9-039463966207
+
+
+
diff --git a/graph/incidents_graphml/6/60fed530-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/60fed530-2d6e-11ee-86c4-f93b83b6b0bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7329c2c4fab656210057b8c3513e67fbed21064d
--- /dev/null
+++ b/graph/incidents_graphml/6/60fed530-2d6e-11ee-86c4-f93b83b6b0bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.23
+ 100.64.62.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690566259
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 60fed530-2d6e-11ee-86c4-f93b83b6b0bc
+
+
+
diff --git a/graph/incidents_graphml/6/6103b160-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/6/6103b160-3eec-11ee-a139-b35fd7c3aeb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce861e2091f844b62d598c8903c2b6f43b5dccff
--- /dev/null
+++ b/graph/incidents_graphml/6/6103b160-3eec-11ee-a139-b35fd7c3aeb6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692489545
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6103b160-3eec-11ee-a139-b35fd7c3aeb6
+
+
+
diff --git a/graph/incidents_graphml/6/6107de90-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/6107de90-075e-11ee-a67b-a9ce333dbcaf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b982767e0b1f9c907f82563260a4621b3ef98a8c
--- /dev/null
+++ b/graph/incidents_graphml/6/6107de90-075e-11ee-a67b-a9ce333dbcaf.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.66
+ 100.64.25.66
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.235
+ 100.64.72.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.203
+ 100.64.75.203
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686381243
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6107de90-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381243
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6107de90-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381243
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6107de90-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381243
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6107de90-075e-11ee-a67b-a9ce333dbcaf
+
+
+
diff --git a/graph/incidents_graphml/6/610ce7b0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/610ce7b0-572b-11ee-a5b9-039463966207.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d3e518b56301965a44ae29826425ef50f3298a64
--- /dev/null
+++ b/graph/incidents_graphml/6/610ce7b0-572b-11ee-a5b9-039463966207.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.37
+ 100.64.14.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695155431
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 610ce7b0-572b-11ee-a5b9-039463966207
+
+
+
diff --git a/graph/incidents_graphml/6/61106f40-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/61106f40-7a0b-11ee-bc21-531635bc60cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c151c8fa41086f3226058a648a518bb2e3456ef
--- /dev/null
+++ b/graph/incidents_graphml/6/61106f40-7a0b-11ee-bc21-531635bc60cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.160
+ 100.64.7.160
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698989978
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61106f40-7a0b-11ee-bc21-531635bc60cd
+
+
+
diff --git a/graph/incidents_graphml/6/61114940-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/61114940-ec7e-11ec-8d79-47d8ab3639ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d6dfe04584822cbe0f132627722827df286417c
--- /dev/null
+++ b/graph/incidents_graphml/6/61114940-ec7e-11ec-8d79-47d8ab3639ae.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.49
+ 100.64.23.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.38
+ USER-0015-1740.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655278808
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61114940-ec7e-11ec-8d79-47d8ab3639ae
+
+
+ INCIDENT_LINK
+ 1655278808
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61114940-ec7e-11ec-8d79-47d8ab3639ae
+
+
+
diff --git a/graph/incidents_graphml/6/61181d80-41e5-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/6/61181d80-41e5-11ed-ad31-51848920452c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c60b068ed8fb72434cae1e6563dc103cbd24bef
--- /dev/null
+++ b/graph/incidents_graphml/6/61181d80-41e5-11ed-ad31-51848920452c.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.219
+ 100.64.75.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.222
+ 100.64.71.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.220
+ 100.64.75.220
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.221
+ 100.64.75.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.222
+ 100.64.75.222
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1664668895
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61181d80-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668895
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61181d80-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668895
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61181d80-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668895
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61181d80-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668895
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61181d80-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668895
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61181d80-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668895
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61181d80-41e5-11ed-ad31-51848920452c
+
+
+ INCIDENT_LINK
+ 1664668895
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61181d80-41e5-11ed-ad31-51848920452c
+
+
+
diff --git a/graph/incidents_graphml/6/61186a00-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/61186a00-33f8-11ee-8ffe-d166de7672c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a87f9a2b393a3117443b0ef7aed6685e461a447
--- /dev/null
+++ b/graph/incidents_graphml/6/61186a00-33f8-11ee-8ffe-d166de7672c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.174
+ 100.64.14.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691285237
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61186a00-33f8-11ee-8ffe-d166de7672c0
+
+
+
diff --git a/graph/incidents_graphml/6/611991d0-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/611991d0-075e-11ee-a67b-a9ce333dbcaf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64eb9cc03a3f5a14243d61403fb28c0ead85b364
--- /dev/null
+++ b/graph/incidents_graphml/6/611991d0-075e-11ee-a67b-a9ce333dbcaf.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.70
+ 100.64.20.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.30
+ 100.64.74.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686381243
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 611991d0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381243
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 611991d0-075e-11ee-a67b-a9ce333dbcaf
+
+
+
diff --git a/graph/incidents_graphml/6/611e3e40-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/6/611e3e40-3eec-11ee-a139-b35fd7c3aeb6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df959e9f1aad62a776350fcfaac6d86d3d8ce680
--- /dev/null
+++ b/graph/incidents_graphml/6/611e3e40-3eec-11ee-a139-b35fd7c3aeb6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.200
+ 100.64.47.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692489545
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 611e3e40-3eec-11ee-a139-b35fd7c3aeb6
+
+
+
diff --git a/graph/incidents_graphml/6/611e4690-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/6/611e4690-f6bd-11ee-861e-3f1320280b96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ca9bfc17af5dcf93a6ad0c3611352cf6aaab94f
--- /dev/null
+++ b/graph/incidents_graphml/6/611e4690-f6bd-11ee-861e-3f1320280b96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.200
+ USER-0015-1333.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712700373
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 611e4690-f6bd-11ee-861e-3f1320280b96
+
+
+
diff --git a/graph/incidents_graphml/6/611f6810-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/6/611f6810-dcdf-11ee-9697-039b254a6d03.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6617decb6395ddfb11405d594ce1e59646a592fe
--- /dev/null
+++ b/graph/incidents_graphml/6/611f6810-dcdf-11ee-9697-039b254a6d03.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.72
+ 100.64.13.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1709856246
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 611f6810-dcdf-11ee-9697-039b254a6d03
+
+
+
diff --git a/graph/incidents_graphml/6/6120bdd0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/6120bdd0-572b-11ee-a5b9-039463966207.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f83ef7330420fd56959ec5b39ab828c3e0ff1cde
--- /dev/null
+++ b/graph/incidents_graphml/6/6120bdd0-572b-11ee-a5b9-039463966207.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.233
+ 100.64.65.233
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695155432
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 6120bdd0-572b-11ee-a5b9-039463966207
+
+
+
diff --git a/graph/incidents_graphml/6/61214e30-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/61214e30-5627-11ee-a521-41f4addc913f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9eb6c8dd00766e2e26b33ea7ca54bad6c7318c5b
--- /dev/null
+++ b/graph/incidents_graphml/6/61214e30-5627-11ee-a521-41f4addc913f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.245
+ USER-0015-1220.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.190.96.179
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695043762
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61214e30-5627-11ee-a521-41f4addc913f
+
+
+
diff --git a/graph/incidents_graphml/6/612a5200-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/612a5200-2d6e-11ee-86c4-f93b83b6b0bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..339fdacd7777a619cfc5114f83867fe69ba5218a
--- /dev/null
+++ b/graph/incidents_graphml/6/612a5200-2d6e-11ee-86c4-f93b83b6b0bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.187
+ USER-0015-1268.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690566259
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 612a5200-2d6e-11ee-86c4-f93b83b6b0bc
+
+
+
diff --git a/graph/incidents_graphml/6/61316910-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/61316910-69d6-11ee-b4c0-f17986d6e969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..671de79838db14963932b48c8cdd41311e32894a
--- /dev/null
+++ b/graph/incidents_graphml/6/61316910-69d6-11ee-b4c0-f17986d6e969.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.67
+ 100.64.38.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697207997
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61316910-69d6-11ee-b4c0-f17986d6e969
+
+
+
diff --git a/graph/incidents_graphml/6/61317ad0-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/61317ad0-5627-11ee-a521-41f4addc913f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64c1fe365e7862f5b502fe17b63b8c10c1b7a01e
--- /dev/null
+++ b/graph/incidents_graphml/6/61317ad0-5627-11ee-a521-41f4addc913f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.190.96.179
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.245
+ USER-0015-1220.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695043763
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61317ad0-5627-11ee-a521-41f4addc913f
+
+
+
diff --git a/graph/incidents_graphml/6/6134db40-1129-11ef-bb83-81e72f4f2ed0.graphml b/graph/incidents_graphml/6/6134db40-1129-11ef-bb83-81e72f4f2ed0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0568c08bb56099b252430aa8ea1af6dec7c8cbf6
--- /dev/null
+++ b/graph/incidents_graphml/6/6134db40-1129-11ef-bb83-81e72f4f2ed0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.191
+ 100.64.7.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715605489
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6134db40-1129-11ef-bb83-81e72f4f2ed0
+
+
+
diff --git a/graph/incidents_graphml/6/613717d0-ea5e-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/6/613717d0-ea5e-11ee-b380-23a0be8babf0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23b03e26c1938ff4ade6c5ae1706c3e0070e1fef
--- /dev/null
+++ b/graph/incidents_graphml/6/613717d0-ea5e-11ee-b380-23a0be8babf0.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.143
+ 100.64.39.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.144
+ 100.64.39.144
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.94
+ 100.64.25.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1711340157
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 613717d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340157
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 613717d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340157
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 613717d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340157
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 613717d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340157
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 613717d0-ea5e-11ee-b380-23a0be8babf0
+
+
+ INCIDENT_LINK
+ 1711340157
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 613717d0-ea5e-11ee-b380-23a0be8babf0
+
+
+
diff --git a/graph/incidents_graphml/6/61380bd0-f0f9-11ee-9141-97f57fdeb7f9.graphml b/graph/incidents_graphml/6/61380bd0-f0f9-11ee-9141-97f57fdeb7f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82280ef0bc9c56dc0cbaafb7a94d4f045c82cd52
--- /dev/null
+++ b/graph/incidents_graphml/6/61380bd0-f0f9-11ee-9141-97f57fdeb7f9.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.160
+ 100.64.69.160
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.42.127
+ 100.64.42.127
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1712066436
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61380bd0-f0f9-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712066436
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61380bd0-f0f9-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712066436
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61380bd0-f0f9-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712066436
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61380bd0-f0f9-11ee-9141-97f57fdeb7f9
+
+
+
diff --git a/graph/incidents_graphml/6/61396fb0-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/6/61396fb0-f6bd-11ee-861e-3f1320280b96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..903116f7605c67a6f6256ef4123013166e15271f
--- /dev/null
+++ b/graph/incidents_graphml/6/61396fb0-f6bd-11ee-861e-3f1320280b96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.200
+ USER-0015-1333.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712700373
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61396fb0-f6bd-11ee-861e-3f1320280b96
+
+
+
diff --git a/graph/incidents_graphml/6/613cc570-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/613cc570-5627-11ee-a521-41f4addc913f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..187ccfda986e2a0d98457a28760db05107a9bac8
--- /dev/null
+++ b/graph/incidents_graphml/6/613cc570-5627-11ee-a521-41f4addc913f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.68
+ USER-0015-2130.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695043763
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 613cc570-5627-11ee-a521-41f4addc913f
+
+
+
diff --git a/graph/incidents_graphml/6/614096a0-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/614096a0-ec7e-11ec-8d79-47d8ab3639ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc254eb3f59438fe1a491c9cc1d07126868934da
--- /dev/null
+++ b/graph/incidents_graphml/6/614096a0-ec7e-11ec-8d79-47d8ab3639ae.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.77
+ 100.64.78.77
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.232
+ 100.64.71.232
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.93
+ 100.64.73.93
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655278808
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 614096a0-ec7e-11ec-8d79-47d8ab3639ae
+
+
+ INCIDENT_LINK
+ 1655278808
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 614096a0-ec7e-11ec-8d79-47d8ab3639ae
+
+
+ INCIDENT_LINK
+ 1655278808
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 614096a0-ec7e-11ec-8d79-47d8ab3639ae
+
+
+ INCIDENT_LINK
+ 1655278808
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 614096a0-ec7e-11ec-8d79-47d8ab3639ae
+
+
+
diff --git a/graph/incidents_graphml/6/6141e3d0-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/6141e3d0-69d6-11ee-b4c0-f17986d6e969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..442ac962b610081b630613fad6971aa96e7de770
--- /dev/null
+++ b/graph/incidents_graphml/6/6141e3d0-69d6-11ee-b4c0-f17986d6e969.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.67
+ 100.64.38.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697207997
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6141e3d0-69d6-11ee-b4c0-f17986d6e969
+
+
+
diff --git a/graph/incidents_graphml/6/614a8110-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/614a8110-5627-11ee-a521-41f4addc913f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9c3ff1623de8335dd84538dc68bd849c84b14be
--- /dev/null
+++ b/graph/incidents_graphml/6/614a8110-5627-11ee-a521-41f4addc913f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.32.68
+ USER-0015-2130.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695043763
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 614a8110-5627-11ee-a521-41f4addc913f
+
+
+
diff --git a/graph/incidents_graphml/6/614cafd0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/614cafd0-572b-11ee-a5b9-039463966207.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40b74663ed10bce154d267f68f013ecc33370a45
--- /dev/null
+++ b/graph/incidents_graphml/6/614cafd0-572b-11ee-a5b9-039463966207.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.47
+ 100.64.7.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695155432
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614cafd0-572b-11ee-a5b9-039463966207
+
+
+
diff --git a/graph/incidents_graphml/6/614e60b0-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/614e60b0-1eaf-11ed-a2eb-f90f4aab4c31.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d435b502784b2229b375541f52e2251bfb8d867
--- /dev/null
+++ b/graph/incidents_graphml/6/614e60b0-1eaf-11ed-a2eb-f90f4aab4c31.graphml
@@ -0,0 +1,775 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.237
+ 100.64.71.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.233
+ 100.64.73.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.40
+ 100.64.1.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.69
+ 100.64.73.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.253
+ 100.64.70.253
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.96
+ 100.64.80.96
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.249
+ 100.64.73.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.243
+ 100.64.71.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.97
+ 100.64.80.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.160
+ 100.64.76.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.98
+ 100.64.80.98
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.99
+ 100.64.80.99
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.217
+ 100.64.74.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.93
+ 100.64.71.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.100
+ 100.64.80.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.63
+ USER-0015-1731.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.157
+ 100.64.71.157
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.101
+ 100.64.80.101
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.179
+ 100.64.71.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+
diff --git a/graph/incidents_graphml/6/615077a0-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/615077a0-2d6e-11ee-86c4-f93b83b6b0bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f8f6d2e5cea92ef5b5f5210273c52905013f740
--- /dev/null
+++ b/graph/incidents_graphml/6/615077a0-2d6e-11ee-86c4-f93b83b6b0bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.187
+ USER-0015-1268.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690566259
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 615077a0-2d6e-11ee-86c4-f93b83b6b0bc
+
+
+
diff --git a/graph/incidents_graphml/6/6155cbb0-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/6155cbb0-5627-11ee-a521-41f4addc913f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77c620ad6b3721b205979cbd53c550c82be91179
--- /dev/null
+++ b/graph/incidents_graphml/6/6155cbb0-5627-11ee-a521-41f4addc913f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.221
+ 100.64.13.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695043763
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6155cbb0-5627-11ee-a521-41f4addc913f
+
+
+
diff --git a/graph/incidents_graphml/6/61573700-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/61573700-452b-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b223e26b92e785beb3cdd734c71dd5f2caf9674f
--- /dev/null
+++ b/graph/incidents_graphml/6/61573700-452b-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.87
+ 100.64.27.87
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61573700-452b-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/6/615c8e50-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/615c8e50-572b-11ee-a5b9-039463966207.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..264d4dea5708d600d3c84745b6c2b9f0326bfd4d
--- /dev/null
+++ b/graph/incidents_graphml/6/615c8e50-572b-11ee-a5b9-039463966207.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.47
+ 100.64.7.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695155432
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 615c8e50-572b-11ee-a5b9-039463966207
+
+
+
diff --git a/graph/incidents_graphml/6/615de2a0-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/615de2a0-ec7e-11ec-8d79-47d8ab3639ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fbcfa30beb0c5cdcde0a5827a1ba90902f1bcd1
--- /dev/null
+++ b/graph/incidents_graphml/6/615de2a0-ec7e-11ec-8d79-47d8ab3639ae.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.85
+ 100.64.73.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.10.46
+ 100.64.10.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655278808
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 615de2a0-ec7e-11ec-8d79-47d8ab3639ae
+
+
+ INCIDENT_LINK
+ 1655278808
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 615de2a0-ec7e-11ec-8d79-47d8ab3639ae
+
+
+
diff --git a/graph/incidents_graphml/6/616ae410-dc46-11ed-a13f-b55f72705f61.graphml b/graph/incidents_graphml/6/616ae410-dc46-11ed-a13f-b55f72705f61.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f0e6de41da3c1cd95fe22f5b3a673790bdbb6a6
--- /dev/null
+++ b/graph/incidents_graphml/6/616ae410-dc46-11ed-a13f-b55f72705f61.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.7
+ 100.64.68.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Target","Exploiting Host","Ransomware Target","Ransomware Source"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ INCIDENT_LINK
+ 1681643035
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target","Ransomware Source"]
+ complete-mission
+ Unprocessed
+ 616ae410-dc46-11ed-a13f-b55f72705f61
+
+
+
diff --git a/graph/incidents_graphml/6/616b0d40-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/616b0d40-572b-11ee-a5b9-039463966207.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdc16558b8f250abb5d488ca8ea8862102ee08aa
--- /dev/null
+++ b/graph/incidents_graphml/6/616b0d40-572b-11ee-a5b9-039463966207.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.118
+ 100.64.15.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695155432
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 616b0d40-572b-11ee-a5b9-039463966207
+
+
+
diff --git a/graph/incidents_graphml/6/616d9620-ea27-11ee-9c4f-25cb7d94c0ce.graphml b/graph/incidents_graphml/6/616d9620-ea27-11ee-9c4f-25cb7d94c0ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..baaffc6e803e1fc797fd91bc31615270dc3261cf
--- /dev/null
+++ b/graph/incidents_graphml/6/616d9620-ea27-11ee-9c4f-25cb7d94c0ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.171
+ 100.64.52.171
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711316535
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 616d9620-ea27-11ee-9c4f-25cb7d94c0ce
+
+
+
diff --git a/graph/incidents_graphml/6/61725780-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/61725780-2d6e-11ee-86c4-f93b83b6b0bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cef7b35c871fc0fe8c5e723abe73f9d1540b711d
--- /dev/null
+++ b/graph/incidents_graphml/6/61725780-2d6e-11ee-86c4-f93b83b6b0bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.25
+ 100.64.62.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690566260
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61725780-2d6e-11ee-86c4-f93b83b6b0bc
+
+
+
diff --git a/graph/incidents_graphml/6/6172da90-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/6172da90-7a0b-11ee-bc21-531635bc60cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d90bfe721d64cd789b99268002c696e90f99f417
--- /dev/null
+++ b/graph/incidents_graphml/6/6172da90-7a0b-11ee-bc21-531635bc60cd.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.178
+ 100.64.11.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698989979
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6172da90-7a0b-11ee-bc21-531635bc60cd
+
+
+ INCIDENT_LINK
+ 1698989979
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6172da90-7a0b-11ee-bc21-531635bc60cd
+
+
+
diff --git a/graph/incidents_graphml/6/6178eff0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/6178eff0-572b-11ee-a5b9-039463966207.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cee710a7906bceac3bfae5a8086111070a439754
--- /dev/null
+++ b/graph/incidents_graphml/6/6178eff0-572b-11ee-a5b9-039463966207.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.118
+ 100.64.15.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695155432
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6178eff0-572b-11ee-a5b9-039463966207
+
+
+
diff --git a/graph/incidents_graphml/6/617a9260-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/617a9260-ec7e-11ec-8d79-47d8ab3639ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7dcfdfd3aafec1b8a72e28caabaaaa278e7ed04
--- /dev/null
+++ b/graph/incidents_graphml/6/617a9260-ec7e-11ec-8d79-47d8ab3639ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.189
+ USER-0015-1779.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655278808
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 617a9260-ec7e-11ec-8d79-47d8ab3639ae
+
+
+
diff --git a/graph/incidents_graphml/6/6183df60-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/6183df60-6e77-11ee-9076-51a308ac33b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d57b12070a486b28a1b9d3c19c1486ec97ada51
--- /dev/null
+++ b/graph/incidents_graphml/6/6183df60-6e77-11ee-9076-51a308ac33b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.154
+ 100.64.15.154
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697716951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6183df60-6e77-11ee-9076-51a308ac33b9
+
+
+
diff --git a/graph/incidents_graphml/6/6184fde0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/6184fde0-572b-11ee-a5b9-039463966207.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3edae8d77d73efe62bb7b8702d8afa4cf42c530
--- /dev/null
+++ b/graph/incidents_graphml/6/6184fde0-572b-11ee-a5b9-039463966207.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.109
+ 100.64.19.109
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695155432
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6184fde0-572b-11ee-a5b9-039463966207
+
+
+
diff --git a/graph/incidents_graphml/6/61852a10-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/61852a10-7a0b-11ee-bc21-531635bc60cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7276fb6ae785b06565190f63ad85393d351db5be
--- /dev/null
+++ b/graph/incidents_graphml/6/61852a10-7a0b-11ee-bc21-531635bc60cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.178
+ 100.64.11.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698989979
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 61852a10-7a0b-11ee-bc21-531635bc60cd
+
+
+
diff --git a/graph/incidents_graphml/6/6191f630-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/6191f630-572b-11ee-a5b9-039463966207.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8d2414c116a51108e9d7ee9c2cf7b305daed6af
--- /dev/null
+++ b/graph/incidents_graphml/6/6191f630-572b-11ee-a5b9-039463966207.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.109
+ 100.64.19.109
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695155432
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6191f630-572b-11ee-a5b9-039463966207
+
+
+
diff --git a/graph/incidents_graphml/6/619c5f50-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/619c5f50-5850-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b27706bd2b609909dbe05c34d6142ce59fbc622c
--- /dev/null
+++ b/graph/incidents_graphml/6/619c5f50-5850-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.45
+ 100.64.19.45
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695281275
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 619c5f50-5850-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/6/619d0cb0-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/619d0cb0-6e77-11ee-9076-51a308ac33b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2524280e607835508ea072f29c494ead5ded2100
--- /dev/null
+++ b/graph/incidents_graphml/6/619d0cb0-6e77-11ee-9076-51a308ac33b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.154
+ 100.64.15.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697716951
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 619d0cb0-6e77-11ee-9076-51a308ac33b9
+
+
+
diff --git a/graph/incidents_graphml/6/619eb100-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/619eb100-33f8-11ee-8ffe-d166de7672c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..681ba0add23c58e2156ca4a48edbe7ee3a3f8809
--- /dev/null
+++ b/graph/incidents_graphml/6/619eb100-33f8-11ee-8ffe-d166de7672c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.24
+ 100.64.41.24
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691285237
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 619eb100-33f8-11ee-8ffe-d166de7672c0
+
+
+
diff --git a/graph/incidents_graphml/6/61a15900-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/61a15900-3b5f-11ee-8185-4b4569232a9b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..263045337fd51d0e98e4b6f920d2ce1e8b2a1539
--- /dev/null
+++ b/graph/incidents_graphml/6/61a15900-3b5f-11ee-8185-4b4569232a9b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.151
+ 100.64.27.151
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692099134
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a15900-3b5f-11ee-8185-4b4569232a9b
+
+
+
diff --git a/graph/incidents_graphml/6/61a5f690-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/61a5f690-1eaf-11ed-a2eb-f90f4aab4c31.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b229ceadd57a909cbcaf1b094f64b9d89751ddd3
--- /dev/null
+++ b/graph/incidents_graphml/6/61a5f690-1eaf-11ed-a2eb-f90f4aab4c31.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.92
+ 100.64.74.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.92
+ 100.64.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.102
+ 100.64.80.102
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.19.196
+ 100.64.19.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.13
+ 100.64.74.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.45.196
+ 100.64.45.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.59
+ 100.64.1.59
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.103
+ 100.64.80.103
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.63.223
+ 100.64.63.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.75
+ 100.64.73.75
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.2.213
+ 100.64.2.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.104
+ 100.64.80.104
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.202
+ 100.64.76.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.105
+ 100.64.80.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.33
+ 100.64.11.33
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.106
+ 100.64.80.106
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.45
+ 100.64.73.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.107
+ 100.64.80.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.215
+ 100.64.72.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.108
+ 100.64.80.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.42
+ 100.64.72.42
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797412
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+
diff --git a/graph/incidents_graphml/6/61a8bab0-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/6/61a8bab0-f286-11ec-babd-d5ed2eda1ac6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be1a848a674fc6158ac44672d29ff09e56553ba4
--- /dev/null
+++ b/graph/incidents_graphml/6/61a8bab0-f286-11ec-babd-d5ed2eda1ac6.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.28
+ 100.64.1.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.158
+ 100.64.1.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.29
+ USER-0015-1894.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.104
+ 100.64.81.104
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655941951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61a8bab0-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61a8bab0-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61a8bab0-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61a8bab0-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61a8bab0-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61a8bab0-f286-11ec-babd-d5ed2eda1ac6
+
+
+
diff --git a/graph/incidents_graphml/6/61abefb0-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/61abefb0-5850-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68645e9d5dea211e3565b93f737526aeab645c99
--- /dev/null
+++ b/graph/incidents_graphml/6/61abefb0-5850-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.45
+ 100.64.19.45
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695281275
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61abefb0-5850-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/6/61ae71d0-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/61ae71d0-6e77-11ee-9076-51a308ac33b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e4215e5521acfa41c48ff5ecc706f6134b7aa66
--- /dev/null
+++ b/graph/incidents_graphml/6/61ae71d0-6e77-11ee-9076-51a308ac33b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697716951
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61ae71d0-6e77-11ee-9076-51a308ac33b9
+
+
+
diff --git a/graph/incidents_graphml/6/61b657b0-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/61b657b0-33f8-11ee-8ffe-d166de7672c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59e48df62f6bf60de051f5db75ce91766713f516
--- /dev/null
+++ b/graph/incidents_graphml/6/61b657b0-33f8-11ee-8ffe-d166de7672c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.24
+ 100.64.41.24
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691285238
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61b657b0-33f8-11ee-8ffe-d166de7672c0
+
+
+
diff --git a/graph/incidents_graphml/6/61b899e0-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/61b899e0-5850-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84bdadef629bc41a5cf61b04bcbf22186c05ed8c
--- /dev/null
+++ b/graph/incidents_graphml/6/61b899e0-5850-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.117
+ 100.64.65.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695281275
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 61b899e0-5850-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/6/61bbc550-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/61bbc550-572b-11ee-a5b9-039463966207.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c61a520c4c675fe0fb385329af6440f122a1119
--- /dev/null
+++ b/graph/incidents_graphml/6/61bbc550-572b-11ee-a5b9-039463966207.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.235
+ 100.64.65.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695155433
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61bbc550-572b-11ee-a5b9-039463966207
+
+
+
diff --git a/graph/incidents_graphml/6/61c0e860-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/61c0e860-6e77-11ee-9076-51a308ac33b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6cc69b336b163f704ecef49511952593a61852a4
--- /dev/null
+++ b/graph/incidents_graphml/6/61c0e860-6e77-11ee-9076-51a308ac33b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697716951
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61c0e860-6e77-11ee-9076-51a308ac33b9
+
+
+
diff --git a/graph/incidents_graphml/6/61c718d0-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/61c718d0-5850-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3409f094cac3ccc4d83fc284079dfb09a9ab59c1
--- /dev/null
+++ b/graph/incidents_graphml/6/61c718d0-5850-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.117
+ 100.64.65.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695281275
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61c718d0-5850-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/6/61c7a5b0-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/61c7a5b0-3b5f-11ee-8185-4b4569232a9b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86fa8cf155ea9d4f19bf8d8d18ef9c360b1e6618
--- /dev/null
+++ b/graph/incidents_graphml/6/61c7a5b0-3b5f-11ee-8185-4b4569232a9b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.151
+ 100.64.27.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692099134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 61c7a5b0-3b5f-11ee-8185-4b4569232a9b
+
+
+
diff --git a/graph/incidents_graphml/6/61ce7390-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/61ce7390-33f8-11ee-8ffe-d166de7672c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4529af169435c80168aaffda47c3d41851fde537
--- /dev/null
+++ b/graph/incidents_graphml/6/61ce7390-33f8-11ee-8ffe-d166de7672c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.26
+ 100.64.41.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691285238
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61ce7390-33f8-11ee-8ffe-d166de7672c0
+
+
+
diff --git a/graph/incidents_graphml/6/61d0f4c0-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/6/61d0f4c0-f6bd-11ee-861e-3f1320280b96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..695f1ab318d3e005fb1977f6c415573e661a8ff3
--- /dev/null
+++ b/graph/incidents_graphml/6/61d0f4c0-f6bd-11ee-861e-3f1320280b96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.166
+ 100.64.61.166
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712700374
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61d0f4c0-f6bd-11ee-861e-3f1320280b96
+
+
+
diff --git a/graph/incidents_graphml/6/61d18e40-85f1-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/6/61d18e40-85f1-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..183ab05e1ad89ad7c557129258222f1d8f97bdfe
--- /dev/null
+++ b/graph/incidents_graphml/6/61d18e40-85f1-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.187
+ 100.64.37.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700298227
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61d18e40-85f1-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/6/61d567b0-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/61d567b0-452b-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1ff21ee0083f40b038af1d8cf63efde79fdac14
--- /dev/null
+++ b/graph/incidents_graphml/6/61d567b0-452b-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.210
+ 100.64.10.210
+ ["Exploiting Target","Exploiting Host"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176312
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61d567b0-452b-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/6/61d9b5c0-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/6/61d9b5c0-f286-11ec-babd-d5ed2eda1ac6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..97593ba91f547434de613433a82682fbd5679ec5
--- /dev/null
+++ b/graph/incidents_graphml/6/61d9b5c0-f286-11ec-babd-d5ed2eda1ac6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.89
+ 100.64.13.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.235
+ 100.64.72.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655941952
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61d9b5c0-f286-11ec-babd-d5ed2eda1ac6
+
+
+ INCIDENT_LINK
+ 1655941952
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61d9b5c0-f286-11ec-babd-d5ed2eda1ac6
+
+
+
diff --git a/graph/incidents_graphml/6/61e280f0-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/6/61e280f0-f6bd-11ee-861e-3f1320280b96.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c78b5f31c188c76b0a6a5fa770e9f738b5d4ac39
--- /dev/null
+++ b/graph/incidents_graphml/6/61e280f0-f6bd-11ee-861e-3f1320280b96.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.166
+ 100.64.61.166
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712700374
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61e280f0-f6bd-11ee-861e-3f1320280b96
+
+
+
diff --git a/graph/incidents_graphml/6/61e32580-1b60-11ed-9931-5799b48b5de2.graphml b/graph/incidents_graphml/6/61e32580-1b60-11ed-9931-5799b48b5de2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..781318c0539f83b70d1673024819e6dacbeb55ae
--- /dev/null
+++ b/graph/incidents_graphml/6/61e32580-1b60-11ed-9931-5799b48b5de2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.13
+ 100.64.72.13
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660433629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61e32580-1b60-11ed-9931-5799b48b5de2
+
+
+
diff --git a/graph/incidents_graphml/6/61ecec90-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/61ecec90-7a0b-11ee-bc21-531635bc60cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3b10fa691d584451c9b06bd6961bcd26c34d4d1
--- /dev/null
+++ b/graph/incidents_graphml/6/61ecec90-7a0b-11ee-bc21-531635bc60cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.56
+ 100.64.13.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698989980
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61ecec90-7a0b-11ee-bc21-531635bc60cd
+
+
+
diff --git a/graph/incidents_graphml/6/61eeb5b0-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/61eeb5b0-3b5f-11ee-8185-4b4569232a9b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e34cce42f1baedfff0ed715b273315293a9c4f5
--- /dev/null
+++ b/graph/incidents_graphml/6/61eeb5b0-3b5f-11ee-8185-4b4569232a9b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.151
+ 100.64.27.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692099134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61eeb5b0-3b5f-11ee-8185-4b4569232a9b
+
+
+
diff --git a/graph/incidents_graphml/6/61f63970-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/61f63970-1eaf-11ed-a2eb-f90f4aab4c31.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65f17a8520fc19a06565202c0c16b21d56e75aa5
--- /dev/null
+++ b/graph/incidents_graphml/6/61f63970-1eaf-11ed-a2eb-f90f4aab4c31.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.251
+ 100.64.71.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.170
+ 100.64.72.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.13.115
+ 100.64.13.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.76
+ 100.64.74.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.109
+ 100.64.80.109
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.8.153
+ 100.64.8.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.152
+ 100.64.72.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.110
+ 100.64.80.110
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.68.216
+ 100.64.68.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.101
+ 100.64.71.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.220
+ 100.64.73.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.14.189
+ 100.64.14.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.105
+ 100.64.11.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.180
+ 100.64.71.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.111
+ 100.64.80.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.208
+ 100.64.73.208
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.146
+ 100.64.77.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.160
+ 100.64.72.160
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.33
+ 100.64.11.33
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.112
+ 100.64.80.112
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.113
+ 100.64.80.113
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.114
+ 100.64.80.114
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+ INCIDENT_LINK
+ 1660797413
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 61f63970-1eaf-11ed-a2eb-f90f4aab4c31
+
+
+
diff --git a/graph/incidents_graphml/6/61f64ef0-09b4-11ef-9ef0-737536dee9f3.graphml b/graph/incidents_graphml/6/61f64ef0-09b4-11ef-9ef0-737536dee9f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f68fd81f2dc4d9f42de77de56adf2758e3e6bdce
--- /dev/null
+++ b/graph/incidents_graphml/6/61f64ef0-09b4-11ef-9ef0-737536dee9f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.92
+ 100.64.64.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714785581
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 61f64ef0-09b4-11ef-9ef0-737536dee9f3
+
+
+
diff --git a/graph/incidents_graphml/6/61fe51b0-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/61fe51b0-7a0b-11ee-bc21-531635bc60cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8550645e5c69214375fc04560c6bd150c3ef8833
--- /dev/null
+++ b/graph/incidents_graphml/6/61fe51b0-7a0b-11ee-bc21-531635bc60cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.56
+ 100.64.13.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698989980
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 61fe51b0-7a0b-11ee-bc21-531635bc60cd
+
+
+
diff --git a/graph/incidents_graphml/6/620b9820-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/620b9820-7a0b-11ee-bc21-531635bc60cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d2d39a75bac7a2f614d5b66bea377671682b7339
--- /dev/null
+++ b/graph/incidents_graphml/6/620b9820-7a0b-11ee-bc21-531635bc60cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.89
+ 100.64.53.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698989980
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 620b9820-7a0b-11ee-bc21-531635bc60cd
+
+
+
diff --git a/graph/incidents_graphml/6/621b0170-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/621b0170-7a0b-11ee-bc21-531635bc60cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3fc1b0e5deffb0e6b5fb78de92bb46f857f83530
--- /dev/null
+++ b/graph/incidents_graphml/6/621b0170-7a0b-11ee-bc21-531635bc60cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.89
+ 100.64.53.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698989980
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 621b0170-7a0b-11ee-bc21-531635bc60cd
+
+
+
diff --git a/graph/incidents_graphml/6/621fb0c0-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/621fb0c0-3b5f-11ee-8185-4b4569232a9b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7328db1602482004582b44645e6677ef93094e02
--- /dev/null
+++ b/graph/incidents_graphml/6/621fb0c0-3b5f-11ee-8185-4b4569232a9b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.151
+ 100.64.27.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692099135
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 621fb0c0-3b5f-11ee-8185-4b4569232a9b
+
+
+
diff --git a/graph/incidents_graphml/6/623f7e50-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/6/623f7e50-140e-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a9f38fde9ac7ea3e2cc807c5831f8034eccbcfb
--- /dev/null
+++ b/graph/incidents_graphml/6/623f7e50-140e-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.202
+ 100.64.32.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.184
+ 100.64.77.184
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687776250
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 623f7e50-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776250
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 623f7e50-140e-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/6/6246a430-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/6/6246a430-4106-11ee-b538-995248355bc9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec8642c4d8a13f3ff83c61db332b8190fa7e6ea7
--- /dev/null
+++ b/graph/incidents_graphml/6/6246a430-4106-11ee-b538-995248355bc9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692720616
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6246a430-4106-11ee-b538-995248355bc9
+
+
+
diff --git a/graph/incidents_graphml/6/62498a60-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/6/62498a60-4106-11ee-b538-995248355bc9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a16e75a010d4a41548321b881084ba683988299
--- /dev/null
+++ b/graph/incidents_graphml/6/62498a60-4106-11ee-b538-995248355bc9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1692720616
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 62498a60-4106-11ee-b538-995248355bc9
+
+
+
diff --git a/graph/incidents_graphml/6/624f0490-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/624f0490-075e-11ee-a67b-a9ce333dbcaf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ca1e0de2923d2fe777a6e22cd5566290615ead0
--- /dev/null
+++ b/graph/incidents_graphml/6/624f0490-075e-11ee-a67b-a9ce333dbcaf.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.165
+ 100.64.33.165
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.104
+ HOST-13883
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.204
+ 100.64.75.204
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.205
+ 100.64.75.205
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 624f0490-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 624f0490-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 624f0490-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 624f0490-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 624f0490-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 624f0490-075e-11ee-a67b-a9ce333dbcaf
+
+
+
diff --git a/graph/incidents_graphml/6/625404f0-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/625404f0-2d6e-11ee-86c4-f93b83b6b0bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00077821926a559255639a51dc53dac662d6be63
--- /dev/null
+++ b/graph/incidents_graphml/6/625404f0-2d6e-11ee-86c4-f93b83b6b0bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.27
+ 100.64.62.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690566261
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 625404f0-2d6e-11ee-86c4-f93b83b6b0bc
+
+
+
diff --git a/graph/incidents_graphml/6/62586b50-ea27-11ee-9c4f-25cb7d94c0ce.graphml b/graph/incidents_graphml/6/62586b50-ea27-11ee-9c4f-25cb7d94c0ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..939d177a98c550c19c4583da0140ef12a840dabd
--- /dev/null
+++ b/graph/incidents_graphml/6/62586b50-ea27-11ee-9c4f-25cb7d94c0ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.173
+ 100.64.52.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711316537
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62586b50-ea27-11ee-9c4f-25cb7d94c0ce
+
+
+
diff --git a/graph/incidents_graphml/6/625f03b0-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/625f03b0-3b5f-11ee-8185-4b4569232a9b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27622a4b0264accbee98082f5ac66ff8615ef181
--- /dev/null
+++ b/graph/incidents_graphml/6/625f03b0-3b5f-11ee-8185-4b4569232a9b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.151
+ 100.64.27.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692099135
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 625f03b0-3b5f-11ee-8185-4b4569232a9b
+
+
+
diff --git a/graph/incidents_graphml/6/62668420-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/62668420-452b-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4dee60f6b6c71822c5524e169a7521a541ea9b84
--- /dev/null
+++ b/graph/incidents_graphml/6/62668420-452b-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.89
+ 100.64.27.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176313
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62668420-452b-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/6/6266d250-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/6266d250-075e-11ee-a67b-a9ce333dbcaf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34eae21be4ab10159958fd71a6044ca6fb418bfa
--- /dev/null
+++ b/graph/incidents_graphml/6/6266d250-075e-11ee-a67b-a9ce333dbcaf.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.38
+ 100.64.73.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.206
+ 100.64.75.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.207
+ 100.64.75.207
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.33.67
+ 100.64.33.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.208
+ 100.64.75.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.20.233
+ 100.64.20.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.209
+ 100.64.75.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381245
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6266d250-075e-11ee-a67b-a9ce333dbcaf
+
+
+
diff --git a/graph/incidents_graphml/6/6273d660-07d2-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/6/6273d660-07d2-11ef-8107-af8140eb4c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca6b65adf8cb8809eccf880a384cb62a650b8584
--- /dev/null
+++ b/graph/incidents_graphml/6/6273d660-07d2-11ef-8107-af8140eb4c5b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.216.82
+ 172.25.216.82
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.13
+ 100.64.87.13
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714578564
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6273d660-07d2-11ef-8107-af8140eb4c5b
+
+
+ INCIDENT_LINK
+ 1714578564
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6273d660-07d2-11ef-8107-af8140eb4c5b
+
+
+
diff --git a/graph/incidents_graphml/6/6275a460-6b40-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/6/6275a460-6b40-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9cfc244b73fa6c883bdd6a982c363d92de2cfde2
--- /dev/null
+++ b/graph/incidents_graphml/6/6275a460-6b40-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.31
+ 100.64.25.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697363476
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6275a460-6b40-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/6/6275f2b0-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/6275f2b0-7a0b-11ee-bc21-531635bc60cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e9e8d357bfd0c888b4619ad1e47bf54c5a7d262
--- /dev/null
+++ b/graph/incidents_graphml/6/6275f2b0-7a0b-11ee-bc21-531635bc60cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698989981
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6275f2b0-7a0b-11ee-bc21-531635bc60cd
+
+
+
diff --git a/graph/incidents_graphml/6/6278ac90-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/6278ac90-452b-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6cc5306166959fba97c8cf3921eeabf8aa127789
--- /dev/null
+++ b/graph/incidents_graphml/6/6278ac90-452b-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.89
+ 100.64.27.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176313
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6278ac90-452b-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/6/62849880-6b40-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/6/62849880-6b40-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32bd225d5c16fab6d1449ae93f6d21e1e8a4ced3
--- /dev/null
+++ b/graph/incidents_graphml/6/62849880-6b40-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.31
+ 100.64.25.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697363477
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 62849880-6b40-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/6/6284b1e0-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/6284b1e0-2d6e-11ee-86c4-f93b83b6b0bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2095b7380db29e5ac673a48d77a926471cf9187
--- /dev/null
+++ b/graph/incidents_graphml/6/6284b1e0-2d6e-11ee-86c4-f93b83b6b0bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.27
+ 100.64.62.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690566261
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6284b1e0-2d6e-11ee-86c4-f93b83b6b0bc
+
+
+
diff --git a/graph/incidents_graphml/6/62875290-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/62875290-452b-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d22e47bd72f1edb2d7200fe025e2400df673cbc
--- /dev/null
+++ b/graph/incidents_graphml/6/62875290-452b-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.138
+ 100.64.15.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176313
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62875290-452b-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/6/6287cd00-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/6287cd00-7a0b-11ee-bc21-531635bc60cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..464d56a545b5179b12c436e1291e45fe3c04eaf7
--- /dev/null
+++ b/graph/incidents_graphml/6/6287cd00-7a0b-11ee-bc21-531635bc60cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.226
+ 100.64.17.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698989981
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 6287cd00-7a0b-11ee-bc21-531635bc60cd
+
+
+
diff --git a/graph/incidents_graphml/6/62938130-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/62938130-3b5f-11ee-8185-4b4569232a9b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf1bedfedbda81c5b67ccf29077cbe69e042f5cb
--- /dev/null
+++ b/graph/incidents_graphml/6/62938130-3b5f-11ee-8185-4b4569232a9b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.151
+ 100.64.27.151
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692099135
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 62938130-3b5f-11ee-8185-4b4569232a9b
+
+
+
diff --git a/graph/incidents_graphml/6/6296e2f0-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/6296e2f0-452b-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..850e7cb7549041da3dd7e39fcce52f686ea8ac18
--- /dev/null
+++ b/graph/incidents_graphml/6/6296e2f0-452b-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.138
+ 100.64.15.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176313
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6296e2f0-452b-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/6/62b36010-368f-11ee-b546-fb0db7567997.graphml b/graph/incidents_graphml/6/62b36010-368f-11ee-b546-fb0db7567997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1690c3c3f5128af15ebb8b9b1914d5547641efcb
--- /dev/null
+++ b/graph/incidents_graphml/6/62b36010-368f-11ee-b546-fb0db7567997.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.6
+ 100.64.4.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691569996
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62b36010-368f-11ee-b546-fb0db7567997
+
+
+
diff --git a/graph/incidents_graphml/6/62c80a50-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/62c80a50-7a0b-11ee-bc21-531635bc60cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ceaeb6f882a42e481d0ad34de00071ad7f17a91
--- /dev/null
+++ b/graph/incidents_graphml/6/62c80a50-7a0b-11ee-bc21-531635bc60cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.132
+ 100.64.14.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698989981
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62c80a50-7a0b-11ee-bc21-531635bc60cd
+
+
+
diff --git a/graph/incidents_graphml/6/62d10e70-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/6/62d10e70-fced-11ed-ae6a-5f6768ebee7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5feff183df838807fd39e7d6e029425fcb6b49bc
--- /dev/null
+++ b/graph/incidents_graphml/6/62d10e70-fced-11ed-ae6a-5f6768ebee7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.163
+ 100.64.14.163
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685233201
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 62d10e70-fced-11ed-ae6a-5f6768ebee7b
+
+
+
diff --git a/graph/incidents_graphml/6/62d6ab00-20f7-11ed-b732-bb79295f13d0.graphml b/graph/incidents_graphml/6/62d6ab00-20f7-11ed-b732-bb79295f13d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bc7c8d7c7d5c97f94a69cae373eadcbaf4f7987
--- /dev/null
+++ b/graph/incidents_graphml/6/62d6ab00-20f7-11ed-b732-bb79295f13d0.graphml
@@ -0,0 +1,201 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.49
+ 100.64.14.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.100
+ USER-0015-1617.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.252
+ 100.64.82.252
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.253
+ 100.64.82.253
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.69
+ 100.64.73.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.254
+ 100.64.82.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661048240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62d6ab00-20f7-11ed-b732-bb79295f13d0
+
+
+ INCIDENT_LINK
+ 1661048240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62d6ab00-20f7-11ed-b732-bb79295f13d0
+
+
+ INCIDENT_LINK
+ 1661048240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62d6ab00-20f7-11ed-b732-bb79295f13d0
+
+
+ INCIDENT_LINK
+ 1661048240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62d6ab00-20f7-11ed-b732-bb79295f13d0
+
+
+ INCIDENT_LINK
+ 1661048240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62d6ab00-20f7-11ed-b732-bb79295f13d0
+
+
+ INCIDENT_LINK
+ 1661048240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62d6ab00-20f7-11ed-b732-bb79295f13d0
+
+
+ INCIDENT_LINK
+ 1661048240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62d6ab00-20f7-11ed-b732-bb79295f13d0
+
+
+ INCIDENT_LINK
+ 1661048240
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 62d6ab00-20f7-11ed-b732-bb79295f13d0
+
+
+
diff --git a/graph/incidents_graphml/6/62e011b0-a5a6-11ee-8971-634a5f7f6016.graphml b/graph/incidents_graphml/6/62e011b0-a5a6-11ee-8971-634a5f7f6016.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa6ec732defac13f8b5712f318c65a8411d14928
--- /dev/null
+++ b/graph/incidents_graphml/6/62e011b0-a5a6-11ee-8971-634a5f7f6016.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.168
+ 100.64.30.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703784453
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 62e011b0-a5a6-11ee-8971-634a5f7f6016
+
+
+
diff --git a/graph/incidents_graphml/6/62e0b1a0-368f-11ee-b546-fb0db7567997.graphml b/graph/incidents_graphml/6/62e0b1a0-368f-11ee-b546-fb0db7567997.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbc18a702ff84dbd0b451b205e6fe21edd4ba2fc
--- /dev/null
+++ b/graph/incidents_graphml/6/62e0b1a0-368f-11ee-b546-fb0db7567997.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.6
+ 100.64.4.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691569996
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 62e0b1a0-368f-11ee-b546-fb0db7567997
+
+
+
diff --git a/graph/incidents_graphml/6/62e5df30-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/6/62e5df30-4bd6-11ed-a7c5-958e7a84b2a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..089b75d66cdd85f7b7b8e0a5b580967ab880e16d
--- /dev/null
+++ b/graph/incidents_graphml/6/62e5df30-4bd6-11ed-a7c5-958e7a84b2a2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.184.1
+ 192.168.184.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.35
+ 100.64.77.35
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1665761967
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 62e5df30-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+ INCIDENT_LINK
+ 1665761967
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 62e5df30-4bd6-11ed-a7c5-958e7a84b2a2
+
+
+
diff --git a/graph/incidents_graphml/6/62ee0c50-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/6/62ee0c50-fced-11ed-ae6a-5f6768ebee7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d4d050f64c77b53d5c04dacd00096a9bfc9f16a
--- /dev/null
+++ b/graph/incidents_graphml/6/62ee0c50-fced-11ed-ae6a-5f6768ebee7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.163
+ 100.64.14.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685233201
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 62ee0c50-fced-11ed-ae6a-5f6768ebee7b
+
+
+
diff --git a/graph/incidents_graphml/6/63030330-ea27-11ee-9c4f-25cb7d94c0ce.graphml b/graph/incidents_graphml/6/63030330-ea27-11ee-9c4f-25cb7d94c0ce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c42fa2df1e4268cf63799bbe250da886fc29c2da
--- /dev/null
+++ b/graph/incidents_graphml/6/63030330-ea27-11ee-9c4f-25cb7d94c0ce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.175
+ 100.64.52.175
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1711316538
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 63030330-ea27-11ee-9c4f-25cb7d94c0ce
+
+
+
diff --git a/graph/incidents_graphml/6/631aa2a0-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/6/631aa2a0-22e1-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a48848a6d2069792424357d284c4374a659096a3
--- /dev/null
+++ b/graph/incidents_graphml/6/631aa2a0-22e1-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.11
+ 100.64.33.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689406192
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 631aa2a0-22e1-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/6/631dc630-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/631dc630-452b-11ee-8fcc-0fb1848fa316.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..157a4332c799eef17a6421b84f8026a340c469f1
--- /dev/null
+++ b/graph/incidents_graphml/6/631dc630-452b-11ee-8fcc-0fb1848fa316.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.157
+ 100.64.14.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693176314
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 631dc630-452b-11ee-8fcc-0fb1848fa316
+
+
+
diff --git a/graph/incidents_graphml/6/6322fb60-6b40-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/6/6322fb60-6b40-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6fcfaa05cb35c06f61990705519ba762b3f9e16
--- /dev/null
+++ b/graph/incidents_graphml/6/6322fb60-6b40-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.114
+ 100.64.8.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697363478
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 6322fb60-6b40-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/6/633ab4d0-a5a6-11ee-8971-634a5f7f6016.graphml b/graph/incidents_graphml/6/633ab4d0-a5a6-11ee-8971-634a5f7f6016.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4134e190765b74603df4c130e46d93334b9a392d
--- /dev/null
+++ b/graph/incidents_graphml/6/633ab4d0-a5a6-11ee-8971-634a5f7f6016.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.6
+ 100.64.47.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703784454
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 633ab4d0-a5a6-11ee-8971-634a5f7f6016
+
+
+ INCIDENT_LINK
+ 1703784454
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 633ab4d0-a5a6-11ee-8971-634a5f7f6016
+
+
+
diff --git a/graph/incidents_graphml/6/63413d70-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/6/63413d70-22e1-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9b511063fe31069ef5ce0ad1d4c574824ee94ba
--- /dev/null
+++ b/graph/incidents_graphml/6/63413d70-22e1-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.11
+ 100.64.33.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689406192
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 63413d70-22e1-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/6/63437690-20f7-11ed-b732-bb79295f13d0.graphml b/graph/incidents_graphml/6/63437690-20f7-11ed-b732-bb79295f13d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0dfcee5f23c4b0990b2d521d34140609d4b93ad5
--- /dev/null
+++ b/graph/incidents_graphml/6/63437690-20f7-11ed-b732-bb79295f13d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.255
+ 100.64.82.255
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.238
+ 100.64.71.238
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661048241
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 63437690-20f7-11ed-b732-bb79295f13d0
+
+
+
diff --git a/graph/incidents_graphml/6/63437bb0-6b40-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/6/63437bb0-6b40-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58fb1d0ef8112e071f9f180ff83ec5311546031e
--- /dev/null
+++ b/graph/incidents_graphml/6/63437bb0-6b40-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.88
+ 100.64.15.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697363478
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 63437bb0-6b40-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/6/63449820-043d-11ee-8693-9b63b760243c.graphml b/graph/incidents_graphml/6/63449820-043d-11ee-8693-9b63b760243c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5528a139bda6f2294802c9a049bb7e1188392dd9
--- /dev/null
+++ b/graph/incidents_graphml/6/63449820-043d-11ee-8693-9b63b760243c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.140
+ 100.64.26.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.2
+ 100.64.71.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1686037220
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63449820-043d-11ee-8693-9b63b760243c
+
+
+ INCIDENT_LINK
+ 1686037220
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63449820-043d-11ee-8693-9b63b760243c
+
+
+
diff --git a/graph/incidents_graphml/6/63478610-a5a6-11ee-8971-634a5f7f6016.graphml b/graph/incidents_graphml/6/63478610-a5a6-11ee-8971-634a5f7f6016.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a53f6906207949464bd67b0ed426777ca82fefc8
--- /dev/null
+++ b/graph/incidents_graphml/6/63478610-a5a6-11ee-8971-634a5f7f6016.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.6
+ 100.64.47.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703784454
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 63478610-a5a6-11ee-8971-634a5f7f6016
+
+
+
diff --git a/graph/incidents_graphml/6/63491be0-20f7-11ed-b732-bb79295f13d0.graphml b/graph/incidents_graphml/6/63491be0-20f7-11ed-b732-bb79295f13d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fade2bd6c01f2a1929cca045466cd3d9eb68af15
--- /dev/null
+++ b/graph/incidents_graphml/6/63491be0-20f7-11ed-b732-bb79295f13d0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.238
+ 100.64.71.238
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.255
+ 100.64.82.255
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661048241
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 63491be0-20f7-11ed-b732-bb79295f13d0
+
+
+
diff --git a/graph/incidents_graphml/6/63522550-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/6/63522550-0228-11ef-b1dd-bbcb3e283d29.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eba058a434f416973f7456e81d5f4ddb03548bb8
--- /dev/null
+++ b/graph/incidents_graphml/6/63522550-0228-11ef-b1dd-bbcb3e283d29.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.180
+ 100.64.24.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713955796
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63522550-0228-11ef-b1dd-bbcb3e283d29
+
+
+
diff --git a/graph/incidents_graphml/6/635345e0-a5a6-11ee-8971-634a5f7f6016.graphml b/graph/incidents_graphml/6/635345e0-a5a6-11ee-8971-634a5f7f6016.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f48d5ecc7503c1735b42516d06489ff13207665
--- /dev/null
+++ b/graph/incidents_graphml/6/635345e0-a5a6-11ee-8971-634a5f7f6016.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.160
+ 100.64.61.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703784454
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 635345e0-a5a6-11ee-8971-634a5f7f6016
+
+
+
diff --git a/graph/incidents_graphml/6/63567650-589b-11ee-9d9b-1fd1aea7c056.graphml b/graph/incidents_graphml/6/63567650-589b-11ee-9d9b-1fd1aea7c056.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be44b0f6152a83ba0cc6ea209e0ca60691dabf46
--- /dev/null
+++ b/graph/incidents_graphml/6/63567650-589b-11ee-9d9b-1fd1aea7c056.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.44
+ 100.64.20.44
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695313490
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 63567650-589b-11ee-9d9b-1fd1aea7c056
+
+
+
diff --git a/graph/incidents_graphml/6/6358bc60-043d-11ee-8693-9b63b760243c.graphml b/graph/incidents_graphml/6/6358bc60-043d-11ee-8693-9b63b760243c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50f171a7a20798096aad6c1dcf0a0bfa529ced04
--- /dev/null
+++ b/graph/incidents_graphml/6/6358bc60-043d-11ee-8693-9b63b760243c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.192
+ 100.64.77.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.157
+ 100.64.78.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1686037220
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6358bc60-043d-11ee-8693-9b63b760243c
+
+
+ INCIDENT_LINK
+ 1686037220
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6358bc60-043d-11ee-8693-9b63b760243c
+
+
+
diff --git a/graph/incidents_graphml/6/636ab660-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/6/636ab660-0228-11ef-b1dd-bbcb3e283d29.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8641390b07220a50fd7dff66966f5774fb17d903
--- /dev/null
+++ b/graph/incidents_graphml/6/636ab660-0228-11ef-b1dd-bbcb3e283d29.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.180
+ 100.64.24.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713955796
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 636ab660-0228-11ef-b1dd-bbcb3e283d29
+
+
+
diff --git a/graph/incidents_graphml/6/6376ec40-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/6376ec40-69d6-11ee-b4c0-f17986d6e969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69ed0258ad547eaa0c305c7ba03df968bba7a9c2
--- /dev/null
+++ b/graph/incidents_graphml/6/6376ec40-69d6-11ee-b4c0-f17986d6e969.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.69
+ 100.64.38.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697208000
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6376ec40-69d6-11ee-b4c0-f17986d6e969
+
+
+
diff --git a/graph/incidents_graphml/6/6376f6a0-589b-11ee-9d9b-1fd1aea7c056.graphml b/graph/incidents_graphml/6/6376f6a0-589b-11ee-9d9b-1fd1aea7c056.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e0951e3984f7fdec43ba79af17ed38ccab368d4
--- /dev/null
+++ b/graph/incidents_graphml/6/6376f6a0-589b-11ee-9d9b-1fd1aea7c056.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.70
+ USER-0015-1460.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695313490
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6376f6a0-589b-11ee-9d9b-1fd1aea7c056
+
+
+
diff --git a/graph/incidents_graphml/6/638199c0-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/6/638199c0-0228-11ef-b1dd-bbcb3e283d29.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc0778b04df233d2f03fd6fa3d1e6aff050348e6
--- /dev/null
+++ b/graph/incidents_graphml/6/638199c0-0228-11ef-b1dd-bbcb3e283d29.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.182
+ 100.64.24.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713955796
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 638199c0-0228-11ef-b1dd-bbcb3e283d29
+
+
+
diff --git a/graph/incidents_graphml/6/638eaaa0-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/6/638eaaa0-08e2-11ef-ae93-51753793321f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb972331b2dbcd226c1e37a719a13cb7f48f8dcc
--- /dev/null
+++ b/graph/incidents_graphml/6/638eaaa0-08e2-11ef-ae93-51753793321f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.46.208
+ 172.16.46.208
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.128
+ 100.64.95.128
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1714695389
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 638eaaa0-08e2-11ef-ae93-51753793321f
+
+
+
diff --git a/graph/incidents_graphml/6/6391ae70-a5a6-11ee-8971-634a5f7f6016.graphml b/graph/incidents_graphml/6/6391ae70-a5a6-11ee-8971-634a5f7f6016.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8c142d044f2dbfab884e9d86625f48db97c37839
--- /dev/null
+++ b/graph/incidents_graphml/6/6391ae70-a5a6-11ee-8971-634a5f7f6016.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.40
+ 100.64.43.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703784454
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 6391ae70-a5a6-11ee-8971-634a5f7f6016
+
+
+
diff --git a/graph/incidents_graphml/6/63c12010-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/63c12010-83be-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..557a20c1cde03c1c592ea0e4da6a869cf0a38d94
--- /dev/null
+++ b/graph/incidents_graphml/6/63c12010-83be-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.193
+ 100.64.12.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056423
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 63c12010-83be-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/6/63c2c470-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/63c2c470-ff3d-11ed-97b1-dfa052c79ac3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11dda455e6d0826a2b2d81140d6e94c7ab34d3c0
--- /dev/null
+++ b/graph/incidents_graphml/6/63c2c470-ff3d-11ed-97b1-dfa052c79ac3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.118
+ 100.64.42.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685487465
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63c2c470-ff3d-11ed-97b1-dfa052c79ac3
+
+
+
diff --git a/graph/incidents_graphml/6/63ca7980-4863-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/6/63ca7980-4863-11ee-a737-6b545b426b37.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6376f5e3611594d468559cfa0e4458185c1a946c
--- /dev/null
+++ b/graph/incidents_graphml/6/63ca7980-4863-11ee-a737-6b545b426b37.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.165
+ 100.64.10.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693530220
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 63ca7980-4863-11ee-a737-6b545b426b37
+
+
+
diff --git a/graph/incidents_graphml/6/63d2ac40-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/63d2ac40-83be-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36c74594aa9874a7640674808494b2356ac446a8
--- /dev/null
+++ b/graph/incidents_graphml/6/63d2ac40-83be-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.216
+ HOST-4306
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056423
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 63d2ac40-83be-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/6/63e019c0-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/63e019c0-83be-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18c7c3cedb49491af9305357b99aff363a5ab511
--- /dev/null
+++ b/graph/incidents_graphml/6/63e019c0-83be-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.216
+ HOST-4306
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056423
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 63e019c0-83be-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/6/63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7.graphml b/graph/incidents_graphml/6/63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a17e9bb9946991adfaada411bc9d9a799c5cb60a
--- /dev/null
+++ b/graph/incidents_graphml/6/63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7.graphml
@@ -0,0 +1,531 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.221
+ USER-0015-1293.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.221
+ 100.64.39.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.222
+ 100.64.39.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.51
+ 100.64.29.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.62
+ 100.64.29.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.223
+ 100.64.39.223
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.91
+ 100.64.30.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.17
+ 100.64.28.17
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.224
+ 100.64.39.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.203
+ 100.64.7.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.225
+ 100.64.39.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.125
+ 100.64.6.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+
diff --git a/graph/incidents_graphml/6/63f7f9a0-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/63f7f9a0-075e-11ee-a67b-a9ce333dbcaf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71dcf14669aa51ff2939698da57249a8de82354e
--- /dev/null
+++ b/graph/incidents_graphml/6/63f7f9a0-075e-11ee-a67b-a9ce333dbcaf.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.157
+ 100.64.14.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.128
+ 100.64.71.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.55.3
+ 100.64.55.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686381248
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63f7f9a0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381248
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63f7f9a0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381248
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63f7f9a0-075e-11ee-a67b-a9ce333dbcaf
+
+
+ INCIDENT_LINK
+ 1686381248
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 63f7f9a0-075e-11ee-a67b-a9ce333dbcaf
+
+
+
diff --git a/graph/incidents_graphml/6/63f8efa0-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/63f8efa0-ff3d-11ed-97b1-dfa052c79ac3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f548b424cc4ae6562b43c759ea9c76622b39ecf2
--- /dev/null
+++ b/graph/incidents_graphml/6/63f8efa0-ff3d-11ed-97b1-dfa052c79ac3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.120
+ 100.64.42.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685487465
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 63f8efa0-ff3d-11ed-97b1-dfa052c79ac3
+
+
+
diff --git a/graph/incidents_graphml/6/64019f80-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/64019f80-5850-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eee3718d54836b656c8eb56a1173f04c2e767bf2
--- /dev/null
+++ b/graph/incidents_graphml/6/64019f80-5850-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.43
+ 100.64.19.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695281279
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 64019f80-5850-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/6/640ad340-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/640ad340-83be-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..417e35869499a47fb82ee07aa0af0cc0d1d653b8
--- /dev/null
+++ b/graph/incidents_graphml/6/640ad340-83be-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.63
+ 100.64.50.63
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 640ad340-83be-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/6/640f6c10-c84e-11ed-9476-bf08a649e623.graphml b/graph/incidents_graphml/6/640f6c10-c84e-11ed-9476-bf08a649e623.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3fb07dd4dbfa9dc741be0a9a48efb19c32289ac4
--- /dev/null
+++ b/graph/incidents_graphml/6/640f6c10-c84e-11ed-9476-bf08a649e623.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.7.183
+ 172.18.7.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"]
+
+
+ HOST
+ 100.64.1.138
+ 100.64.1.138
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.239
+ 100.64.87.239
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1679447453
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 640f6c10-c84e-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447453
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 640f6c10-c84e-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447453
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 640f6c10-c84e-11ed-9476-bf08a649e623
+
+
+ INCIDENT_LINK
+ 1679447453
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 640f6c10-c84e-11ed-9476-bf08a649e623
+
+
+
diff --git a/graph/incidents_graphml/6/6410adc0-72f6-11ee-8b7a-61395a0def43.graphml b/graph/incidents_graphml/6/6410adc0-72f6-11ee-8b7a-61395a0def43.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc2230ce6900def457b3402ffbd4838685a17487
--- /dev/null
+++ b/graph/incidents_graphml/6/6410adc0-72f6-11ee-8b7a-61395a0def43.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.217
+ 100.64.12.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698211306
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6410adc0-72f6-11ee-8b7a-61395a0def43
+
+
+
diff --git a/graph/incidents_graphml/6/64152780-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/64152780-5850-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f43d04e08a830a419802500d30443266b156f78
--- /dev/null
+++ b/graph/incidents_graphml/6/64152780-5850-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.43
+ 100.64.19.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695281279
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 64152780-5850-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/6/641ca440-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/641ca440-ff3d-11ed-97b1-dfa052c79ac3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e4eb1bc08673f39639399084ac740fc63192f06
--- /dev/null
+++ b/graph/incidents_graphml/6/641ca440-ff3d-11ed-97b1-dfa052c79ac3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.42.120
+ 100.64.42.120
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685487465
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 641ca440-ff3d-11ed-97b1-dfa052c79ac3
+
+
+
diff --git a/graph/incidents_graphml/6/6421c4c0-72f6-11ee-8b7a-61395a0def43.graphml b/graph/incidents_graphml/6/6421c4c0-72f6-11ee-8b7a-61395a0def43.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e67e66b8c08ba3223358ad4b80688bfe61cb823a
--- /dev/null
+++ b/graph/incidents_graphml/6/6421c4c0-72f6-11ee-8b7a-61395a0def43.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.217
+ 100.64.12.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698211306
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6421c4c0-72f6-11ee-8b7a-61395a0def43
+
+
+
diff --git a/graph/incidents_graphml/6/64263e80-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/64263e80-5850-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8f80fc6fbd7b75539c73d5fa4248ae8ef8f7035
--- /dev/null
+++ b/graph/incidents_graphml/6/64263e80-5850-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.43
+ 100.64.19.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695281279
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 64263e80-5850-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/6/642f4b30-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/642f4b30-83be-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67ac93655f6b15ee30b50dd323090973a2b1974b
--- /dev/null
+++ b/graph/incidents_graphml/6/642f4b30-83be-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.65
+ 100.64.50.65
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 642f4b30-83be-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/6/6436e050-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/6436e050-5850-11ee-8dda-91d41ca493d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca8706bc6bea1c9bb25b8774f0c7a2eef0ae0c6f
--- /dev/null
+++ b/graph/incidents_graphml/6/6436e050-5850-11ee-8dda-91d41ca493d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.126
+ 100.64.11.126
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695281279
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6436e050-5850-11ee-8dda-91d41ca493d8
+
+
+
diff --git a/graph/incidents_graphml/6/64381b80-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/64381b80-ff3d-11ed-97b1-dfa052c79ac3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a56fc8dc7f1d88e039f3d38b8e155df1064183e4
--- /dev/null
+++ b/graph/incidents_graphml/6/64381b80-ff3d-11ed-97b1-dfa052c79ac3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685487465
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 64381b80-ff3d-11ed-97b1-dfa052c79ac3
+
+
+
diff --git a/graph/incidents_graphml/6/643a9330-3662-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/6/643a9330-3662-11ef-b33d-111abc4c57da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af914f4c723f475004c6291caff71b2550c54623
--- /dev/null
+++ b/graph/incidents_graphml/6/643a9330-3662-11ef-b33d-111abc4c57da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.108
+ 100.64.8.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719698168
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 643a9330-3662-11ef-b33d-111abc4c57da
+
+
+
diff --git a/graph/incidents_graphml/6/643d54f0-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/643d54f0-83be-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..381dc32c85ca68c16be242ba011372bed325f005
--- /dev/null
+++ b/graph/incidents_graphml/6/643d54f0-83be-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.65
+ 100.64.50.65
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 643d54f0-83be-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/6/643e2bf0-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/6/643e2bf0-de41-11ed-8036-d144f5e7f2f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f199241be945cd144a1879f0faf6ef7c7522463
--- /dev/null
+++ b/graph/incidents_graphml/6/643e2bf0-de41-11ed-8036-d144f5e7f2f2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.240
+ HOST-13123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.14.148
+ 100.64.14.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1681860795
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 643e2bf0-de41-11ed-8036-d144f5e7f2f2
+
+
+
diff --git a/graph/incidents_graphml/6/6447a970-faeb-11ed-a275-17f0ef22ba49.graphml b/graph/incidents_graphml/6/6447a970-faeb-11ed-a275-17f0ef22ba49.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7221e930260d6175b41a40431790c376596a0f16
--- /dev/null
+++ b/graph/incidents_graphml/6/6447a970-faeb-11ed-a275-17f0ef22ba49.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.203
+ 100.64.7.203
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","Azure Security","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.151
+ 100.64.69.151
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.51.248
+ 100.64.51.248
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685012442
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 6447a970-faeb-11ed-a275-17f0ef22ba49
+
+
+ INCIDENT_LINK
+ 1685012442
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 6447a970-faeb-11ed-a275-17f0ef22ba49
+
+
+ INCIDENT_LINK
+ 1685012442
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 6447a970-faeb-11ed-a275-17f0ef22ba49
+
+
+ INCIDENT_LINK
+ 1685012442
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 6447a970-faeb-11ed-a275-17f0ef22ba49
+
+
+ INCIDENT_LINK
+ 1685012442
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 6447a970-faeb-11ed-a275-17f0ef22ba49
+
+
+ INCIDENT_LINK
+ 1685012442
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 6447a970-faeb-11ed-a275-17f0ef22ba49
+
+
+ INCIDENT_LINK
+ 1685012442
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 6447a970-faeb-11ed-a275-17f0ef22ba49
+
+
+ INCIDENT_LINK
+ 1685012442
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ 6447a970-faeb-11ed-a275-17f0ef22ba49
+
+
+
diff --git a/graph/incidents_graphml/6/6449b100-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/6449b100-83be-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..920fd59eced813302463814aa477ebcd3041ca7b
--- /dev/null
+++ b/graph/incidents_graphml/6/6449b100-83be-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,239 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.143
+ 100.64.26.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6449b100-83be-11ee-b40b-bf8e12a3a664
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6449b100-83be-11ee-b40b-bf8e12a3a664
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6449b100-83be-11ee-b40b-bf8e12a3a664
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6449b100-83be-11ee-b40b-bf8e12a3a664
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6449b100-83be-11ee-b40b-bf8e12a3a664
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6449b100-83be-11ee-b40b-bf8e12a3a664
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6449b100-83be-11ee-b40b-bf8e12a3a664
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6449b100-83be-11ee-b40b-bf8e12a3a664
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6449b100-83be-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/6/644f2ca0-3662-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/6/644f2ca0-3662-11ef-b33d-111abc4c57da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c603a9bbbefcb85ff24fd0e33313e90efa33af70
--- /dev/null
+++ b/graph/incidents_graphml/6/644f2ca0-3662-11ef-b33d-111abc4c57da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.108
+ 100.64.8.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719698169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 644f2ca0-3662-11ef-b33d-111abc4c57da
+
+
+
diff --git a/graph/incidents_graphml/6/64500e30-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/64500e30-69d6-11ee-b4c0-f17986d6e969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..833a6f1334f4eddd39e9f7f9724063f2a7a12683
--- /dev/null
+++ b/graph/incidents_graphml/6/64500e30-69d6-11ee-b4c0-f17986d6e969.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.71
+ 100.64.38.71
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697208002
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 64500e30-69d6-11ee-b4c0-f17986d6e969
+
+
+
diff --git a/graph/incidents_graphml/6/645342b0-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/6/645342b0-624f-11ed-93f8-4552f33ca5e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b578310b81abc93e01ff4c546c1c7557c54d95e0
--- /dev/null
+++ b/graph/incidents_graphml/6/645342b0-624f-11ed-93f8-4552f33ca5e0.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.130
+ 100.64.83.130
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.146.99.50
+ 10.146.99.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.131
+ 100.64.83.131
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.132
+ 100.64.83.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.80.196
+ 100.64.80.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.83
+ 100.64.83.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.133
+ 100.64.83.133
+ ["Exploiting Target"]
+ 0.8875
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.55.189
+ 100.64.55.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.18.227
+ 100.64.18.227
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.134
+ 100.64.83.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.135
+ 100.64.83.135
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.9.46
+ 100.64.9.46
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.69.2
+ 100.64.69.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.12.246
+ 100.64.12.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.71.226
+ 100.64.71.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.136
+ 100.64.83.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.39.27
+ 100.64.39.27
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.39.13
+ 100.64.39.13
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.137
+ 100.64.83.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.115
+ 100.64.83.115
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.138
+ 100.64.83.138
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+ INCIDENT_LINK
+ 1668232864
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645342b0-624f-11ed-93f8-4552f33ca5e0
+
+
+
diff --git a/graph/incidents_graphml/6/645407f0-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/645407f0-ff3d-11ed-97b1-dfa052c79ac3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..14eaf405d95b800184be230ea07ed8f83c178331
--- /dev/null
+++ b/graph/incidents_graphml/6/645407f0-ff3d-11ed-97b1-dfa052c79ac3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685487466
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 645407f0-ff3d-11ed-97b1-dfa052c79ac3
+
+
+
diff --git a/graph/incidents_graphml/6/6455e600-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/6455e600-83be-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f82d1778c73897ff1f007d1c9b0dcbedb4ebcec
--- /dev/null
+++ b/graph/incidents_graphml/6/6455e600-83be-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.143
+ 100.64.26.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 6455e600-83be-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/6/6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7.graphml b/graph/incidents_graphml/6/6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..875de1c8ae501a73d8e2b395e5034c7210a5c0a2
--- /dev/null
+++ b/graph/incidents_graphml/6/6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.231
+ 100.64.39.231
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.232
+ 100.64.39.232
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+
diff --git a/graph/incidents_graphml/6/64577850-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/64577850-3b5f-11ee-8185-4b4569232a9b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3703c492d9de72d5172855dc6e71b3b24c909a39
--- /dev/null
+++ b/graph/incidents_graphml/6/64577850-3b5f-11ee-8185-4b4569232a9b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.153
+ 100.64.27.153
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692099138
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 64577850-3b5f-11ee-8185-4b4569232a9b
+
+
+
diff --git a/graph/incidents_graphml/6/645d8310-36e7-11ef-997a-f7dc07e23a4a.graphml b/graph/incidents_graphml/6/645d8310-36e7-11ef-997a-f7dc07e23a4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea0c2a657d19d22519fbc7663a0bc4be5476ad3f
--- /dev/null
+++ b/graph/incidents_graphml/6/645d8310-36e7-11ef-997a-f7dc07e23a4a.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.177
+ 100.64.86.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.178
+ 100.64.86.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.179
+ 100.64.86.179
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.60
+ 100.64.41.60
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719755292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645d8310-36e7-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645d8310-36e7-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645d8310-36e7-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645d8310-36e7-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645d8310-36e7-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645d8310-36e7-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645d8310-36e7-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755292
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 645d8310-36e7-11ef-997a-f7dc07e23a4a
+
+
+
diff --git a/graph/incidents_graphml/6/645f7780-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/645f7780-69d6-11ee-b4c0-f17986d6e969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1dad737a7a1ba930c99995cad6209b131484d6fd
--- /dev/null
+++ b/graph/incidents_graphml/6/645f7780-69d6-11ee-b4c0-f17986d6e969.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.71
+ 100.64.38.71
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697208002
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 645f7780-69d6-11ee-b4c0-f17986d6e969
+
+
+
diff --git a/graph/incidents_graphml/6/64629030-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/64629030-83be-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17a8ab34b7e52d91cd87ecabbfb5116af8333cfb
--- /dev/null
+++ b/graph/incidents_graphml/6/64629030-83be-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.71
+ 100.64.50.71
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 64629030-83be-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/6/6463c610-3662-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/6/6463c610-3662-11ef-b33d-111abc4c57da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94a3c4c5268a165c0f2e6c5e1137dc8b4b8845cb
--- /dev/null
+++ b/graph/incidents_graphml/6/6463c610-3662-11ef-b33d-111abc4c57da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.174
+ 100.64.8.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719698169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6463c610-3662-11ef-b33d-111abc4c57da
+
+
+
diff --git a/graph/incidents_graphml/6/646ac950-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/6/646ac950-22e1-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c10561dba137f24c215306be00b89862e217eaf3
--- /dev/null
+++ b/graph/incidents_graphml/6/646ac950-22e1-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.123
+ USER-0015-1429.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689406194
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 646ac950-22e1-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/6/646c5720-0a4f-11ee-8254-9ff4ea1b8ad7.graphml b/graph/incidents_graphml/6/646c5720-0a4f-11ee-8254-9ff4ea1b8ad7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5e4574137ca9ae88f9d9791ffa71cd730a4ceee
--- /dev/null
+++ b/graph/incidents_graphml/6/646c5720-0a4f-11ee-8254-9ff4ea1b8ad7.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.235
+ 100.64.39.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.236
+ 100.64.39.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.83
+ 100.64.11.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704659
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7
+
+
+
diff --git a/graph/incidents_graphml/6/6471ee10-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/6471ee10-69d6-11ee-b4c0-f17986d6e969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..453e76411037434268db35542ae47956767d0fb7
--- /dev/null
+++ b/graph/incidents_graphml/6/6471ee10-69d6-11ee-b4c0-f17986d6e969.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.168
+ 100.64.35.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697208002
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6471ee10-69d6-11ee-b4c0-f17986d6e969
+
+
+
diff --git a/graph/incidents_graphml/6/647f5ab0-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/6/647f5ab0-fced-11ed-ae6a-5f6768ebee7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8431d5b1d216a71eabe35f0c8d7c48ccc1b17c70
--- /dev/null
+++ b/graph/incidents_graphml/6/647f5ab0-fced-11ed-ae6a-5f6768ebee7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.61
+ 100.64.34.61
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685233204
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 647f5ab0-fced-11ed-ae6a-5f6768ebee7b
+
+
+
diff --git a/graph/incidents_graphml/6/6485ddc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/6/6485ddc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..582f9fcb007393b0f5eaa0b1a192c573efba7d56
--- /dev/null
+++ b/graph/incidents_graphml/6/6485ddc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.115
+ USER-0015-1970.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1673515244
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 6485ddc0-925a-11ed-bd3d-c1cfbb0dc4f8
+
+
+
diff --git a/graph/incidents_graphml/6/6488eb00-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/6/6488eb00-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29c4763876dc29c565383b961920c58b7b2ee16f
--- /dev/null
+++ b/graph/incidents_graphml/6/6488eb00-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.115
+ USER-0015-1970.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673515244
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 6488eb00-925a-11ed-bd3d-c1cfbb0dc4f8
+
+
+
diff --git a/graph/incidents_graphml/6/648abfc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/6/648abfc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..628ab1740539d1ae473d42d6471faa3eb867ddcd
--- /dev/null
+++ b/graph/incidents_graphml/6/648abfc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.50
+ 100.64.24.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1673515244
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 648abfc0-925a-11ed-bd3d-c1cfbb0dc4f8
+
+
+
diff --git a/graph/incidents_graphml/6/648d7ee0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/6/648d7ee0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55e4069dd14e4dd87d305fc9b14a9f340a66b66c
--- /dev/null
+++ b/graph/incidents_graphml/6/648d7ee0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.24.50
+ 100.64.24.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673515245
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 648d7ee0-925a-11ed-bd3d-c1cfbb0dc4f8
+
+
+
diff --git a/graph/incidents_graphml/6/649b3f90-9641-11ed-88e6-1908ce0c8a06.graphml b/graph/incidents_graphml/6/649b3f90-9641-11ed-88e6-1908ce0c8a06.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2f61225f259499e032b3e065f593b1cb7df7298
--- /dev/null
+++ b/graph/incidents_graphml/6/649b3f90-9641-11ed-88e6-1908ce0c8a06.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.114
+ 100.64.11.114
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673944312
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 649b3f90-9641-11ed-88e6-1908ce0c8a06
+
+
+
diff --git a/graph/incidents_graphml/6/64a52aa0-9641-11ed-88e6-1908ce0c8a06.graphml b/graph/incidents_graphml/6/64a52aa0-9641-11ed-88e6-1908ce0c8a06.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d127470a9436a023c937f9261dd0201c06528417
--- /dev/null
+++ b/graph/incidents_graphml/6/64a52aa0-9641-11ed-88e6-1908ce0c8a06.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.114
+ 100.64.11.114
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673944312
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 64a52aa0-9641-11ed-88e6-1908ce0c8a06
+
+
+
diff --git a/graph/incidents_graphml/6/64af6890-fa69-11ec-afb6-b9a2c990c2ed.graphml b/graph/incidents_graphml/6/64af6890-fa69-11ec-afb6-b9a2c990c2ed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..14635341561fe457a7d309e7822a86d54e7937f7
--- /dev/null
+++ b/graph/incidents_graphml/6/64af6890-fa69-11ec-afb6-b9a2c990c2ed.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.100.52
+ 192.168.100.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.76.7
+ 100.64.76.7
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656809110
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 64af6890-fa69-11ec-afb6-b9a2c990c2ed
+
+
+ INCIDENT_LINK
+ 1656809110
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 64af6890-fa69-11ec-afb6-b9a2c990c2ed
+
+
+
diff --git a/graph/incidents_graphml/6/64b32bd0-4863-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/6/64b32bd0-4863-11ee-a737-6b545b426b37.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..769cbda0e2cb0399f38265f37704a3c4f3f717ec
--- /dev/null
+++ b/graph/incidents_graphml/6/64b32bd0-4863-11ee-a737-6b545b426b37.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.202
+ 100.64.58.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693530222
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 64b32bd0-4863-11ee-a737-6b545b426b37
+
+
+
diff --git a/graph/incidents_graphml/6/64b5fb10-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/6/64b5fb10-fced-11ed-ae6a-5f6768ebee7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83c33def48d600f8ec5964c10755e0ee26d35859
--- /dev/null
+++ b/graph/incidents_graphml/6/64b5fb10-fced-11ed-ae6a-5f6768ebee7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.21
+ 100.64.16.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685233204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 64b5fb10-fced-11ed-ae6a-5f6768ebee7b
+
+
+
diff --git a/graph/incidents_graphml/6/64bb2860-fa69-11ec-afb6-b9a2c990c2ed.graphml b/graph/incidents_graphml/6/64bb2860-fa69-11ec-afb6-b9a2c990c2ed.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f0a2cc2883f88f8b3dcc9d7cf21af8b8378d9c99
--- /dev/null
+++ b/graph/incidents_graphml/6/64bb2860-fa69-11ec-afb6-b9a2c990c2ed.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.195
+ 100.64.78.195
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1656809111
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 64bb2860-fa69-11ec-afb6-b9a2c990c2ed
+
+
+