diff --git a/graph/incidents_graphml/5/5b579a40-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5b579a40-2206-11ee-bfff-c38ddf5b615c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3610831cef9c36269d30877e9d7b71ba2734e24 --- /dev/null +++ b/graph/incidents_graphml/5/5b579a40-2206-11ee-bfff-c38ddf5b615c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.14.216 + 100.64.14.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689312119 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5b579a40-2206-11ee-bfff-c38ddf5b615c + + + diff --git a/graph/incidents_graphml/5/5b58d120-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5b58d120-1631-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99067d16c7c56e617e54a8ae020664ae69975ba5 --- /dev/null +++ b/graph/incidents_graphml/5/5b58d120-1631-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688011173 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b58d120-1631-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/5/5b5cca30-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5b5cca30-5c79-11ee-a457-0b0c771a8e8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2eef96ddad46fa2cc0783fe4ac809eaf0870b0ae --- /dev/null +++ b/graph/incidents_graphml/5/5b5cca30-5c79-11ee-a457-0b0c771a8e8f.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.155 + 100.64.7.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695738678 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b5cca30-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738678 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b5cca30-5c79-11ee-a457-0b0c771a8e8f + + + diff --git a/graph/incidents_graphml/5/5b621130-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5b621130-61e6-11ee-b713-27a48af32cd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6eca381d67ecc55071f7d9655bb15a27152a0a1d --- /dev/null +++ b/graph/incidents_graphml/5/5b621130-61e6-11ee-b713-27a48af32cd1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.81 + 100.64.7.81 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696335249 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b621130-61e6-11ee-b713-27a48af32cd1 + + + diff --git a/graph/incidents_graphml/5/5b6a85d0-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5b6a85d0-5c79-11ee-a457-0b0c771a8e8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a72fadd2e8bbfdfaaed2bb4dd96ded932c317ed --- /dev/null +++ b/graph/incidents_graphml/5/5b6a85d0-5c79-11ee-a457-0b0c771a8e8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.155 + 100.64.7.155 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695738679 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b6a85d0-5c79-11ee-a457-0b0c771a8e8f + + + diff --git a/graph/incidents_graphml/5/5b6b4350-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5b6b4350-e327-11ee-8328-d19a3893d959.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8dc86f1acd82441ab682e68f308f1ed260ff9981 --- /dev/null +++ b/graph/incidents_graphml/5/5b6b4350-e327-11ee-8328-d19a3893d959.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.154 + 100.64.33.154 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710546867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b6b4350-e327-11ee-8328-d19a3893d959 + + + diff --git a/graph/incidents_graphml/5/5b6d4520-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5b6d4520-2206-11ee-bfff-c38ddf5b615c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6419274973257f74943295a33df9070dd16868d2 --- /dev/null +++ b/graph/incidents_graphml/5/5b6d4520-2206-11ee-bfff-c38ddf5b615c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.137 + 100.64.76.137 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689312119 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b6d4520-2206-11ee-bfff-c38ddf5b615c + + + diff --git a/graph/incidents_graphml/5/5b77da80-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/5b77da80-761b-11ee-8b7f-db490bea3fed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf7fbb2b4dccff0b584f77c91412e64fa8b2555c --- /dev/null +++ b/graph/incidents_graphml/5/5b77da80-761b-11ee-8b7f-db490bea3fed.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.30 + 100.64.41.30 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698557036 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b77da80-761b-11ee-8b7f-db490bea3fed + + + diff --git a/graph/incidents_graphml/5/5b7d44b0-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5b7d44b0-e327-11ee-8328-d19a3893d959.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a795926b92fc65a75ab14108c3324b333ef8556 --- /dev/null +++ b/graph/incidents_graphml/5/5b7d44b0-e327-11ee-8328-d19a3893d959.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.154 + 100.64.33.154 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710546867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5b7d44b0-e327-11ee-8328-d19a3893d959 + + + diff --git a/graph/incidents_graphml/5/5b863d50-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/5/5b863d50-08e2-11ef-ae93-51753793321f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b429bb97d59907310a2bef37f67771532a57f1e7 --- /dev/null +++ b/graph/incidents_graphml/5/5b863d50-08e2-11ef-ae93-51753793321f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.124 + USER-0015-2131.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1714695376 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b863d50-08e2-11ef-ae93-51753793321f + + + diff --git a/graph/incidents_graphml/5/5b889ed0-1d9b-11ed-a4d2-f740cdf36de9.graphml b/graph/incidents_graphml/5/5b889ed0-1d9b-11ed-a4d2-f740cdf36de9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a0146bd9aa1a2de8b6fda2651686ffce7413c7c --- /dev/null +++ b/graph/incidents_graphml/5/5b889ed0-1d9b-11ed-a4d2-f740cdf36de9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.72 + 100.64.71.72 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660678861 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b889ed0-1d9b-11ed-a4d2-f740cdf36de9 + + + diff --git a/graph/incidents_graphml/5/5b891890-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/5b891890-761b-11ee-8b7f-db490bea3fed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9e85484d2c13c8be9833566d29474ea6ec4f5b9 --- /dev/null +++ b/graph/incidents_graphml/5/5b891890-761b-11ee-8b7f-db490bea3fed.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.30 + 100.64.41.30 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698557036 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b891890-761b-11ee-8b7f-db490bea3fed + + + diff --git a/graph/incidents_graphml/5/5b89f3b0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5b89f3b0-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c909550bd2be8c69bf6529ce5725b4b9fa934f08 --- /dev/null +++ b/graph/incidents_graphml/5/5b89f3b0-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.88 + 100.64.18.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300952 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b89f3b0-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/5b8b2ce0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5b8b2ce0-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..168c4fcedf7ad281197ce884139346e8f8e35f2c --- /dev/null +++ b/graph/incidents_graphml/5/5b8b2ce0-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.41 + 100.64.47.41 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475231 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b8b2ce0-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/5/5b90f9c0-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5b90f9c0-2206-11ee-bfff-c38ddf5b615c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec7376df9817f6b0151d4c0e7eedf43ba2ead818 --- /dev/null +++ b/graph/incidents_graphml/5/5b90f9c0-2206-11ee-bfff-c38ddf5b615c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.137 + 100.64.76.137 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689312119 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5b90f9c0-2206-11ee-bfff-c38ddf5b615c + + + diff --git a/graph/incidents_graphml/5/5b979da0-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/5/5b979da0-2ff5-11ee-b00f-c1ca007fb916.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62e74f4bdbab6e6ac5ff69e520db9f9cbeaa011a --- /dev/null +++ b/graph/incidents_graphml/5/5b979da0-2ff5-11ee-b00f-c1ca007fb916.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.146 + 100.64.21.146 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1690844134 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5b979da0-2ff5-11ee-b00f-c1ca007fb916 + + + diff --git a/graph/incidents_graphml/5/5b97f090-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/5/5b97f090-08e2-11ef-ae93-51753793321f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79506f96fe768a5d1eac04ae4f061a5222e3ef60 --- /dev/null +++ b/graph/incidents_graphml/5/5b97f090-08e2-11ef-ae93-51753793321f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.95.124 + USER-0015-2131.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714695376 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5b97f090-08e2-11ef-ae93-51753793321f + + + diff --git a/graph/incidents_graphml/5/5b9aa4c0-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/5b9aa4c0-761b-11ee-8b7f-db490bea3fed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2bdb93caaf8cf149a46423f0e097288a8057743e --- /dev/null +++ b/graph/incidents_graphml/5/5b9aa4c0-761b-11ee-8b7f-db490bea3fed.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.31 + 100.64.41.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698557036 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b9aa4c0-761b-11ee-8b7f-db490bea3fed + + + diff --git a/graph/incidents_graphml/5/5b9b26a0-4403-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/5/5b9b26a0-4403-11ef-b0b5-17c176975c0f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..844f292ce400aa9b494e2a3a7fa36d7094c2f346 --- /dev/null +++ b/graph/incidents_graphml/5/5b9b26a0-4403-11ef-b0b5-17c176975c0f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.18 + 100.64.41.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721196668 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5b9b26a0-4403-11ef-b0b5-17c176975c0f + + + diff --git a/graph/incidents_graphml/5/5ba05030-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/5/5ba05030-2ff5-11ee-b00f-c1ca007fb916.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be844e9fb128f3ebca849732f183ad58424fe798 --- /dev/null +++ b/graph/incidents_graphml/5/5ba05030-2ff5-11ee-b00f-c1ca007fb916.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.21.146 + 100.64.21.146 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690844134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ba05030-2ff5-11ee-b00f-c1ca007fb916 + + + diff --git a/graph/incidents_graphml/5/5ba089a0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5ba089a0-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..47a2b7f48bc4ea0b96e4cdb9efc14815c1ad6cb5 --- /dev/null +++ b/graph/incidents_graphml/5/5ba089a0-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.41 + 100.64.47.41 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475231 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ba089a0-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/5/5ba2f9f0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5ba2f9f0-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9f8415966aefefbac0c9e68ab5817cdbee03659 --- /dev/null +++ b/graph/incidents_graphml/5/5ba2f9f0-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.88 + 100.64.18.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300952 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ba2f9f0-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/5babbbc0-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/5babbbc0-761b-11ee-8b7f-db490bea3fed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c3070ea2b5660808ba71ba8825bba21ea659f3c7 --- /dev/null +++ b/graph/incidents_graphml/5/5babbbc0-761b-11ee-8b7f-db490bea3fed.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.31 + 100.64.41.31 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698557037 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5babbbc0-761b-11ee-8b7f-db490bea3fed + + + diff --git a/graph/incidents_graphml/5/5baf2e80-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5baf2e80-1631-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..972cb034b5a6bd83b781e60a57423592ae82ff68 --- /dev/null +++ b/graph/incidents_graphml/5/5baf2e80-1631-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688011174 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5baf2e80-1631-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/5/5bb6f720-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5bb6f720-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ac67e46dad5c6aa2af49d56cfda11770b9102b7 --- /dev/null +++ b/graph/incidents_graphml/5/5bb6f720-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.44 + 100.64.11.44 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300953 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5bb6f720-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/5bba88d0-761b-11ee-8b7f-db490bea3fed.graphml b/graph/incidents_graphml/5/5bba88d0-761b-11ee-8b7f-db490bea3fed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a0431c20cd101bf58ef41cd76718ad17369d9da --- /dev/null +++ b/graph/incidents_graphml/5/5bba88d0-761b-11ee-8b7f-db490bea3fed.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.34 + USER-0015-1330.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698557037 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5bba88d0-761b-11ee-8b7f-db490bea3fed + + + diff --git a/graph/incidents_graphml/5/5bbb5600-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/5bbb5600-0c22-11ef-9a57-bba1bbebb052.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e2d23f447659234659d552ccef436445d0b8bbe --- /dev/null +++ b/graph/incidents_graphml/5/5bbb5600-0c22-11ef-9a57-bba1bbebb052.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.97 + 100.64.60.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715052718 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5bbb5600-0c22-11ef-9a57-bba1bbebb052 + + + diff --git a/graph/incidents_graphml/5/5bbb58d0-4403-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/5/5bbb58d0-4403-11ef-b0b5-17c176975c0f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48b6b8e5a5be605b5f1ae5554166134634ee1c32 --- /dev/null +++ b/graph/incidents_graphml/5/5bbb58d0-4403-11ef-b0b5-17c176975c0f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.18 + 100.64.41.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721196668 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5bbb58d0-4403-11ef-b0b5-17c176975c0f + + + diff --git a/graph/incidents_graphml/5/5bc3f880-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/5bc3f880-f52c-11ee-9bad-936e2aee478a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84cb5b3d01876c79e9739775820ccc6e3b9130ad --- /dev/null +++ b/graph/incidents_graphml/5/5bc3f880-f52c-11ee-9bad-936e2aee478a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.148 + 100.64.17.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712528136 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5bc3f880-f52c-11ee-9bad-936e2aee478a + + + diff --git a/graph/incidents_graphml/5/5bcc1ee0-0c22-11ef-9a57-bba1bbebb052.graphml b/graph/incidents_graphml/5/5bcc1ee0-0c22-11ef-9a57-bba1bbebb052.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88aff1a90809a6bedb22bcc9ec9f3c7d2ebe0c0d --- /dev/null +++ b/graph/incidents_graphml/5/5bcc1ee0-0c22-11ef-9a57-bba1bbebb052.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.97 + 100.64.60.97 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715052718 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5bcc1ee0-0c22-11ef-9a57-bba1bbebb052 + + + diff --git a/graph/incidents_graphml/5/5bcd8bf0-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5bcd8bf0-1631-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30db18b1c24116ae30b245add620afcb3009fd60 --- /dev/null +++ b/graph/incidents_graphml/5/5bcd8bf0-1631-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688011174 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5bcd8bf0-1631-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/5/5bd9d7f0-794d-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/5/5bd9d7f0-794d-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6b760fa172cab91e0ee6c7a2462af2340c2297f --- /dev/null +++ b/graph/incidents_graphml/5/5bd9d7f0-794d-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.243 + 100.64.44.243 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698908365 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5bd9d7f0-794d-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/5/5bdb87b0-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5bdb87b0-9d12-11ee-a559-a1780370c51a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe88cbd7432eb3a68088edb39bfbe54a3b3d3411 --- /dev/null +++ b/graph/incidents_graphml/5/5bdb87b0-9d12-11ee-a559-a1780370c51a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.131 + 100.64.7.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702841267 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5bdb87b0-9d12-11ee-a559-a1780370c51a + + + diff --git a/graph/incidents_graphml/5/5be04d40-a613-11ee-b304-ddeb750e6414.graphml b/graph/incidents_graphml/5/5be04d40-a613-11ee-b304-ddeb750e6414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f813d342082c2ab09088598c9e59ae69592baa2e --- /dev/null +++ b/graph/incidents_graphml/5/5be04d40-a613-11ee-b304-ddeb750e6414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.44 + 100.64.59.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703831257 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5be04d40-a613-11ee-b304-ddeb750e6414 + + + diff --git a/graph/incidents_graphml/5/5be66b50-9c9d-11ee-b60c-751684393f5d.graphml b/graph/incidents_graphml/5/5be66b50-9c9d-11ee-b60c-751684393f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82333174d8679c3189e59d2b7bef4068204c0d5a --- /dev/null +++ b/graph/incidents_graphml/5/5be66b50-9c9d-11ee-b60c-751684393f5d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.174 + 100.64.8.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + INCIDENT_LINK + 1702791016 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5be66b50-9c9d-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702791016 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5be66b50-9c9d-11ee-b60c-751684393f5d + + + diff --git a/graph/incidents_graphml/5/5beb6630-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5beb6630-9d12-11ee-a559-a1780370c51a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf362a8048fccd6bcc2db687398f98819db4071d --- /dev/null +++ b/graph/incidents_graphml/5/5beb6630-9d12-11ee-a559-a1780370c51a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.66 + 100.64.22.66 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702841267 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5beb6630-9d12-11ee-a559-a1780370c51a + + + diff --git a/graph/incidents_graphml/5/5bf2a020-1631-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/5/5bf2a020-1631-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a95f10e232dc10c5f08cb0f462ae7d05ae94f393 --- /dev/null +++ b/graph/incidents_graphml/5/5bf2a020-1631-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,129 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.134 + 100.64.43.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688011174 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5bf2a020-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011174 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5bf2a020-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011174 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5bf2a020-1631-11ee-87fd-95133fbba576 + + + INCIDENT_LINK + 1688011174 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5bf2a020-1631-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/5/5bfa8160-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5bfa8160-9d12-11ee-a559-a1780370c51a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6506c43df8611aed79880fac2bc13306b83671f1 --- /dev/null +++ b/graph/incidents_graphml/5/5bfa8160-9d12-11ee-a559-a1780370c51a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.68 + 100.64.22.68 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702841267 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5bfa8160-9d12-11ee-a559-a1780370c51a + + + diff --git a/graph/incidents_graphml/5/5c097580-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5c097580-9d12-11ee-a559-a1780370c51a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b27e814ea9f09a4cb42f0be9b3736880dee7d521 --- /dev/null +++ b/graph/incidents_graphml/5/5c097580-9d12-11ee-a559-a1780370c51a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.68 + 100.64.22.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702841267 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5c097580-9d12-11ee-a559-a1780370c51a + + + diff --git a/graph/incidents_graphml/5/5c0a0420-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/5c0a0420-2ade-11ed-961c-99a30b1a3145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d5758cf021a9bdc26ccde041454066b38f1736b --- /dev/null +++ b/graph/incidents_graphml/5/5c0a0420-2ade-11ed-961c-99a30b1a3145.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.99 + USER-0015-1939.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.123 + 100.64.71.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662137003 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c0a0420-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662137003 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c0a0420-2ade-11ed-961c-99a30b1a3145 + + + diff --git a/graph/incidents_graphml/5/5c0b7090-61e6-11ee-b713-27a48af32cd1.graphml b/graph/incidents_graphml/5/5c0b7090-61e6-11ee-b713-27a48af32cd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67c05676f863132484d9276082e967a842ddab9c --- /dev/null +++ b/graph/incidents_graphml/5/5c0b7090-61e6-11ee-b713-27a48af32cd1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.139 + 100.64.47.139 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696335251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0b7090-61e6-11ee-b713-27a48af32cd1 + + + diff --git a/graph/incidents_graphml/5/5c0f5150-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5c0f5150-5c79-11ee-a457-0b0c771a8e8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bf0c8ea52b96175276426ba98c18ff79e90c81f --- /dev/null +++ b/graph/incidents_graphml/5/5c0f5150-5c79-11ee-a457-0b0c771a8e8f.graphml @@ -0,0 +1,655 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.10 + 100.64.16.10 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.11 + 100.64.16.11 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.12 + 100.64.16.12 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.13 + 100.64.16.13 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.59 + 100.64.13.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.14 + 100.64.16.14 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.15 + 100.64.16.15 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.201 + 100.64.13.201 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.16 + 100.64.16.16 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.17 + 100.64.16.17 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.126 + 100.64.11.126 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.18 + 100.64.16.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.19 + 100.64.16.19 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.20 + 100.64.16.20 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.21 + 100.64.16.21 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.22 + 100.64.16.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + INCIDENT_LINK + 1695738680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c0f5150-5c79-11ee-a457-0b0c771a8e8f + + + diff --git a/graph/incidents_graphml/5/5c1a90d0-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5c1a90d0-683e-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6cd6e3e6361e1c9c3ec7d03a402f318732b5c738 --- /dev/null +++ b/graph/incidents_graphml/5/5c1a90d0-683e-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.213 + 100.64.2.213 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697032753 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c1a90d0-683e-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/5/5c1fa500-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5c1fa500-5c79-11ee-a457-0b0c771a8e8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5afe5e90877543d62945677ec41dedfeed871390 --- /dev/null +++ b/graph/incidents_graphml/5/5c1fa500-5c79-11ee-a457-0b0c771a8e8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.10 + 100.64.16.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695738680 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5c1fa500-5c79-11ee-a457-0b0c771a8e8f + + + diff --git a/graph/incidents_graphml/5/5c2379c0-85f3-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/5/5c2379c0-85f3-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cec066130f83fd869b6349319361873d179d9836 --- /dev/null +++ b/graph/incidents_graphml/5/5c2379c0-85f3-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,785 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.32 + 100.64.43.32 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.33 + 100.64.43.33 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.34 + 100.64.43.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.35 + 100.64.43.35 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.196 + 100.64.20.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.36 + 100.64.43.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.37 + 100.64.43.37 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.38 + 100.64.43.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.39 + 100.64.43.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.41 + 100.64.19.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.40 + 100.64.43.40 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.41 + 100.64.43.41 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.79 + 100.64.7.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.42 + 100.64.43.42 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.43 + 100.64.43.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.4 + 100.64.41.4 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.101 + 100.64.26.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.44 + 100.64.43.44 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.45 + 100.64.43.45 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c2379c0-85f3-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/5/5c276a10-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/5/5c276a10-73c2-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc9496631e8cfdd8856856b7cfb27809128ac502 --- /dev/null +++ b/graph/incidents_graphml/5/5c276a10-73c2-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.130 + 100.64.82.130 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.130 + 100.64.72.130 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1670151412 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c276a10-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151412 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c276a10-73c2-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/5/5c283600-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5c283600-254e-11ee-bba0-3d7b70aaa407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39bc304fec50808a44878091d2214df3117ee0a9 --- /dev/null +++ b/graph/incidents_graphml/5/5c283600-254e-11ee-bba0-3d7b70aaa407.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.122 + 100.64.41.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689672898 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c283600-254e-11ee-bba0-3d7b70aaa407 + + + diff --git a/graph/incidents_graphml/5/5c28df20-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/5/5c28df20-01a8-11ee-a3af-a97ccd3b2ee2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3077dccf3a529261f3db8c6166bf97573a8bb8b6 --- /dev/null +++ b/graph/incidents_graphml/5/5c28df20-01a8-11ee-a3af-a97ccd3b2ee2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.43.11 + 192.168.43.11 + ["Exploiting Host","Exploiting Target"] + 0.859375 + ["Precinct","Cisco Meraki Firewall","Meraki","Stealthwatch","FireEye Endpoint Security (HX Series)"] + + + HOST + 100.64.75.239 + 100.64.75.239 + [] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1685753310 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c28df20-01a8-11ee-a3af-a97ccd3b2ee2 + + + INCIDENT_LINK + 1685753310 + malicious + 0.859375 + 0.859375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c28df20-01a8-11ee-a3af-a97ccd3b2ee2 + + + diff --git a/graph/incidents_graphml/5/5c2a0760-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/5/5c2a0760-140e-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0986149ea4bb6e1aea3bfca5497883ab3905cac --- /dev/null +++ b/graph/incidents_graphml/5/5c2a0760-140e-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.176 + 100.64.72.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.230 + 100.64.82.230 + ["Exploiting Target","Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687776240 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5c2a0760-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776240 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5c2a0760-140e-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/5/5c2a4840-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5c2a4840-683e-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57e19270a3af4ea783ee4112f5811850c1450e77 --- /dev/null +++ b/graph/incidents_graphml/5/5c2a4840-683e-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.213 + 100.64.2.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697032753 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5c2a4840-683e-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/5/5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/5/5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..75951f7609e6a62a44f4872999e4b45f540016e7 --- /dev/null +++ b/graph/incidents_graphml/5/5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2.graphml @@ -0,0 +1,99 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.73 + 100.64.29.73 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.71.235 + 100.64.71.235 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + HOST + 100.64.1.33 + HOST-13950 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685753311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2 + + + INCIDENT_LINK + 1685753311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2 + + + INCIDENT_LINK + 1685753311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c40fb00-01a8-11ee-a3af-a97ccd3b2ee2 + + + diff --git a/graph/incidents_graphml/5/5c4ab450-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5c4ab450-3403-11ee-94d6-7df16e3753d9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35a72b8d568e892594daa9d78b78ecbe56334ea1 --- /dev/null +++ b/graph/incidents_graphml/5/5c4ab450-3403-11ee-94d6-7df16e3753d9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.200 + 100.64.44.200 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691289953 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c4ab450-3403-11ee-94d6-7df16e3753d9 + + + diff --git a/graph/incidents_graphml/5/5c519ec0-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5c519ec0-0c1a-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52ddba1a4f8541256b4fb92a91ba73faf6b857a6 --- /dev/null +++ b/graph/incidents_graphml/5/5c519ec0-0c1a-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.231 + 100.64.80.231 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.147 + 100.64.71.147 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686901785 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5c519ec0-0c1a-11ee-a535-110da53c9d07 + + + INCIDENT_LINK + 1686901785 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5c519ec0-0c1a-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/5/5c5671f0-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5c5671f0-254e-11ee-bba0-3d7b70aaa407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..128d34771fcb58a90343fce63d9e2ef2534f8398 --- /dev/null +++ b/graph/incidents_graphml/5/5c5671f0-254e-11ee-bba0-3d7b70aaa407.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.122 + 100.64.41.122 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689672898 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5c5671f0-254e-11ee-bba0-3d7b70aaa407 + + + diff --git a/graph/incidents_graphml/5/5c6574e0-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5c6574e0-0c1a-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59b3c6ccb2e127c43207e1856c8ff7f9b7eafcac --- /dev/null +++ b/graph/incidents_graphml/5/5c6574e0-0c1a-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.106.234 + 192.168.106.234 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.72.96 + 100.64.72.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686901785 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c6574e0-0c1a-11ee-a535-110da53c9d07 + + + INCIDENT_LINK + 1686901785 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c6574e0-0c1a-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/5/5c6df3c0-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5c6df3c0-3403-11ee-94d6-7df16e3753d9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d38be324fd7983aa4c970950a25834a89c766874 --- /dev/null +++ b/graph/incidents_graphml/5/5c6df3c0-3403-11ee-94d6-7df16e3753d9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.200 + 100.64.44.200 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691289953 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5c6df3c0-3403-11ee-94d6-7df16e3753d9 + + + diff --git a/graph/incidents_graphml/5/5c72a730-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5c72a730-2206-11ee-bfff-c38ddf5b615c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd4aa73378e7dc3d5668774bf80d137694fc9e2d --- /dev/null +++ b/graph/incidents_graphml/5/5c72a730-2206-11ee-bfff-c38ddf5b615c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.180.49 + 192.168.180.49 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 192.168.147.151 + 192.168.147.151 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory","Umbrella"] + + + INCIDENT_LINK + 1689312121 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c72a730-2206-11ee-bfff-c38ddf5b615c + + + INCIDENT_LINK + 1689312121 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c72a730-2206-11ee-bfff-c38ddf5b615c + + + diff --git a/graph/incidents_graphml/5/5c7e6100-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5c7e6100-e327-11ee-8328-d19a3893d959.graphml new file mode 100644 index 0000000000000000000000000000000000000000..165a2419aacfe64ede3da5fca3d1a2e2f5cdaa82 --- /dev/null +++ b/graph/incidents_graphml/5/5c7e6100-e327-11ee-8328-d19a3893d959.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.202 + 100.64.8.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710546869 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c7e6100-e327-11ee-8328-d19a3893d959 + + + INCIDENT_LINK + 1710546869 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5c7e6100-e327-11ee-8328-d19a3893d959 + + + diff --git a/graph/incidents_graphml/5/5c8591c0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5c8591c0-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..049f7d080afbc9a4a0ae4e01bd90d624aa059741 --- /dev/null +++ b/graph/incidents_graphml/5/5c8591c0-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.89 + 100.64.18.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300954 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c8591c0-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/5c92fa70-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5c92fa70-e327-11ee-8328-d19a3893d959.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52210d907282c19fd85824258e113b16bf74e2e0 --- /dev/null +++ b/graph/incidents_graphml/5/5c92fa70-e327-11ee-8328-d19a3893d959.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.202 + 100.64.8.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710546869 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5c92fa70-e327-11ee-8328-d19a3893d959 + + + diff --git a/graph/incidents_graphml/5/5c9bd8e0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5c9bd8e0-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82dc8773a1a933f5554f1da8a4ba44bc18c2f74f --- /dev/null +++ b/graph/incidents_graphml/5/5c9bd8e0-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.89 + 100.64.18.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300954 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5c9bd8e0-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/5c9c0f70-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/5/5c9c0f70-22d3-11ef-b7cc-27d8681b231b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8fb933b1a6c3b43585f281718dbc4eafebb94397 --- /dev/null +++ b/graph/incidents_graphml/5/5c9c0f70-22d3-11ef-b7cc-27d8681b231b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.223.173 + 172.21.223.173 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"] + + + HOST + 100.64.89.234 + 100.64.89.234 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717547666 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c9c0f70-22d3-11ef-b7cc-27d8681b231b + + + INCIDENT_LINK + 1717547666 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5c9c0f70-22d3-11ef-b7cc-27d8681b231b + + + diff --git a/graph/incidents_graphml/5/5ca6a980-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5ca6a980-e327-11ee-8328-d19a3893d959.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a816ee86d0acc4333bb3879490086d7bde7c7102 --- /dev/null +++ b/graph/incidents_graphml/5/5ca6a980-e327-11ee-8328-d19a3893d959.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.190 + 100.64.27.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710546869 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ca6a980-e327-11ee-8328-d19a3893d959 + + + diff --git a/graph/incidents_graphml/5/5cae1b30-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/5/5cae1b30-f6bd-11ee-861e-3f1320280b96.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf2e83f9898d02e5c343dd7cd59ff74500884b61 --- /dev/null +++ b/graph/incidents_graphml/5/5cae1b30-f6bd-11ee-861e-3f1320280b96.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.168 + 100.64.6.168 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712700366 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cae1b30-f6bd-11ee-861e-3f1320280b96 + + + diff --git a/graph/incidents_graphml/5/5cb1aad0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5cb1aad0-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9260b3f0fc1437f0e28277776ca75779d5164b7e --- /dev/null +++ b/graph/incidents_graphml/5/5cb1aad0-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.91 + 100.64.18.91 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300954 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5cb1aad0-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/5cbeefb0-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/5/5cbeefb0-14fa-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..97930664afb5f92f3acb60c2f540b73aaec6296c --- /dev/null +++ b/graph/incidents_graphml/5/5cbeefb0-14fa-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.235 + 100.64.95.235 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659730104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5cbeefb0-14fa-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/5/5cc4c420-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5cc4c420-254e-11ee-bba0-3d7b70aaa407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e442e7ac795f3ae42c7d3b584fd8d7a33a13ecf4 --- /dev/null +++ b/graph/incidents_graphml/5/5cc4c420-254e-11ee-bba0-3d7b70aaa407.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.124 + 100.64.41.124 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689672899 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5cc4c420-254e-11ee-bba0-3d7b70aaa407 + + + diff --git a/graph/incidents_graphml/5/5cc5c700-3b19-11ed-9b4c-29667546a453.graphml b/graph/incidents_graphml/5/5cc5c700-3b19-11ed-9b4c-29667546a453.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb76db98bfc1121145f7920c8295952572aac641 --- /dev/null +++ b/graph/incidents_graphml/5/5cc5c700-3b19-11ed-9b4c-29667546a453.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.50 + 100.64.96.50 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663921563 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cc5c700-3b19-11ed-9b4c-29667546a453 + + + diff --git a/graph/incidents_graphml/5/5ccab110-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/5/5ccab110-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f068fc9dd005da9f0e857c72630064f318e8ed2 --- /dev/null +++ b/graph/incidents_graphml/5/5ccab110-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.91 + 100.64.18.91 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300954 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ccab110-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/5/5ccf3ce0-3b19-11ed-9b4c-29667546a453.graphml b/graph/incidents_graphml/5/5ccf3ce0-3b19-11ed-9b4c-29667546a453.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40ef7cce36e1cc16c1188d0189ce007d2ee6dc0e --- /dev/null +++ b/graph/incidents_graphml/5/5ccf3ce0-3b19-11ed-9b4c-29667546a453.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.50 + 100.64.96.50 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663921563 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ccf3ce0-3b19-11ed-9b4c-29667546a453 + + + diff --git a/graph/incidents_graphml/5/5cd5b8e0-41e5-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/5/5cd5b8e0-41e5-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2dd8ef3e52929633154b10e31fe43d94b21809f9 --- /dev/null +++ b/graph/incidents_graphml/5/5cd5b8e0-41e5-11ed-ad31-51848920452c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.212 + 100.64.75.212 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.212 + 100.64.72.212 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1664668887 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cd5b8e0-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668887 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cd5b8e0-41e5-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/5/5cd65080-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5cd65080-a1f6-11ee-aa63-351afb0017e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..685e5ee8b588ab5347586dbc8c7cf5ec1e1cb1d5 --- /dev/null +++ b/graph/incidents_graphml/5/5cd65080-a1f6-11ee-aa63-351afb0017e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.78 + 100.64.13.78 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703378998 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5cd65080-a1f6-11ee-aa63-351afb0017e4 + + + diff --git a/graph/incidents_graphml/5/5cd8ac60-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5cd8ac60-9d12-11ee-a559-a1780370c51a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..148cbd7407acab180b483f1e4b5674da891066ec --- /dev/null +++ b/graph/incidents_graphml/5/5cd8ac60-9d12-11ee-a559-a1780370c51a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.244 + 100.64.15.244 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702841268 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5cd8ac60-9d12-11ee-a559-a1780370c51a + + + diff --git a/graph/incidents_graphml/5/5cd9aee0-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/5/5cd9aee0-22e1-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77519bff460937cc008a5a48c6de2611b6a03fb3 --- /dev/null +++ b/graph/incidents_graphml/5/5cd9aee0-22e1-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.127 + 100.64.23.127 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689406181 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5cd9aee0-22e1-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/5/5cd9c430-3b19-11ed-9b4c-29667546a453.graphml b/graph/incidents_graphml/5/5cd9c430-3b19-11ed-9b4c-29667546a453.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e804c464fbbc3be1495de788bebbb4f2b745380 --- /dev/null +++ b/graph/incidents_graphml/5/5cd9c430-3b19-11ed-9b4c-29667546a453.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.52 + 100.64.96.52 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663921563 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5cd9c430-3b19-11ed-9b4c-29667546a453 + + + diff --git a/graph/incidents_graphml/5/5ce67cf0-254e-11ee-bba0-3d7b70aaa407.graphml b/graph/incidents_graphml/5/5ce67cf0-254e-11ee-bba0-3d7b70aaa407.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58bbf2518a81ef129a174140f938c8eaf96b4ac7 --- /dev/null +++ b/graph/incidents_graphml/5/5ce67cf0-254e-11ee-bba0-3d7b70aaa407.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.124 + 100.64.41.124 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689672899 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ce67cf0-254e-11ee-bba0-3d7b70aaa407 + + + diff --git a/graph/incidents_graphml/5/5ced45d0-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5ced45d0-9d12-11ee-a559-a1780370c51a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..720ca480fb1d0e19035bbd97291fc19b0b9d4e66 --- /dev/null +++ b/graph/incidents_graphml/5/5ced45d0-9d12-11ee-a559-a1780370c51a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.244 + 100.64.15.244 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702841269 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ced45d0-9d12-11ee-a559-a1780370c51a + + + diff --git a/graph/incidents_graphml/5/5cf59850-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5cf59850-a1f6-11ee-aa63-351afb0017e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0de2f5d0ee78917a84cee5769a2bd4cbf5b1acdf --- /dev/null +++ b/graph/incidents_graphml/5/5cf59850-a1f6-11ee-aa63-351afb0017e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.80 + 100.64.13.80 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703378998 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5cf59850-a1f6-11ee-aa63-351afb0017e4 + + + diff --git a/graph/incidents_graphml/5/5cfbd6b0-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/5/5cfbd6b0-2f33-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f9b1b7c685a9b56c8a9e9351795a81318c8f9f5 --- /dev/null +++ b/graph/incidents_graphml/5/5cfbd6b0-2f33-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.170.59 + 192.168.170.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.0.105 + 100.64.0.105 + ["Exploiting Target","Exploiting Host"] + 0.88134765625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 192.168.235.180 + 192.168.235.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 192.168.96.90 + 192.168.96.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory","Umbrella"] + + + INCIDENT_LINK + 1690760814 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760814 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760814 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760814 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760814 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760814 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cfbd6b0-2f33-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/5/5cfe9a90-2f9b-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/5/5cfe9a90-2f9b-11ee-812f-67af952e62fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db7e8315befd5f39fa8f593cb6fa38bdce668bd7 --- /dev/null +++ b/graph/incidents_graphml/5/5cfe9a90-2f9b-11ee-812f-67af952e62fd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.140 + 100.64.68.140 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1690805482 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cfe9a90-2f9b-11ee-812f-67af952e62fd + + + INCIDENT_LINK + 1690805482 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5cfe9a90-2f9b-11ee-812f-67af952e62fd + + + diff --git a/graph/incidents_graphml/5/5d028a30-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d028a30-4d3f-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..253b7ca0006d4261f8522791f7a525e036eed098 --- /dev/null +++ b/graph/incidents_graphml/5/5d028a30-4d3f-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.73 + 100.64.19.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694064503 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5d028a30-4d3f-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/5/5d0290a0-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d0290a0-a1f6-11ee-aa63-351afb0017e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f67e224d5a82a60c257bd41c36d4dbf7699daf40 --- /dev/null +++ b/graph/incidents_graphml/5/5d0290a0-a1f6-11ee-aa63-351afb0017e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.80 + 100.64.13.80 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703378999 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d0290a0-a1f6-11ee-aa63-351afb0017e4 + + + diff --git a/graph/incidents_graphml/5/5d092350-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/5/5d092350-22e1-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b70b950032ab64e21583cefeb78b7fd7ae6b5945 --- /dev/null +++ b/graph/incidents_graphml/5/5d092350-22e1-11ee-8861-516dde03d998.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.149 + 100.64.9.149 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.107 + 100.64.58.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.76 + 100.64.42.76 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.42 + 100.64.19.42 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.108 + 100.64.58.108 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.109 + 100.64.58.109 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.110 + 100.64.58.110 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.111 + 100.64.58.111 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.112 + 100.64.58.112 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.1 + 100.64.18.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.11 + 100.64.33.11 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.113 + 100.64.58.113 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.32 + 100.64.42.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.172 + 100.64.10.172 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.100 + 100.64.43.100 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.173 + 100.64.23.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.114 + 100.64.58.114 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.202 + 100.64.10.202 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689406182 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d092350-22e1-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/5/5d110850-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5d110850-8807-11ee-bd27-a396646abc8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aac95aa4a94c1fbe4aa72b39c109280f74e37bd5 --- /dev/null +++ b/graph/incidents_graphml/5/5d110850-8807-11ee-bd27-a396646abc8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.129 + 100.64.6.129 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700527570 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d110850-8807-11ee-bd27-a396646abc8f + + + diff --git a/graph/incidents_graphml/5/5d11f9f0-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d11f9f0-a1f6-11ee-aa63-351afb0017e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20a0fd0560c024a03b5c06f2a88ef4fdc3464fb7 --- /dev/null +++ b/graph/incidents_graphml/5/5d11f9f0-a1f6-11ee-aa63-351afb0017e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703378999 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d11f9f0-a1f6-11ee-aa63-351afb0017e4 + + + diff --git a/graph/incidents_graphml/5/5d135310-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d135310-4d3f-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55fbb2f1e22a134133950a2cb1ccbee82b11e08b --- /dev/null +++ b/graph/incidents_graphml/5/5d135310-4d3f-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.99 + 100.64.38.99 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694064503 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d135310-4d3f-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/5/5d221f50-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5d221f50-8807-11ee-bd27-a396646abc8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c101861875d6bd0a0c1b639f35f7741a35553d43 --- /dev/null +++ b/graph/incidents_graphml/5/5d221f50-8807-11ee-bd27-a396646abc8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.129 + 100.64.6.129 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700527570 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d221f50-8807-11ee-bd27-a396646abc8f + + + diff --git a/graph/incidents_graphml/5/5d23b290-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d23b290-1687-11ed-af15-7bfc3a566021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc471e9038918aed245a3d46ff6ef0affeb9b5bd --- /dev/null +++ b/graph/incidents_graphml/5/5d23b290-1687-11ed-af15-7bfc3a566021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.64 + USER-0015-1802.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659900615 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d23b290-1687-11ed-af15-7bfc3a566021 + + + diff --git a/graph/incidents_graphml/5/5d2a50d0-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/5d2a50d0-d523-11ee-93b3-7df625b90bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a74ebf815d980726be3473c6c7dbec1cb048094 --- /dev/null +++ b/graph/incidents_graphml/5/5d2a50d0-d523-11ee-93b3-7df625b90bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.37 + 100.64.44.37 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709005835 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d2a50d0-d523-11ee-93b3-7df625b90bc2 + + + diff --git a/graph/incidents_graphml/5/5d2aaba0-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d2aaba0-4d3f-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45677295635ceaada14ff93d5b9c86c68447a80c --- /dev/null +++ b/graph/incidents_graphml/5/5d2aaba0-4d3f-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.99 + 100.64.38.99 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694064503 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d2aaba0-4d3f-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/5/5d2e8800-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d2e8800-1687-11ed-af15-7bfc3a566021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1345aca1b929599407dabf8c7c03eb36603e1f0b --- /dev/null +++ b/graph/incidents_graphml/5/5d2e8800-1687-11ed-af15-7bfc3a566021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.64 + USER-0015-1802.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659900615 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d2e8800-1687-11ed-af15-7bfc3a566021 + + + diff --git a/graph/incidents_graphml/5/5d325330-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d325330-a1f6-11ee-aa63-351afb0017e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9326e1028767e2abfa14823e8a52bdcc043108c2 --- /dev/null +++ b/graph/incidents_graphml/5/5d325330-a1f6-11ee-aa63-351afb0017e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.82 + 100.64.13.82 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703378999 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d325330-a1f6-11ee-aa63-351afb0017e4 + + + diff --git a/graph/incidents_graphml/5/5d3366a0-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5d3366a0-3403-11ee-94d6-7df16e3753d9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5105696e1dc11f6ead62b3ce924aefd88fea241 --- /dev/null +++ b/graph/incidents_graphml/5/5d3366a0-3403-11ee-94d6-7df16e3753d9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.202 + 100.64.44.202 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691289954 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d3366a0-3403-11ee-94d6-7df16e3753d9 + + + diff --git a/graph/incidents_graphml/5/5d33adb0-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/5/5d33adb0-fced-11ed-ae6a-5f6768ebee7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8316b606596b518f9441e7883efde08c559c5aa6 --- /dev/null +++ b/graph/incidents_graphml/5/5d33adb0-fced-11ed-ae6a-5f6768ebee7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.57 + 100.64.34.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685233192 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d33adb0-fced-11ed-ae6a-5f6768ebee7b + + + diff --git a/graph/incidents_graphml/5/5d355af0-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5d355af0-2206-11ee-bfff-c38ddf5b615c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79a7f32b978a84afb4463da1211779d05a2e16bb --- /dev/null +++ b/graph/incidents_graphml/5/5d355af0-2206-11ee-bfff-c38ddf5b615c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.93 + 100.64.56.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689312122 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d355af0-2206-11ee-bfff-c38ddf5b615c + + + diff --git a/graph/incidents_graphml/5/5d36c560-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d36c560-1687-11ed-af15-7bfc3a566021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..534ade2713512434a31b5eb0dce30d653c506e43 --- /dev/null +++ b/graph/incidents_graphml/5/5d36c560-1687-11ed-af15-7bfc3a566021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.134 + 100.64.71.134 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659900615 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d36c560-1687-11ed-af15-7bfc3a566021 + + + diff --git a/graph/incidents_graphml/5/5d37a550-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/5/5d37a550-0228-11ef-b1dd-bbcb3e283d29.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34bb6d7cc75632b53504520a457a4bf3058dd39a --- /dev/null +++ b/graph/incidents_graphml/5/5d37a550-0228-11ef-b1dd-bbcb3e283d29.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.96 + 100.64.21.96 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713955785 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d37a550-0228-11ef-b1dd-bbcb3e283d29 + + + diff --git a/graph/incidents_graphml/5/5d3a5660-d523-11ee-93b3-7df625b90bc2.graphml b/graph/incidents_graphml/5/5d3a5660-d523-11ee-93b3-7df625b90bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51643a88f81830e8a9807828326466d81282f03e --- /dev/null +++ b/graph/incidents_graphml/5/5d3a5660-d523-11ee-93b3-7df625b90bc2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.37 + 100.64.44.37 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709005836 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d3a5660-d523-11ee-93b3-7df625b90bc2 + + + diff --git a/graph/incidents_graphml/5/5d3c43a0-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d3c43a0-1687-11ed-af15-7bfc3a566021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..126ebbe59cbb4dcadb0c818f676426407b0b1c04 --- /dev/null +++ b/graph/incidents_graphml/5/5d3c43a0-1687-11ed-af15-7bfc3a566021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.134 + 100.64.71.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659900615 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d3c43a0-1687-11ed-af15-7bfc3a566021 + + + diff --git a/graph/incidents_graphml/5/5d3d9760-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d3d9760-4d3f-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91a2a6f0e52454e8f5d79e7aeeb4acf755acd10d --- /dev/null +++ b/graph/incidents_graphml/5/5d3d9760-4d3f-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.31 + USER-0015-1342.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694064503 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d3d9760-4d3f-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/5/5d43aac0-d773-11ed-b131-97a6b3859c17.graphml b/graph/incidents_graphml/5/5d43aac0-d773-11ed-b131-97a6b3859c17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5cfa89a1d4a5bc8f4286b9246aeb4fed3a9d7604 --- /dev/null +++ b/graph/incidents_graphml/5/5d43aac0-d773-11ed-b131-97a6b3859c17.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.188 + 100.64.3.188 + [] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host"] + 0.981015625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.221 + 100.64.16.221 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1681112600 + malicious + 0.981015625 + 0.981015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d43aac0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.981015625 + 0.981015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d43aac0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.981015625 + 0.981015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d43aac0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.981015625 + 0.981015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d43aac0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.981015625 + 0.981015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d43aac0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.981015625 + 0.981015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d43aac0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.981015625 + 0.981015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d43aac0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.981015625 + 0.981015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d43aac0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.981015625 + 0.981015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d43aac0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.981015625 + 0.981015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d43aac0-d773-11ed-b131-97a6b3859c17 + + + diff --git a/graph/incidents_graphml/5/5d484c30-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d484c30-a1f6-11ee-aa63-351afb0017e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb762106ef9ed24aa097229b18d6e91b4458adc4 --- /dev/null +++ b/graph/incidents_graphml/5/5d484c30-a1f6-11ee-aa63-351afb0017e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.84 + 100.64.13.84 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703378999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5d484c30-a1f6-11ee-aa63-351afb0017e4 + + + diff --git a/graph/incidents_graphml/5/5d48c6c0-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d48c6c0-1687-11ed-af15-7bfc3a566021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb58af5ed61ac022ae1311a95c94efe20bf83b50 --- /dev/null +++ b/graph/incidents_graphml/5/5d48c6c0-1687-11ed-af15-7bfc3a566021.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.160 + 100.64.76.160 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.220 + 100.64.72.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.66 + 100.64.79.66 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659900615 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d48c6c0-1687-11ed-af15-7bfc3a566021 + + + INCIDENT_LINK + 1659900615 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d48c6c0-1687-11ed-af15-7bfc3a566021 + + + INCIDENT_LINK + 1659900615 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d48c6c0-1687-11ed-af15-7bfc3a566021 + + + INCIDENT_LINK + 1659900615 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d48c6c0-1687-11ed-af15-7bfc3a566021 + + + diff --git a/graph/incidents_graphml/5/5d4d00b0-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d4d00b0-4d3f-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ac8f2db7e2267ac03bffc29be3c70fabd350a87 --- /dev/null +++ b/graph/incidents_graphml/5/5d4d00b0-4d3f-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.31 + USER-0015-1342.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694064503 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d4d00b0-4d3f-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/5/5d4dcc70-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5d4dcc70-3403-11ee-94d6-7df16e3753d9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a2990e5a3857132c4aec01be3eb964f74a3b6f6 --- /dev/null +++ b/graph/incidents_graphml/5/5d4dcc70-3403-11ee-94d6-7df16e3753d9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.202 + 100.64.44.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691289955 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5d4dcc70-3403-11ee-94d6-7df16e3753d9 + + + diff --git a/graph/incidents_graphml/5/5d4e1380-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/5/5d4e1380-0228-11ef-b1dd-bbcb3e283d29.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34580cef5b685d82e74a5b74fd7392d9d0c5f04f --- /dev/null +++ b/graph/incidents_graphml/5/5d4e1380-0228-11ef-b1dd-bbcb3e283d29.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.96 + 100.64.21.96 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713955786 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d4e1380-0228-11ef-b1dd-bbcb3e283d29 + + + diff --git a/graph/incidents_graphml/5/5d4fbac0-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5d4fbac0-e327-11ee-8328-d19a3893d959.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5df2eae5553f45027925f2575a2b6591c00e215 --- /dev/null +++ b/graph/incidents_graphml/5/5d4fbac0-e327-11ee-8328-d19a3893d959.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.171 + 100.64.26.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710546870 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d4fbac0-e327-11ee-8328-d19a3893d959 + + + diff --git a/graph/incidents_graphml/5/5d51bd00-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/5/5d51bd00-fced-11ed-ae6a-5f6768ebee7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6386ae10e95fcc369e474b074f52dbd9a72f2060 --- /dev/null +++ b/graph/incidents_graphml/5/5d51bd00-fced-11ed-ae6a-5f6768ebee7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.34.57 + 100.64.34.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685233192 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d51bd00-fced-11ed-ae6a-5f6768ebee7b + + + diff --git a/graph/incidents_graphml/5/5d5277d0-d773-11ed-b131-97a6b3859c17.graphml b/graph/incidents_graphml/5/5d5277d0-d773-11ed-b131-97a6b3859c17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16b372c0eb80374baa842cc2e91b6b5d71b1b651 --- /dev/null +++ b/graph/incidents_graphml/5/5d5277d0-d773-11ed-b131-97a6b3859c17.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.224 + 100.64.16.224 + [] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.225 + 100.64.16.225 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.226 + 100.64.16.226 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1681112600 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5d5277d0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5d5277d0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5d5277d0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5d5277d0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5d5277d0-d773-11ed-b131-97a6b3859c17 + + + INCIDENT_LINK + 1681112600 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5d5277d0-d773-11ed-b131-97a6b3859c17 + + + diff --git a/graph/incidents_graphml/5/5d5396d0-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d5396d0-a1f6-11ee-aa63-351afb0017e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42ed965a295147d92f57b0d77a08b9b13d4dcbf6 --- /dev/null +++ b/graph/incidents_graphml/5/5d5396d0-a1f6-11ee-aa63-351afb0017e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.70 + 100.64.8.70 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703378999 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d5396d0-a1f6-11ee-aa63-351afb0017e4 + + + diff --git a/graph/incidents_graphml/5/5d55b430-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5d55b430-2206-11ee-bfff-c38ddf5b615c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0acabc325d811e6caa507605f2c2042ace5a1ae --- /dev/null +++ b/graph/incidents_graphml/5/5d55b430-2206-11ee-bfff-c38ddf5b615c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.56.93 + 100.64.56.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689312122 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5d55b430-2206-11ee-bfff-c38ddf5b615c + + + diff --git a/graph/incidents_graphml/5/5d5c75d0-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d5c75d0-1687-11ed-af15-7bfc3a566021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac7a9adad450f3bc0dc4afe654c8ce37bc80caba --- /dev/null +++ b/graph/incidents_graphml/5/5d5c75d0-1687-11ed-af15-7bfc3a566021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.67 + 100.64.79.67 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659900616 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d5c75d0-1687-11ed-af15-7bfc3a566021 + + + diff --git a/graph/incidents_graphml/5/5d5db190-10e5-11ed-98bd-158c7bf8b3a5.graphml b/graph/incidents_graphml/5/5d5db190-10e5-11ed-98bd-158c7bf8b3a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1364bd6dd9b7c129ea34991e4e1140efea9d20eb --- /dev/null +++ b/graph/incidents_graphml/5/5d5db190-10e5-11ed-98bd-158c7bf8b3a5.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.220 + 100.64.74.220 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.221 + 100.64.74.221 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.222 + 100.64.74.222 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.250 + 100.64.71.250 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.24.245 + 100.64.24.245 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659281281 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d5db190-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d5db190-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d5db190-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d5db190-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d5db190-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d5db190-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d5db190-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d5db190-10e5-11ed-98bd-158c7bf8b3a5 + + + diff --git a/graph/incidents_graphml/5/5d5e17b0-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d5e17b0-4d3f-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..437384ad65118a2f3d961a43caa87aa9cf01f615 --- /dev/null +++ b/graph/incidents_graphml/5/5d5e17b0-4d3f-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.135 + 100.64.16.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694064504 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d5e17b0-4d3f-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/5/5d5f2a80-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/5/5d5f2a80-0228-11ef-b1dd-bbcb3e283d29.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27b3fd184faf87096e571b37b06cf7fb78a27087 --- /dev/null +++ b/graph/incidents_graphml/5/5d5f2a80-0228-11ef-b1dd-bbcb3e283d29.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.178 + 100.64.24.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713955786 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d5f2a80-0228-11ef-b1dd-bbcb3e283d29 + + + diff --git a/graph/incidents_graphml/5/5d6146f0-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5d6146f0-e327-11ee-8328-d19a3893d959.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15ece067557cda606c10d99aa8941a6b94503f45 --- /dev/null +++ b/graph/incidents_graphml/5/5d6146f0-e327-11ee-8328-d19a3893d959.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.171 + 100.64.26.171 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710546870 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d6146f0-e327-11ee-8328-d19a3893d959 + + + diff --git a/graph/incidents_graphml/5/5d614cc0-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5d614cc0-5c79-11ee-a457-0b0c771a8e8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9ac7abc7d02c5338955bd849f3f5c420d1e7efc --- /dev/null +++ b/graph/incidents_graphml/5/5d614cc0-5c79-11ee-a457-0b0c771a8e8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.36 + 100.64.16.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695738682 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d614cc0-5c79-11ee-a457-0b0c771a8e8f + + + diff --git a/graph/incidents_graphml/5/5d617ee0-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d617ee0-1687-11ed-af15-7bfc3a566021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..870c9cfe2009b96501c180ac758277ec96029552 --- /dev/null +++ b/graph/incidents_graphml/5/5d617ee0-1687-11ed-af15-7bfc3a566021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.67 + 100.64.79.67 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659900616 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d617ee0-1687-11ed-af15-7bfc3a566021 + + + diff --git a/graph/incidents_graphml/5/5d61a090-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d61a090-a1f6-11ee-aa63-351afb0017e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a00cd71cb36f915002cb3ef191d8dc7c335f67b6 --- /dev/null +++ b/graph/incidents_graphml/5/5d61a090-a1f6-11ee-aa63-351afb0017e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.70 + 100.64.8.70 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703378999 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d61a090-a1f6-11ee-aa63-351afb0017e4 + + + diff --git a/graph/incidents_graphml/5/5d63a500-10e5-11ed-98bd-158c7bf8b3a5.graphml b/graph/incidents_graphml/5/5d63a500-10e5-11ed-98bd-158c7bf8b3a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9fbc7af234529a5da2fe496df8f5e6904e94a660 --- /dev/null +++ b/graph/incidents_graphml/5/5d63a500-10e5-11ed-98bd-158c7bf8b3a5.graphml @@ -0,0 +1,529 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.175 + 100.64.71.175 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.223 + 100.64.74.223 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.224 + 100.64.74.224 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.225 + 100.64.74.225 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.226 + 100.64.74.226 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.227 + 100.64.74.227 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.228 + 100.64.74.228 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.11.105 + 100.64.11.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.229 + 100.64.74.229 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.43 + 100.64.1.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.230 + 100.64.74.230 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.231 + 100.64.74.231 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281281 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d63a500-10e5-11ed-98bd-158c7bf8b3a5 + + + diff --git a/graph/incidents_graphml/5/5d646510-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d646510-1687-11ed-af15-7bfc3a566021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a760285db9b92941550de9fb872cd4f1abff472 --- /dev/null +++ b/graph/incidents_graphml/5/5d646510-1687-11ed-af15-7bfc3a566021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.35 + 100.64.71.35 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659900616 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d646510-1687-11ed-af15-7bfc3a566021 + + + diff --git a/graph/incidents_graphml/5/5d68f8f0-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d68f8f0-1687-11ed-af15-7bfc3a566021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae0f53ef9380835090eda7d449a13f41608fc4e0 --- /dev/null +++ b/graph/incidents_graphml/5/5d68f8f0-1687-11ed-af15-7bfc3a566021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.35 + 100.64.71.35 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659900616 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d68f8f0-1687-11ed-af15-7bfc3a566021 + + + diff --git a/graph/incidents_graphml/5/5d6bdf20-1687-11ed-af15-7bfc3a566021.graphml b/graph/incidents_graphml/5/5d6bdf20-1687-11ed-af15-7bfc3a566021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e770fc5e9d917cbf8390e6b09141ca75c7e361d --- /dev/null +++ b/graph/incidents_graphml/5/5d6bdf20-1687-11ed-af15-7bfc3a566021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.68 + 100.64.79.68 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659900616 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d6bdf20-1687-11ed-af15-7bfc3a566021 + + + diff --git a/graph/incidents_graphml/5/5d7019d0-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5d7019d0-5c79-11ee-a457-0b0c771a8e8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b74e26895526f17c6b4d2fb67cbc3828699b1b9 --- /dev/null +++ b/graph/incidents_graphml/5/5d7019d0-5c79-11ee-a457-0b0c771a8e8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.36 + 100.64.16.36 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695738682 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d7019d0-5c79-11ee-a457-0b0c771a8e8f + + + diff --git a/graph/incidents_graphml/5/5d70dc60-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d70dc60-4d3f-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7d39d21483a0200ca500d00556b48c1ee1ac9ed --- /dev/null +++ b/graph/incidents_graphml/5/5d70dc60-4d3f-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.135 + 100.64.16.135 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694064504 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d70dc60-4d3f-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/5/5d7b9130-a1f6-11ee-aa63-351afb0017e4.graphml b/graph/incidents_graphml/5/5d7b9130-a1f6-11ee-aa63-351afb0017e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d358aeda52443e77d1c890bddf93f4adf62effc5 --- /dev/null +++ b/graph/incidents_graphml/5/5d7b9130-a1f6-11ee-aa63-351afb0017e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.23 + 100.64.2.23 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703378999 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d7b9130-a1f6-11ee-aa63-351afb0017e4 + + + diff --git a/graph/incidents_graphml/5/5d8b51a0-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/5/5d8b51a0-033b-11ef-835b-a3623a295d8b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0cf84ffcc177ef6652987e57ce79fc01811c053 --- /dev/null +++ b/graph/incidents_graphml/5/5d8b51a0-033b-11ef-835b-a3623a295d8b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.189 + 100.64.14.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"] + + + INCIDENT_LINK + 1714073897 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d8b51a0-033b-11ef-835b-a3623a295d8b + + + diff --git a/graph/incidents_graphml/5/5d9121b0-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/5/5d9121b0-01a8-11ee-a3af-a97ccd3b2ee2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b59e863ebcccf4aa60ebf6d3b976734bacc4df4 --- /dev/null +++ b/graph/incidents_graphml/5/5d9121b0-01a8-11ee-a3af-a97ccd3b2ee2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.60 + 100.64.59.60 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.1.157 + HOST-13552 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch","Windows Active Directory"] + + + INCIDENT_LINK + 1685753313 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d9121b0-01a8-11ee-a3af-a97ccd3b2ee2 + + + INCIDENT_LINK + 1685753313 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5d9121b0-01a8-11ee-a3af-a97ccd3b2ee2 + + + diff --git a/graph/incidents_graphml/5/5d9cf570-4d3f-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/5/5d9cf570-4d3f-11ee-81da-13947cfea124.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2c4d28b6b7df119bc9fbb9e971ccc22678b6d76 --- /dev/null +++ b/graph/incidents_graphml/5/5d9cf570-4d3f-11ee-81da-13947cfea124.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.85 + 100.64.19.85 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694064504 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5d9cf570-4d3f-11ee-81da-13947cfea124 + + + diff --git a/graph/incidents_graphml/5/5d9de4c0-85f3-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/5/5d9de4c0-85f3-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2531206aa7be4d99bd1728cd991143a88438a18b --- /dev/null +++ b/graph/incidents_graphml/5/5d9de4c0-85f3-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.60 + 100.64.43.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.45 + 100.64.43.45 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.61 + 100.64.43.61 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.62 + 100.64.43.62 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.129 + 100.64.37.129 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.63 + 100.64.43.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700299079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5d9de4c0-85f3-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/5/5dab42f0-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5dab42f0-683e-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d13b7cd495b3137ba676b1e429304537a24f797c --- /dev/null +++ b/graph/incidents_graphml/5/5dab42f0-683e-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.137 + 100.64.31.137 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697032756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5dab42f0-683e-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/5/5dabfcb0-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/5/5dabfcb0-01a8-11ee-a3af-a97ccd3b2ee2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e917306f5a7c4e5860146ac65cbbee0f36d1723f --- /dev/null +++ b/graph/incidents_graphml/5/5dabfcb0-01a8-11ee-a3af-a97ccd3b2ee2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.240 + 100.64.75.240 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685753313 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5dabfcb0-01a8-11ee-a3af-a97ccd3b2ee2 + + + diff --git a/graph/incidents_graphml/5/5db07910-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/5/5db07910-2611-11ee-a11d-5dcee9a57544.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bc2bdd7aa66aea8e33be22bcf2c561a2cbe0786 --- /dev/null +++ b/graph/incidents_graphml/5/5db07910-2611-11ee-a11d-5dcee9a57544.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.121 + USER-0015-1422.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689756652 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5db07910-2611-11ee-a11d-5dcee9a57544 + + + diff --git a/graph/incidents_graphml/5/5db094a0-9a2e-11ed-8014-c5d8423138bb.graphml b/graph/incidents_graphml/5/5db094a0-9a2e-11ed-8014-c5d8423138bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72088cb67f94d87f08c54b77c8ed8766a1723eac --- /dev/null +++ b/graph/incidents_graphml/5/5db094a0-9a2e-11ed-8014-c5d8423138bb.graphml @@ -0,0 +1,681 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.234.64.242 + 10.234.64.242 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.132.138.113 + 10.132.138.113 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.176.143.156 + 10.176.143.156 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.20.9.75 + 172.20.9.75 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 172.31.87.107 + 172.31.87.107 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 172.31.149.232 + 172.31.149.232 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 10.181.72.179 + 10.181.72.179 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 172.17.151.175 + 172.17.151.175 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 172.20.120.130 + 172.20.120.130 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 172.21.160.184 + 172.21.160.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 172.22.25.138 + 172.22.25.138 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 10.62.139.7 + 10.62.139.7 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.19.54.137 + 172.19.54.137 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"] + + + HOST + 172.16.135.111 + 172.16.135.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 10.88.59.124 + 10.88.59.124 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.140.185 + 172.22.140.185 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.0.149 + 100.64.0.149 + ["Exploiting Target","Exploiting Host"] + 0.93671875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 172.16.175.139 + 172.16.175.139 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + INCIDENT_LINK + 1674375944 + malicious + 0.93671875 + 0.93671875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db094a0-9a2e-11ed-8014-c5d8423138bb + + + diff --git a/graph/incidents_graphml/5/5db11910-0938-11ee-a886-17db84346526.graphml b/graph/incidents_graphml/5/5db11910-0938-11ee-a886-17db84346526.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca4336088896d9e1fabe2a4626751df2e38866b9 --- /dev/null +++ b/graph/incidents_graphml/5/5db11910-0938-11ee-a886-17db84346526.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.202 + 100.64.8.202 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.45 + USER-0015-1421.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.123 + 100.64.8.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686584819 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db11910-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584819 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db11910-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584819 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db11910-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584819 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db11910-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584819 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db11910-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584819 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db11910-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584819 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db11910-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584819 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5db11910-0938-11ee-a886-17db84346526 + + + diff --git a/graph/incidents_graphml/5/5dbaac40-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5dbaac40-683e-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7e86f888cc7a25964eb91d33a9ab5f1965749fc --- /dev/null +++ b/graph/incidents_graphml/5/5dbaac40-683e-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.137 + 100.64.31.137 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697032756 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5dbaac40-683e-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/5/5dc32e30-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/5/5dc32e30-01a8-11ee-a3af-a97ccd3b2ee2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..749b418167779cb0eaa4dae5718ebdc6108e26b0 --- /dev/null +++ b/graph/incidents_graphml/5/5dc32e30-01a8-11ee-a3af-a97ccd3b2ee2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.75.240 + 100.64.75.240 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685753313 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5dc32e30-01a8-11ee-a3af-a97ccd3b2ee2 + + + diff --git a/graph/incidents_graphml/5/5dc62910-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5dc62910-5c79-11ee-a457-0b0c771a8e8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4138083ba6fbc4dfaef336b1d4a744f304dbd57c --- /dev/null +++ b/graph/incidents_graphml/5/5dc62910-5c79-11ee-a457-0b0c771a8e8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.38 + 100.64.16.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695738682 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5dc62910-5c79-11ee-a457-0b0c771a8e8f + + + diff --git a/graph/incidents_graphml/5/5dc7f8b0-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/5/5dc7f8b0-2611-11ee-a11d-5dcee9a57544.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a899cfd5bef9e0fa0359540e2a0c602dd5b4f2b --- /dev/null +++ b/graph/incidents_graphml/5/5dc7f8b0-2611-11ee-a11d-5dcee9a57544.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.123 + 100.64.57.123 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689756652 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5dc7f8b0-2611-11ee-a11d-5dcee9a57544 + + + diff --git a/graph/incidents_graphml/5/5dd0d2b0-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/5/5dd0d2b0-090f-11ee-8afe-6d26bac63fb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b71061a7aaa0de2f72b81e48445b4d359c13f174 --- /dev/null +++ b/graph/incidents_graphml/5/5dd0d2b0-090f-11ee-8afe-6d26bac63fb3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.44 + 100.64.78.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686567209 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5dd0d2b0-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567209 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5dd0d2b0-090f-11ee-8afe-6d26bac63fb3 + + + diff --git a/graph/incidents_graphml/5/5dd432d0-5c79-11ee-a457-0b0c771a8e8f.graphml b/graph/incidents_graphml/5/5dd432d0-5c79-11ee-a457-0b0c771a8e8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49f9339284c5eeba25e4af74ab61d42fb91539ab --- /dev/null +++ b/graph/incidents_graphml/5/5dd432d0-5c79-11ee-a457-0b0c771a8e8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.38 + 100.64.16.38 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695738683 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5dd432d0-5c79-11ee-a457-0b0c771a8e8f + + + diff --git a/graph/incidents_graphml/5/5de02160-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5de02160-3403-11ee-94d6-7df16e3753d9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f67077101e08b5338da66c43818877781e63115 --- /dev/null +++ b/graph/incidents_graphml/5/5de02160-3403-11ee-94d6-7df16e3753d9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.221 + 100.64.24.221 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691289956 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5de02160-3403-11ee-94d6-7df16e3753d9 + + + diff --git a/graph/incidents_graphml/5/5de13420-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/5de13420-b883-11ed-8865-15eeb644fed8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5d941370f4af2b8778ca23a3f62987c945636e6 --- /dev/null +++ b/graph/incidents_graphml/5/5de13420-b883-11ed-8865-15eeb644fed8.graphml @@ -0,0 +1,129 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.166 + 100.64.91.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + USER-0015-1984.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.190.96.179 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1677710987 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5de13420-b883-11ed-8865-15eeb644fed8 + + + INCIDENT_LINK + 1677710987 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5de13420-b883-11ed-8865-15eeb644fed8 + + + INCIDENT_LINK + 1677710987 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5de13420-b883-11ed-8865-15eeb644fed8 + + + INCIDENT_LINK + 1677710987 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5de13420-b883-11ed-8865-15eeb644fed8 + + + diff --git a/graph/incidents_graphml/5/5de3be70-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/5/5de3be70-090f-11ee-8afe-6d26bac63fb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc0dbe7d93dea58adf2b3c4561674aba2d954746 --- /dev/null +++ b/graph/incidents_graphml/5/5de3be70-090f-11ee-8afe-6d26bac63fb3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.47 + 100.64.78.47 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.51 + 100.64.72.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686567210 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5de3be70-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567210 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5de3be70-090f-11ee-8afe-6d26bac63fb3 + + + diff --git a/graph/incidents_graphml/5/5de4b690-b883-11ed-8865-15eeb644fed8.graphml b/graph/incidents_graphml/5/5de4b690-b883-11ed-8865-15eeb644fed8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21ee18151e9e5c9a4c9c8a1bb0819ecbfd0096ae --- /dev/null +++ b/graph/incidents_graphml/5/5de4b690-b883-11ed-8865-15eeb644fed8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.166 + 100.64.91.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677710987 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5de4b690-b883-11ed-8865-15eeb644fed8 + + + diff --git a/graph/incidents_graphml/5/5ded35f0-73c2-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/5/5ded35f0-73c2-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e216b1572d55c845e5550d762ee96f1008b75529 --- /dev/null +++ b/graph/incidents_graphml/5/5ded35f0-73c2-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.131 + 100.64.82.131 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.173 + 100.64.1.173 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.82.132 + 100.64.82.132 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.76 + 100.64.74.76 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.81.94 + 100.64.81.94 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1670151415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ded35f0-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ded35f0-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ded35f0-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ded35f0-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ded35f0-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ded35f0-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ded35f0-73c2-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670151415 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ded35f0-73c2-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/5/5df54aa0-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/5/5df54aa0-090f-11ee-8afe-6d26bac63fb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7203981649f90c4028c2ba14f122586f933dd3ba --- /dev/null +++ b/graph/incidents_graphml/5/5df54aa0-090f-11ee-8afe-6d26bac63fb3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.60 + 100.64.21.60 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.202 + 100.64.72.202 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.48 + 100.64.78.48 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686567210 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5df54aa0-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567210 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5df54aa0-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567210 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5df54aa0-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567210 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5df54aa0-090f-11ee-8afe-6d26bac63fb3 + + + diff --git a/graph/incidents_graphml/5/5dfd1600-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5dfd1600-8807-11ee-bd27-a396646abc8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f243c020e17a4e2f842de5f882833b31414b60d --- /dev/null +++ b/graph/incidents_graphml/5/5dfd1600-8807-11ee-bd27-a396646abc8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.80 + 100.64.15.80 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700527571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5dfd1600-8807-11ee-bd27-a396646abc8f + + + diff --git a/graph/incidents_graphml/5/5dffc380-00b8-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/5/5dffc380-00b8-11ef-8b56-b9c5ad676a8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6275ba77786556d728861e4fbacf08486695b79d --- /dev/null +++ b/graph/incidents_graphml/5/5dffc380-00b8-11ef-8b56-b9c5ad676a8a.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.224.126.31 + 10.224.126.31 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW","Vulnerability Management","Windows Active Directory"] + + + HOST + 100.64.70.165 + USER-0015-1593.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.166 + 100.64.70.166 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.167 + 100.64.70.167 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713797732 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5dffc380-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797732 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5dffc380-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797732 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5dffc380-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797732 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5dffc380-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797732 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5dffc380-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797732 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5dffc380-00b8-11ef-8b56-b9c5ad676a8a + + + diff --git a/graph/incidents_graphml/5/5e04c060-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5e04c060-3403-11ee-94d6-7df16e3753d9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..781675466a0c22c7513f1b986598ce3c8a92ba98 --- /dev/null +++ b/graph/incidents_graphml/5/5e04c060-3403-11ee-94d6-7df16e3753d9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.221 + 100.64.24.221 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691289956 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5e04c060-3403-11ee-94d6-7df16e3753d9 + + + diff --git a/graph/incidents_graphml/5/5e04dc50-317b-11ef-927c-272449d34670.graphml b/graph/incidents_graphml/5/5e04dc50-317b-11ef-927c-272449d34670.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3c95fbf6c56f571bc3b63cffe9f3af7378ae2f9 --- /dev/null +++ b/graph/incidents_graphml/5/5e04dc50-317b-11ef-927c-272449d34670.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.46.208 + USER-0015-1982.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.198 + USER-0015-2116.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719159140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5e04dc50-317b-11ef-927c-272449d34670 + + + diff --git a/graph/incidents_graphml/5/5e0ccd70-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5e0ccd70-8807-11ee-bd27-a396646abc8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8283d5e60bb4689b673818b153aaa72c211ade2 --- /dev/null +++ b/graph/incidents_graphml/5/5e0ccd70-8807-11ee-bd27-a396646abc8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.80 + 100.64.15.80 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700527571 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e0ccd70-8807-11ee-bd27-a396646abc8f + + + diff --git a/graph/incidents_graphml/5/5e10bea0-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/5/5e10bea0-075e-11ee-a67b-a9ce333dbcaf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..496b8924ad523b87c487c7a5c6cc4975204ffe55 --- /dev/null +++ b/graph/incidents_graphml/5/5e10bea0-075e-11ee-a67b-a9ce333dbcaf.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.129 + 100.64.25.129 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.250 + 100.64.70.250 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.195 + 100.64.75.195 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.196 + 100.64.75.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.197 + 100.64.75.197 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.55 + 100.64.1.55 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.21.68 + 100.64.21.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.198 + 100.64.75.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.199 + 100.64.75.199 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.200 + 100.64.75.200 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e10bea0-075e-11ee-a67b-a9ce333dbcaf + + + diff --git a/graph/incidents_graphml/5/5e15d760-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5e15d760-3403-11ee-94d6-7df16e3753d9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..181515d59b0c4d8a0f6b761c8afae513bdd7c251 --- /dev/null +++ b/graph/incidents_graphml/5/5e15d760-3403-11ee-94d6-7df16e3753d9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.204 + 100.64.44.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691289956 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5e15d760-3403-11ee-94d6-7df16e3753d9 + + + diff --git a/graph/incidents_graphml/5/5e195250-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5e195250-2206-11ee-bfff-c38ddf5b615c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..629b4d19b0541561558e393b857cbf877fd95b1d --- /dev/null +++ b/graph/incidents_graphml/5/5e195250-2206-11ee-bfff-c38ddf5b615c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.7.24.192 + 192.168.14.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.145 + 100.64.76.145 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689312124 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e195250-2206-11ee-bfff-c38ddf5b615c + + + INCIDENT_LINK + 1689312124 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e195250-2206-11ee-bfff-c38ddf5b615c + + + diff --git a/graph/incidents_graphml/5/5e1db630-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/5/5e1db630-1f34-11ee-bd83-b52c9cbf0232.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0343ef568bfa8e762ae6208b420dbb009e4abc7a --- /dev/null +++ b/graph/incidents_graphml/5/5e1db630-1f34-11ee-bd83-b52c9cbf0232.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.42 + 100.64.77.42 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.89 + 100.64.73.89 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689002027 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e1db630-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689002027 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e1db630-1f34-11ee-bd83-b52c9cbf0232 + + + diff --git a/graph/incidents_graphml/5/5e1fe3b0-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/5/5e1fe3b0-dcdf-11ee-9697-039b254a6d03.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa9032566186a20bacba203fe41511ea45de6dc8 --- /dev/null +++ b/graph/incidents_graphml/5/5e1fe3b0-dcdf-11ee-9697-039b254a6d03.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.25.11 + 100.64.25.11 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709856241 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e1fe3b0-dcdf-11ee-9697-039b254a6d03 + + + diff --git a/graph/incidents_graphml/5/5e256a60-41e5-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/5/5e256a60-41e5-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51f63cca671315266869f5570f1e313e7e18e7b5 --- /dev/null +++ b/graph/incidents_graphml/5/5e256a60-41e5-11ed-ad31-51848920452c.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.213 + 100.64.75.213 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.196 + 100.64.75.196 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.75.214 + 100.64.75.214 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.215 + 100.64.75.215 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.62 + 100.64.72.62 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.216 + 100.64.75.216 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664668890 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e256a60-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668890 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e256a60-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668890 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e256a60-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668890 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e256a60-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668890 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e256a60-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668890 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e256a60-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668890 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e256a60-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668890 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e256a60-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668890 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e256a60-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668890 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e256a60-41e5-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/5/5e2e3580-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5e2e3580-552d-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..107d42aa000e6be9b5dbbf3ad5b93d0bec525a2e --- /dev/null +++ b/graph/incidents_graphml/5/5e2e3580-552d-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.66 + 100.64.51.66 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694936383 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5e2e3580-552d-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/5/5e300230-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/5/5e300230-fe0c-11ec-809b-91d71d0233d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25d15e6ffe7b4d31f52012f77c8bb06b8923e735 --- /dev/null +++ b/graph/incidents_graphml/5/5e300230-fe0c-11ec-809b-91d71d0233d6.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.17 + 100.64.79.17 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.18 + 100.64.79.18 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657208961 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e300230-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208961 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e300230-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208961 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e300230-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208961 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e300230-fe0c-11ec-809b-91d71d0233d6 + + + diff --git a/graph/incidents_graphml/5/5e326010-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5e326010-3403-11ee-94d6-7df16e3753d9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d380226819564ea8c9685296ff97bb7c97a4a2a6 --- /dev/null +++ b/graph/incidents_graphml/5/5e326010-3403-11ee-94d6-7df16e3753d9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.204 + 100.64.44.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691289956 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5e326010-3403-11ee-94d6-7df16e3753d9 + + + diff --git a/graph/incidents_graphml/5/5e3470c0-45bb-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/5/5e3470c0-45bb-11ee-853f-87a1872d184b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76ea942e26ab99b48c1a94b59b62fa1a20840abd --- /dev/null +++ b/graph/incidents_graphml/5/5e3470c0-45bb-11ee-853f-87a1872d184b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.110 + 100.64.24.110 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693238153 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5e3470c0-45bb-11ee-853f-87a1872d184b + + + diff --git a/graph/incidents_graphml/5/5e34deb0-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5e34deb0-4dfa-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..661d5697347b8d81e891db2746a457979d9b9c58 --- /dev/null +++ b/graph/incidents_graphml/5/5e34deb0-4dfa-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.151 + 100.64.10.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694144821 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5e34deb0-4dfa-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/5/5e40ac10-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5e40ac10-552d-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78c10f864fd2cc0ecf0b9376403493c9b9efa0aa --- /dev/null +++ b/graph/incidents_graphml/5/5e40ac10-552d-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.66 + 100.64.51.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694936383 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e40ac10-552d-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/5/5e44c470-45bb-11ee-853f-87a1872d184b.graphml b/graph/incidents_graphml/5/5e44c470-45bb-11ee-853f-87a1872d184b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af8cb452aa4d86556988cb2724725fe7cb2ea353 --- /dev/null +++ b/graph/incidents_graphml/5/5e44c470-45bb-11ee-853f-87a1872d184b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.110 + 100.64.24.110 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693238153 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e44c470-45bb-11ee-853f-87a1872d184b + + + diff --git a/graph/incidents_graphml/5/5e4ac750-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5e4ac750-77e1-11ee-95df-1f31585c14cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9977c1a2d57a122a5345111b9feae50aca252164 --- /dev/null +++ b/graph/incidents_graphml/5/5e4ac750-77e1-11ee-95df-1f31585c14cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.113 + 100.64.40.113 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698752032 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e4ac750-77e1-11ee-95df-1f31585c14cb + + + diff --git a/graph/incidents_graphml/5/5e4c5e50-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5e4c5e50-4dfa-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba48413d80ec1660ec42206882e295ce7f298327 --- /dev/null +++ b/graph/incidents_graphml/5/5e4c5e50-4dfa-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.151 + 100.64.10.151 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694144821 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e4c5e50-4dfa-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/5/5e4e2510-fe5c-11ee-894d-f3eebee8c21c.graphml b/graph/incidents_graphml/5/5e4e2510-fe5c-11ee-894d-f3eebee8c21c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..390bcd7af9c7b7aadc29cf4e9511609f2e8344c2 --- /dev/null +++ b/graph/incidents_graphml/5/5e4e2510-fe5c-11ee-894d-f3eebee8c21c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.146 + 100.64.17.146 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"] + + + INCIDENT_LINK + 1713538316 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e4e2510-fe5c-11ee-894d-f3eebee8c21c + + + diff --git a/graph/incidents_graphml/5/5e506f00-fe5c-11ee-894d-f3eebee8c21c.graphml b/graph/incidents_graphml/5/5e506f00-fe5c-11ee-894d-f3eebee8c21c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43967ef45a91c1d1e54989a7ce898c49a55b9eec --- /dev/null +++ b/graph/incidents_graphml/5/5e506f00-fe5c-11ee-894d-f3eebee8c21c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"] + + + HOST + 100.64.17.146 + 100.64.17.146 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713538316 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e506f00-fe5c-11ee-894d-f3eebee8c21c + + + diff --git a/graph/incidents_graphml/5/5e540610-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5e540610-683e-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..020dadf2e329f397d66166e29040def39516f077 --- /dev/null +++ b/graph/incidents_graphml/5/5e540610-683e-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.139 + 100.64.31.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697032757 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5e540610-683e-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/5/5e63f4a0-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5e63f4a0-77e1-11ee-95df-1f31585c14cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..815b175b1b4fd10891015815d272b14ad0b5eb29 --- /dev/null +++ b/graph/incidents_graphml/5/5e63f4a0-77e1-11ee-95df-1f31585c14cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.12 + 100.64.17.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698752033 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e63f4a0-77e1-11ee-95df-1f31585c14cb + + + diff --git a/graph/incidents_graphml/5/5e6432b0-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5e6432b0-683e-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf3fcba8493f29a7e0163107dde511e6687c3a8c --- /dev/null +++ b/graph/incidents_graphml/5/5e6432b0-683e-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.139 + 100.64.31.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697032757 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e6432b0-683e-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/5/5e64c850-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5e64c850-4dfa-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ed055f088bc25cf314fe4889738c685c658c63c --- /dev/null +++ b/graph/incidents_graphml/5/5e64c850-4dfa-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.135 + 100.64.16.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694144821 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5e64c850-4dfa-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/5/5e715210-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5e715210-683e-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c26dd3b30fa746c422797a28164d5f567c55678 --- /dev/null +++ b/graph/incidents_graphml/5/5e715210-683e-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.77 + 100.64.3.77 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697032757 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e715210-683e-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/5/5e747470-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/5/5e747470-2ade-11ed-961c-99a30b1a3145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c72511a8aa06d3351816b374d3cc15500ed6a4c --- /dev/null +++ b/graph/incidents_graphml/5/5e747470-2ade-11ed-961c-99a30b1a3145.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.149.125 + 192.168.149.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.83.8 + 100.64.83.8 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662137007 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e747470-2ade-11ed-961c-99a30b1a3145 + + + INCIDENT_LINK + 1662137007 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5e747470-2ade-11ed-961c-99a30b1a3145 + + + diff --git a/graph/incidents_graphml/5/5e78ec90-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5e78ec90-4dfa-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5999715839b653250c193a1c9b998455240d766 --- /dev/null +++ b/graph/incidents_graphml/5/5e78ec90-4dfa-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.135 + 100.64.16.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694144821 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5e78ec90-4dfa-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/5/5e7964e0-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5e7964e0-e13e-11ee-a61b-817c3085f6d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55760606f4e11fc3512502f04fc55477320e671a --- /dev/null +++ b/graph/incidents_graphml/5/5e7964e0-e13e-11ee-a61b-817c3085f6d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.212 + 100.64.9.212 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710336848 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5e7964e0-e13e-11ee-a61b-817c3085f6d7 + + + diff --git a/graph/incidents_graphml/5/5e8cc5d0-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5e8cc5d0-e13e-11ee-a61b-817c3085f6d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf125f6d676092509bd21712b9928107bf7411fa --- /dev/null +++ b/graph/incidents_graphml/5/5e8cc5d0-e13e-11ee-a61b-817c3085f6d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.212 + 100.64.9.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710336848 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5e8cc5d0-e13e-11ee-a61b-817c3085f6d7 + + + diff --git a/graph/incidents_graphml/5/5e8d9cb0-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5e8d9cb0-77e1-11ee-95df-1f31585c14cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be27b6777a94ab4d6c54a4524e1d05debd36afe3 --- /dev/null +++ b/graph/incidents_graphml/5/5e8d9cb0-77e1-11ee-95df-1f31585c14cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.115 + 100.64.40.115 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698752033 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5e8d9cb0-77e1-11ee-95df-1f31585c14cb + + + diff --git a/graph/incidents_graphml/5/5e98abe0-9d12-11ee-a559-a1780370c51a.graphml b/graph/incidents_graphml/5/5e98abe0-9d12-11ee-a559-a1780370c51a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b7274ea1171f6ca11b4901ee5d3b347db2c304d --- /dev/null +++ b/graph/incidents_graphml/5/5e98abe0-9d12-11ee-a559-a1780370c51a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.11 + 100.64.2.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702841271 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5e98abe0-9d12-11ee-a559-a1780370c51a + + + diff --git a/graph/incidents_graphml/5/5e9ccb60-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5e9ccb60-e13e-11ee-a61b-817c3085f6d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a0c7cc7a105049a6aee4c4f7a72a4e8108e222a --- /dev/null +++ b/graph/incidents_graphml/5/5e9ccb60-e13e-11ee-a61b-817c3085f6d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.57 + USER-0015-1203.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710336848 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5e9ccb60-e13e-11ee-a61b-817c3085f6d7 + + + diff --git a/graph/incidents_graphml/5/5ea20990-fcd3-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/5/5ea20990-fcd3-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4fd4ad1f53ef0a50d0740a8b111ef3e5c7aa3e6 --- /dev/null +++ b/graph/incidents_graphml/5/5ea20990-fcd3-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.13.129 + 100.64.13.129 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685222027 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ea20990-fcd3-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/5/5ea3df20-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/5/5ea3df20-f286-11ec-babd-d5ed2eda1ac6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0b912eb7d39463d89bcd6bf8e8a4532286295d6 --- /dev/null +++ b/graph/incidents_graphml/5/5ea3df20-f286-11ec-babd-d5ed2eda1ac6.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.101 + 100.64.81.101 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.25 + USER-0015-1893.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.112 + 100.64.71.112 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.102 + 100.64.81.102 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.21.111 + 100.64.21.111 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655941946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ea3df20-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ea3df20-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ea3df20-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ea3df20-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ea3df20-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ea3df20-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ea3df20-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ea3df20-f286-11ec-babd-d5ed2eda1ac6 + + + diff --git a/graph/incidents_graphml/5/5ea431f0-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5ea431f0-77e1-11ee-95df-1f31585c14cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d11c67009a2f0a5680daef4921c092564e341353 --- /dev/null +++ b/graph/incidents_graphml/5/5ea431f0-77e1-11ee-95df-1f31585c14cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.115 + 100.64.40.115 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698752033 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ea431f0-77e1-11ee-95df-1f31585c14cb + + + diff --git a/graph/incidents_graphml/5/5ea6c120-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/5/5ea6c120-4106-11ee-b538-995248355bc9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3608f2ddcae46adcbeeb35926d6a3ef869e5074 --- /dev/null +++ b/graph/incidents_graphml/5/5ea6c120-4106-11ee-b538-995248355bc9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692720610 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ea6c120-4106-11ee-b538-995248355bc9 + + + diff --git a/graph/incidents_graphml/5/5eaf1ae0-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5eaf1ae0-e13e-11ee-a61b-817c3085f6d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2224207a44da3ad953f541e050320cfcf10422db --- /dev/null +++ b/graph/incidents_graphml/5/5eaf1ae0-e13e-11ee-a61b-817c3085f6d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.57 + USER-0015-1203.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710336848 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5eaf1ae0-e13e-11ee-a61b-817c3085f6d7 + + + diff --git a/graph/incidents_graphml/5/5eb599d0-3403-11ee-94d6-7df16e3753d9.graphml b/graph/incidents_graphml/5/5eb599d0-3403-11ee-94d6-7df16e3753d9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4e371812e8baefb66fcfa495fe9cde1a2aa382d --- /dev/null +++ b/graph/incidents_graphml/5/5eb599d0-3403-11ee-94d6-7df16e3753d9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.216 + 100.64.13.216 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691289957 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5eb599d0-3403-11ee-94d6-7df16e3753d9 + + + diff --git a/graph/incidents_graphml/5/5eb5ce80-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5eb5ce80-4dfa-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ee65a1677e11b16a2aef9d2b1236d9de8253dcf --- /dev/null +++ b/graph/incidents_graphml/5/5eb5ce80-4dfa-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.137 + 100.64.16.137 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694144822 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5eb5ce80-4dfa-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/5/5eba38d0-27e5-11ed-95a8-93fe9a2e5fea.graphml b/graph/incidents_graphml/5/5eba38d0-27e5-11ed-95a8-93fe9a2e5fea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9527da80830430247a1c911e8262c788e74e1dd3 --- /dev/null +++ b/graph/incidents_graphml/5/5eba38d0-27e5-11ed-95a8-93fe9a2e5fea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.164 + 100.64.84.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661810160 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5eba38d0-27e5-11ed-95a8-93fe9a2e5fea + + + diff --git a/graph/incidents_graphml/5/5ebbfca0-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/5/5ebbfca0-dcdf-11ee-9697-039b254a6d03.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c56b93d43983d0a984085771ca004cef649858be --- /dev/null +++ b/graph/incidents_graphml/5/5ebbfca0-dcdf-11ee-9697-039b254a6d03.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.27 + 100.64.51.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1709856242 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ebbfca0-dcdf-11ee-9697-039b254a6d03 + + + diff --git a/graph/incidents_graphml/5/5ebc27f0-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/5ebc27f0-402d-11ef-b594-eb5862a3661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5938434091b5f1d0acbba4569ad5d0ecb3696f8 --- /dev/null +++ b/graph/incidents_graphml/5/5ebc27f0-402d-11ef-b594-eb5862a3661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.111 + 100.64.85.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1720774907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ebc27f0-402d-11ef-b594-eb5862a3661d + + + diff --git a/graph/incidents_graphml/5/5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13b37cb70ffc1d3e13a7ae6815f5c3a4a0bee4cd --- /dev/null +++ b/graph/incidents_graphml/5/5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,273 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.68 + 100.64.51.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.69 + 100.64.51.69 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.70 + 100.64.51.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.110 + 100.64.34.110 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.71 + 100.64.51.71 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.72 + 100.64.51.72 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + INCIDENT_LINK + 1694936384 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebc6bc0-552d-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/5/5ebd1120-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5ebd1120-77e1-11ee-95df-1f31585c14cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92ce73dcda792cbe1f628b6969498f2163db2d4e --- /dev/null +++ b/graph/incidents_graphml/5/5ebd1120-77e1-11ee-95df-1f31585c14cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.117 + 100.64.40.117 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698752033 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ebd1120-77e1-11ee-95df-1f31585c14cb + + + diff --git a/graph/incidents_graphml/5/5ec1d930-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/5/5ec1d930-6e77-11ee-9076-51a308ac33b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6333803d6be6c1c993782444082ce533ceb5c279 --- /dev/null +++ b/graph/incidents_graphml/5/5ec1d930-6e77-11ee-9076-51a308ac33b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.150 + 100.64.15.150 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697716946 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ec1d930-6e77-11ee-9076-51a308ac33b9 + + + diff --git a/graph/incidents_graphml/5/5ec2f740-8a91-11ed-a926-5baf9df8c45e.graphml b/graph/incidents_graphml/5/5ec2f740-8a91-11ed-a926-5baf9df8c45e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2947b1a0b1ee535285ff36d550bc8b582d188810 --- /dev/null +++ b/graph/incidents_graphml/5/5ec2f740-8a91-11ed-a926-5baf9df8c45e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.56 + 100.64.80.56 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1672659248 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ec2f740-8a91-11ed-a926-5baf9df8c45e + + + diff --git a/graph/incidents_graphml/5/5ec7cfe0-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5ec7cfe0-4dfa-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b231c48ff2e38a41806766d69d15959d94e2b82 --- /dev/null +++ b/graph/incidents_graphml/5/5ec7cfe0-4dfa-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.137 + 100.64.16.137 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694144822 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ec7cfe0-4dfa-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/5/5eca7580-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5eca7580-552d-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b9b1b9b0b48abe8027b440f84c127672536d72a --- /dev/null +++ b/graph/incidents_graphml/5/5eca7580-552d-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.68 + 100.64.51.68 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694936384 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5eca7580-552d-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/5/5ed184b0-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/5/5ed184b0-402d-11ef-b594-eb5862a3661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a242b883fe81cb29cc8df2817290634bc55ca4ad --- /dev/null +++ b/graph/incidents_graphml/5/5ed184b0-402d-11ef-b594-eb5862a3661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.85.111 + 100.64.85.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720774908 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ed184b0-402d-11ef-b594-eb5862a3661d + + + diff --git a/graph/incidents_graphml/5/5ed37490-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5ed37490-e327-11ee-8328-d19a3893d959.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9aed5dc6a0bdc40079677c70b9825408271f21c1 --- /dev/null +++ b/graph/incidents_graphml/5/5ed37490-e327-11ee-8328-d19a3893d959.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.102 + 100.64.20.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710546872 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ed37490-e327-11ee-8328-d19a3893d959 + + + diff --git a/graph/incidents_graphml/5/5ed63b60-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/5/5ed63b60-dcdf-11ee-9697-039b254a6d03.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f46507bbba3c50499c508c8998acd6165174ca6e --- /dev/null +++ b/graph/incidents_graphml/5/5ed63b60-dcdf-11ee-9697-039b254a6d03.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.51.27 + 100.64.51.27 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709856242 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ed63b60-dcdf-11ee-9697-039b254a6d03 + + + diff --git a/graph/incidents_graphml/5/5ed699b0-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/5/5ed699b0-6e77-11ee-9076-51a308ac33b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..114fb0996b28644115030ce18eb1d93d2ae882d1 --- /dev/null +++ b/graph/incidents_graphml/5/5ed699b0-6e77-11ee-9076-51a308ac33b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.150 + 100.64.15.150 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697716946 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ed699b0-6e77-11ee-9076-51a308ac33b9 + + + diff --git a/graph/incidents_graphml/5/5ed74aa0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5ed74aa0-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d478acf656e9ec3b8c425cbbf93aca18a2d05d48 --- /dev/null +++ b/graph/incidents_graphml/5/5ed74aa0-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.37 + 100.64.47.37 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475237 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ed74aa0-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/5/5ed84aa0-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5ed84aa0-4dfa-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2963d73802c9aafdf4547cdbf2cd6b28cfb4866 --- /dev/null +++ b/graph/incidents_graphml/5/5ed84aa0-4dfa-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.139 + 100.64.16.139 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694144822 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ed84aa0-4dfa-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/5/5ee177e0-fe0c-11ec-809b-91d71d0233d6.graphml b/graph/incidents_graphml/5/5ee177e0-fe0c-11ec-809b-91d71d0233d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3be178be43ce3b97bbbdc1e90b04c0997e1fa203 --- /dev/null +++ b/graph/incidents_graphml/5/5ee177e0-fe0c-11ec-809b-91d71d0233d6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.221 + 100.64.74.221 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.79.19 + 100.64.79.19 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657208962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ee177e0-fe0c-11ec-809b-91d71d0233d6 + + + INCIDENT_LINK + 1657208962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ee177e0-fe0c-11ec-809b-91d71d0233d6 + + + diff --git a/graph/incidents_graphml/5/5ee247b0-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/5/5ee247b0-f286-11ec-babd-d5ed2eda1ac6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..addd73c87565d060aa2f163d465040ee9635aebf --- /dev/null +++ b/graph/incidents_graphml/5/5ee247b0-f286-11ec-babd-d5ed2eda1ac6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.103 + 100.64.81.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.196 + 100.64.72.196 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655941947 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ee247b0-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941947 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ee247b0-f286-11ec-babd-d5ed2eda1ac6 + + + diff --git a/graph/incidents_graphml/5/5ee4aa90-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/5/5ee4aa90-08e2-11ef-ae93-51753793321f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1be438ba45e3ac2d71c558e7e32b174375a81bb --- /dev/null +++ b/graph/incidents_graphml/5/5ee4aa90-08e2-11ef-ae93-51753793321f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.20.255 + 100.64.20.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714695382 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5ee4aa90-08e2-11ef-ae93-51753793321f + + + diff --git a/graph/incidents_graphml/5/5ee5c410-e327-11ee-8328-d19a3893d959.graphml b/graph/incidents_graphml/5/5ee5c410-e327-11ee-8328-d19a3893d959.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af74a2469ab838e875aa853dd07346f94ebb99a1 --- /dev/null +++ b/graph/incidents_graphml/5/5ee5c410-e327-11ee-8328-d19a3893d959.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.102 + 100.64.20.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710546873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ee5c410-e327-11ee-8328-d19a3893d959 + + + diff --git a/graph/incidents_graphml/5/5eeacf80-317b-11ef-927c-272449d34670.graphml b/graph/incidents_graphml/5/5eeacf80-317b-11ef-927c-272449d34670.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1fa154678082c68056ec48d62ec122ef8aa01a2f --- /dev/null +++ b/graph/incidents_graphml/5/5eeacf80-317b-11ef-927c-272449d34670.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + USER-0015-1979.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.34 + USER-0015-2117.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719159141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5eeacf80-317b-11ef-927c-272449d34670 + + + diff --git a/graph/incidents_graphml/5/5ef50c50-2206-11ee-bfff-c38ddf5b615c.graphml b/graph/incidents_graphml/5/5ef50c50-2206-11ee-bfff-c38ddf5b615c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e6965945b9151e74096f0b1b5fa7f6b72a04ad7 --- /dev/null +++ b/graph/incidents_graphml/5/5ef50c50-2206-11ee-bfff-c38ddf5b615c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.146 + 100.64.76.146 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689312125 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ef50c50-2206-11ee-bfff-c38ddf5b615c + + + diff --git a/graph/incidents_graphml/5/5ef9ac30-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5ef9ac30-0b89-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1774822e1f5fefa042d5439e1f1ac09aecb129f --- /dev/null +++ b/graph/incidents_graphml/5/5ef9ac30-0b89-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.249 + 100.64.18.249 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.37 + 100.64.76.37 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686839512 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ef9ac30-0b89-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/5/5efa2a80-4dfa-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/5/5efa2a80-4dfa-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c68aaaa9b96d6156d6291fb05efacf121dcde829 --- /dev/null +++ b/graph/incidents_graphml/5/5efa2a80-4dfa-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.113 + 100.64.7.113 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694144822 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5efa2a80-4dfa-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/5/5efb0de0-10e5-11ed-98bd-158c7bf8b3a5.graphml b/graph/incidents_graphml/5/5efb0de0-10e5-11ed-98bd-158c7bf8b3a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a14e61a37e816d9733fcc5baa2974405223d152 --- /dev/null +++ b/graph/incidents_graphml/5/5efb0de0-10e5-11ed-98bd-158c7bf8b3a5.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.151 + 100.64.71.151 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.25 + 100.64.75.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659281284 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5efb0de0-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281284 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5efb0de0-10e5-11ed-98bd-158c7bf8b3a5 + + + diff --git a/graph/incidents_graphml/5/5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3831fdc1e8a393c03453e62cca732aad166e71c --- /dev/null +++ b/graph/incidents_graphml/5/5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.32 + 100.64.77.32 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.158 + 100.64.1.158 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.77.33 + 100.64.77.33 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.29 + 100.64.73.29 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1665761960 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761960 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761960 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761960 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761960 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761960 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5efdf6a0-4bd6-11ed-a7c5-958e7a84b2a2 + + + diff --git a/graph/incidents_graphml/5/5f0de350-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/5/5f0de350-075e-11ee-a67b-a9ce333dbcaf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab4ae2b6ad3ebd67ec77853d815b876383a3cf53 --- /dev/null +++ b/graph/incidents_graphml/5/5f0de350-075e-11ee-a67b-a9ce333dbcaf.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.123 + 100.64.71.123 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.49.202 + 100.64.49.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.49.61 + 100.64.49.61 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.201 + 100.64.75.201 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.137 + 100.64.72.137 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686381239 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5f0de350-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381239 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5f0de350-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381239 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5f0de350-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381239 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5f0de350-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381239 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5f0de350-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381239 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5f0de350-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381239 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5f0de350-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381239 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5f0de350-075e-11ee-a67b-a9ce333dbcaf + + + diff --git a/graph/incidents_graphml/5/5f1152e0-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5f1152e0-0b89-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43dbb6c1711be9320354fe8c2ab9bf14a67bf85b --- /dev/null +++ b/graph/incidents_graphml/5/5f1152e0-0b89-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.37 + 100.64.76.37 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.18.249 + 100.64.18.249 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686839512 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5f1152e0-0b89-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/5/5f17b800-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/5/5f17b800-33f8-11ee-8ffe-d166de7672c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5c440e062354fb8eb324b9f90082c08935dc104 --- /dev/null +++ b/graph/incidents_graphml/5/5f17b800-33f8-11ee-8ffe-d166de7672c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.138 + 100.64.19.138 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691285233 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5f17b800-33f8-11ee-8ffe-d166de7672c0 + + + diff --git a/graph/incidents_graphml/5/5f1d6d10-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5f1d6d10-e13e-11ee-a61b-817c3085f6d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4493ba66e53cce068029deaa3408681ceb231e4 --- /dev/null +++ b/graph/incidents_graphml/5/5f1d6d10-e13e-11ee-a61b-817c3085f6d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.226 + 100.64.36.226 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710336849 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5f1d6d10-e13e-11ee-a61b-817c3085f6d7 + + + diff --git a/graph/incidents_graphml/5/5f1f8770-ea27-11ee-9c4f-25cb7d94c0ce.graphml b/graph/incidents_graphml/5/5f1f8770-ea27-11ee-9c4f-25cb7d94c0ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..440e884b190e85e8543b24eb3edd7609fea6284d --- /dev/null +++ b/graph/incidents_graphml/5/5f1f8770-ea27-11ee-9c4f-25cb7d94c0ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.169 + 100.64.52.169 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711316531 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5f1f8770-ea27-11ee-9c4f-25cb7d94c0ce + + + diff --git a/graph/incidents_graphml/5/5f21ec30-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/5/5f21ec30-ed09-11ec-8ab6-b3d858f740e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f6d0ef4cb3a2ad4956c7e6b01c6a7c5bf3b6b96 --- /dev/null +++ b/graph/incidents_graphml/5/5f21ec30-ed09-11ec-8ab6-b3d858f740e7.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.176 + 100.64.80.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.51 + 100.64.73.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655338504 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5f21ec30-ed09-11ec-8ab6-b3d858f740e7 + + + INCIDENT_LINK + 1655338504 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5f21ec30-ed09-11ec-8ab6-b3d858f740e7 + + + diff --git a/graph/incidents_graphml/5/5f259e30-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5f259e30-0b89-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9ffe0b4f4c9cb935b7d40ee337b618d61d88b26 --- /dev/null +++ b/graph/incidents_graphml/5/5f259e30-0b89-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.245 + 100.64.80.245 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686839513 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5f259e30-0b89-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/5/5f2a2990-ed09-11ec-8ab6-b3d858f740e7.graphml b/graph/incidents_graphml/5/5f2a2990-ed09-11ec-8ab6-b3d858f740e7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5d152f7ee5427de5dcf86adb6150221d8387cca --- /dev/null +++ b/graph/incidents_graphml/5/5f2a2990-ed09-11ec-8ab6-b3d858f740e7.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.60 + 100.64.59.60 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655338504 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f2a2990-ed09-11ec-8ab6-b3d858f740e7 + + + INCIDENT_LINK + 1655338504 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f2a2990-ed09-11ec-8ab6-b3d858f740e7 + + + diff --git a/graph/incidents_graphml/5/5f35b000-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5f35b000-e13e-11ee-a61b-817c3085f6d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fda5e5eb5b8301338c68468da55b4cadaed33af --- /dev/null +++ b/graph/incidents_graphml/5/5f35b000-e13e-11ee-a61b-817c3085f6d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.154 + 100.64.19.154 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710336849 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5f35b000-e13e-11ee-a61b-817c3085f6d7 + + + diff --git a/graph/incidents_graphml/5/5f382a00-a8b4-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/5/5f382a00-a8b4-11ee-bb9e-f554981233b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43878289d3f728bce7e5cce3330db76c27d2d8d1 --- /dev/null +++ b/graph/incidents_graphml/5/5f382a00-a8b4-11ee-bb9e-f554981233b0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.154 + 100.64.68.154 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","CASB","Protect"] + + + INCIDENT_LINK + 1704120314 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f382a00-a8b4-11ee-bb9e-f554981233b0 + + + INCIDENT_LINK + 1704120314 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f382a00-a8b4-11ee-bb9e-f554981233b0 + + + diff --git a/graph/incidents_graphml/5/5f3ccfb0-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5f3ccfb0-0b89-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e479c6d9dd42076613649f8f933554039109a9a --- /dev/null +++ b/graph/incidents_graphml/5/5f3ccfb0-0b89-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.245 + 100.64.80.245 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686839513 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5f3ccfb0-0b89-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/5/5f498ee0-1b60-11ed-9931-5799b48b5de2.graphml b/graph/incidents_graphml/5/5f498ee0-1b60-11ed-9931-5799b48b5de2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29d354a5db90ab8bd14590c6e57a21cb12954c09 --- /dev/null +++ b/graph/incidents_graphml/5/5f498ee0-1b60-11ed-9931-5799b48b5de2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.133 + 100.64.71.133 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660433624 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5f498ee0-1b60-11ed-9931-5799b48b5de2 + + + diff --git a/graph/incidents_graphml/5/5f4b8d20-317b-11ef-927c-272449d34670.graphml b/graph/incidents_graphml/5/5f4b8d20-317b-11ef-927c-272449d34670.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4aa502930c3122247227fafc9ddde46b561fc0b --- /dev/null +++ b/graph/incidents_graphml/5/5f4b8d20-317b-11ef-927c-272449d34670.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.46.208 + USER-0015-1982.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.122 + USER-0015-2118.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719159142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5f4b8d20-317b-11ef-927c-272449d34670 + + + diff --git a/graph/incidents_graphml/5/5f4f0460-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5f4f0460-e13e-11ee-a61b-817c3085f6d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91f796828c7703021c630583ba004ec9e4e2bb73 --- /dev/null +++ b/graph/incidents_graphml/5/5f4f0460-e13e-11ee-a61b-817c3085f6d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.154 + 100.64.19.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710336849 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5f4f0460-e13e-11ee-a61b-817c3085f6d7 + + + diff --git a/graph/incidents_graphml/5/5f510d40-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5f510d40-8807-11ee-bd27-a396646abc8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1626212cf2c45bb464d827410849bd7fce988ef0 --- /dev/null +++ b/graph/incidents_graphml/5/5f510d40-8807-11ee-bd27-a396646abc8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.10 + 100.64.41.10 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700527574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5f510d40-8807-11ee-bd27-a396646abc8f + + + diff --git a/graph/incidents_graphml/5/5f5f0d70-683e-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/5/5f5f0d70-683e-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd6ca9f4406c552da04ff30b1b739a9f5454f830 --- /dev/null +++ b/graph/incidents_graphml/5/5f5f0d70-683e-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.141 + 100.64.31.141 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697032759 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5f5f0d70-683e-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/5/5f627260-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5f627260-8807-11ee-bd27-a396646abc8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c998b35de339ef123d0ef7d54d5ff0358c36151 --- /dev/null +++ b/graph/incidents_graphml/5/5f627260-8807-11ee-bd27-a396646abc8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.10 + 100.64.41.10 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700527574 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5f627260-8807-11ee-bd27-a396646abc8f + + + diff --git a/graph/incidents_graphml/5/5f707c20-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5f707c20-8807-11ee-bd27-a396646abc8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b2859787c03e9cf06d5865b2d944ad0ad2f537f --- /dev/null +++ b/graph/incidents_graphml/5/5f707c20-8807-11ee-bd27-a396646abc8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.12 + 100.64.41.12 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700527574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5f707c20-8807-11ee-bd27-a396646abc8f + + + diff --git a/graph/incidents_graphml/5/5f729260-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/5/5f729260-f6bd-11ee-861e-3f1320280b96.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d50417194c887483b06021354bc52627e41a145 --- /dev/null +++ b/graph/incidents_graphml/5/5f729260-f6bd-11ee-861e-3f1320280b96.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.162 + 100.64.61.162 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712700370 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f729260-f6bd-11ee-861e-3f1320280b96 + + + diff --git a/graph/incidents_graphml/5/5f77ba80-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/5/5f77ba80-4bd6-11ed-a7c5-958e7a84b2a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd49d73de0c6f008d54149b1b78390cb6d12da58 --- /dev/null +++ b/graph/incidents_graphml/5/5f77ba80-4bd6-11ed-a7c5-958e7a84b2a2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.34 + 100.64.77.34 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.70.255 + 100.64.70.255 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1665761961 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f77ba80-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761961 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f77ba80-4bd6-11ed-a7c5-958e7a84b2a2 + + + diff --git a/graph/incidents_graphml/5/5f7d32d0-ea5e-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/5/5f7d32d0-ea5e-11ee-b380-23a0be8babf0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5679db9e03be835b4e90321eb9d4e04eb26d872 --- /dev/null +++ b/graph/incidents_graphml/5/5f7d32d0-ea5e-11ee-b380-23a0be8babf0.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.199 + 100.64.10.199 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.137 + 100.64.39.137 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.138 + 100.64.39.138 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.139 + 100.64.39.139 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711340154 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f7d32d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340154 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f7d32d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340154 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f7d32d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340154 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f7d32d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340154 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f7d32d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340154 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f7d32d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340154 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f7d32d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340154 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f7d32d0-ea5e-11ee-b380-23a0be8babf0 + + + diff --git a/graph/incidents_graphml/5/5f7eacf0-8807-11ee-bd27-a396646abc8f.graphml b/graph/incidents_graphml/5/5f7eacf0-8807-11ee-bd27-a396646abc8f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46e0fb6f2b0a5cab5a1aade2e1bc149d8e67b481 --- /dev/null +++ b/graph/incidents_graphml/5/5f7eacf0-8807-11ee-bd27-a396646abc8f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.12 + 100.64.41.12 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700527574 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f7eacf0-8807-11ee-bd27-a396646abc8f + + + diff --git a/graph/incidents_graphml/5/5f8a6020-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/5/5f8a6020-f6bd-11ee-861e-3f1320280b96.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7060cea66bedc917f35770de1c5148043a591f9 --- /dev/null +++ b/graph/incidents_graphml/5/5f8a6020-f6bd-11ee-861e-3f1320280b96.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.162 + 100.64.61.162 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712700370 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5f8a6020-f6bd-11ee-861e-3f1320280b96 + + + diff --git a/graph/incidents_graphml/5/5f8b0a40-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/5/5f8b0a40-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8be56a666afd2742ccc7d39a2f05f3f03a04b4b --- /dev/null +++ b/graph/incidents_graphml/5/5f8b0a40-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.84 + 100.64.16.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475238 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5f8b0a40-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/5/5f91c640-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5f91c640-77e1-11ee-95df-1f31585c14cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdfdfb7f757de29bcfe2eb6fa73c9afa82d5974f --- /dev/null +++ b/graph/incidents_graphml/5/5f91c640-77e1-11ee-95df-1f31585c14cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.119 + 100.64.40.119 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698752035 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5f91c640-77e1-11ee-95df-1f31585c14cb + + + diff --git a/graph/incidents_graphml/5/5f994410-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/5/5f994410-33f8-11ee-8ffe-d166de7672c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb718601c82853be00f9a263bddcd49dda08842a --- /dev/null +++ b/graph/incidents_graphml/5/5f994410-33f8-11ee-8ffe-d166de7672c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.22 + 100.64.41.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691285234 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5f994410-33f8-11ee-8ffe-d166de7672c0 + + + diff --git a/graph/incidents_graphml/5/5fa24100-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5fa24100-77e1-11ee-95df-1f31585c14cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d13e7dfcaab7af872dec2a8346621918a1a5cae --- /dev/null +++ b/graph/incidents_graphml/5/5fa24100-77e1-11ee-95df-1f31585c14cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.124 + 100.64.14.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698752035 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5fa24100-77e1-11ee-95df-1f31585c14cb + + + diff --git a/graph/incidents_graphml/5/5fab2e20-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/5/5fab2e20-e13e-11ee-a61b-817c3085f6d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a000fcbc4cb5939398f85c22f6f207387d4e6f53 --- /dev/null +++ b/graph/incidents_graphml/5/5fab2e20-e13e-11ee-a61b-817c3085f6d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.216 + 100.64.13.216 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710336850 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5fab2e20-e13e-11ee-a61b-817c3085f6d7 + + + diff --git a/graph/incidents_graphml/5/5fab55a0-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/5/5fab55a0-f6bd-11ee-861e-3f1320280b96.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68558b1ae6628a78daa87d4616eb260e31dcdb4d --- /dev/null +++ b/graph/incidents_graphml/5/5fab55a0-f6bd-11ee-861e-3f1320280b96.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.164 + 100.64.61.164 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712700371 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5fab55a0-f6bd-11ee-861e-3f1320280b96 + + + diff --git a/graph/incidents_graphml/5/5fb26da0-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5fb26da0-77e1-11ee-95df-1f31585c14cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..334884ea70b8d9cdf76e47c61bbe8a88c143674d --- /dev/null +++ b/graph/incidents_graphml/5/5fb26da0-77e1-11ee-95df-1f31585c14cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.124 + 100.64.14.124 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698752035 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5fb26da0-77e1-11ee-95df-1f31585c14cb + + + diff --git a/graph/incidents_graphml/5/5fb8b2f0-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/5/5fb8b2f0-33f8-11ee-8ffe-d166de7672c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d78d2de58b2453ba352e9449350d59e51b1a8f1 --- /dev/null +++ b/graph/incidents_graphml/5/5fb8b2f0-33f8-11ee-8ffe-d166de7672c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.22 + 100.64.41.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691285234 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5fb8b2f0-33f8-11ee-8ffe-d166de7672c0 + + + diff --git a/graph/incidents_graphml/5/5fbc0db0-f52c-11ee-9bad-936e2aee478a.graphml b/graph/incidents_graphml/5/5fbc0db0-f52c-11ee-9bad-936e2aee478a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78dedba0b6c3cf3c760d74d52d2f5ee380ed91d0 --- /dev/null +++ b/graph/incidents_graphml/5/5fbc0db0-f52c-11ee-9bad-936e2aee478a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.42 + 100.64.65.42 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712528142 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5fbc0db0-f52c-11ee-9bad-936e2aee478a + + + diff --git a/graph/incidents_graphml/5/5fbc72c0-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/5/5fbc72c0-452b-11ee-8fcc-0fb1848fa316.graphml new file mode 100644 index 0000000000000000000000000000000000000000..039857feebf77d6d8620db122d0a347300c407e7 --- /dev/null +++ b/graph/incidents_graphml/5/5fbc72c0-452b-11ee-8fcc-0fb1848fa316.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.92 + 100.64.9.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176308 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5fbc72c0-452b-11ee-8fcc-0fb1848fa316 + + + diff --git a/graph/incidents_graphml/5/5fc1afe0-77e1-11ee-95df-1f31585c14cb.graphml b/graph/incidents_graphml/5/5fc1afe0-77e1-11ee-95df-1f31585c14cb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17fa96fb7a471926e2426903772dc9194716c7c3 --- /dev/null +++ b/graph/incidents_graphml/5/5fc1afe0-77e1-11ee-95df-1f31585c14cb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.121 + 100.64.40.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698752035 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5fc1afe0-77e1-11ee-95df-1f31585c14cb + + + diff --git a/graph/incidents_graphml/5/5fc9cb90-41e5-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/5/5fc9cb90-41e5-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..027049b03dc8744b58dbe66d79cf48852962e5b2 --- /dev/null +++ b/graph/incidents_graphml/5/5fc9cb90-41e5-11ed-ad31-51848920452c.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.217 + 100.64.75.217 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.51 + 100.64.72.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.53 + 100.64.73.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.218 + 100.64.75.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664668892 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5fc9cb90-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668892 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5fc9cb90-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668892 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5fc9cb90-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668892 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5fc9cb90-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668892 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5fc9cb90-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668892 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5fc9cb90-41e5-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/5/5fca4700-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/5/5fca4700-3eec-11ee-a139-b35fd7c3aeb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3390593964d53bff0b0ec127c9a3db62e28bf28e --- /dev/null +++ b/graph/incidents_graphml/5/5fca4700-3eec-11ee-a139-b35fd7c3aeb6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.194 + 100.64.47.194 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692489543 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5fca4700-3eec-11ee-a139-b35fd7c3aeb6 + + + diff --git a/graph/incidents_graphml/5/5fcc5b30-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/5/5fcc5b30-dcdf-11ee-9697-039b254a6d03.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bd02c07ca8efa32fd7a30761d6fddfbe0a0b713 --- /dev/null +++ b/graph/incidents_graphml/5/5fcc5b30-dcdf-11ee-9697-039b254a6d03.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.69 + USER-0015-2000.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1709856243 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5fcc5b30-dcdf-11ee-9697-039b254a6d03 + + + diff --git a/graph/incidents_graphml/5/5fd5a010-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/5/5fd5a010-452b-11ee-8fcc-0fb1848fa316.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5791dd5ca7ef326b1cf9980152791015d09e3ff4 --- /dev/null +++ b/graph/incidents_graphml/5/5fd5a010-452b-11ee-8fcc-0fb1848fa316.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.92 + 100.64.9.92 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176308 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5fd5a010-452b-11ee-8fcc-0fb1848fa316 + + + diff --git a/graph/incidents_graphml/5/5fd8c5f0-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/5/5fd8c5f0-3eec-11ee-a139-b35fd7c3aeb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d72b1d573c07d0069ca7b38f896e327f20195f5f --- /dev/null +++ b/graph/incidents_graphml/5/5fd8c5f0-3eec-11ee-a139-b35fd7c3aeb6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.196 + 100.64.47.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692489543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5fd8c5f0-3eec-11ee-a139-b35fd7c3aeb6 + + + diff --git a/graph/incidents_graphml/5/5fd99cf0-3820-11ee-8fd0-65f18d6f9b41.graphml b/graph/incidents_graphml/5/5fd99cf0-3820-11ee-8fd0-65f18d6f9b41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19558e46543ffc1427bc882c926ddef63c062770 --- /dev/null +++ b/graph/incidents_graphml/5/5fd99cf0-3820-11ee-8fd0-65f18d6f9b41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.129 + 100.64.11.129 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1691742219 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5fd99cf0-3820-11ee-8fd0-65f18d6f9b41 + + + diff --git a/graph/incidents_graphml/5/5fdb2230-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5fdb2230-552d-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfa671828e3f9b54e5eb236409236dcd50260d7b --- /dev/null +++ b/graph/incidents_graphml/5/5fdb2230-552d-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.70 + 100.64.51.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694936386 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5fdb2230-552d-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/5/5fdd2ae0-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/5/5fdd2ae0-33f8-11ee-8ffe-d166de7672c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7733adc0a3e25812cb4286c39365c54fe02d46a0 --- /dev/null +++ b/graph/incidents_graphml/5/5fdd2ae0-33f8-11ee-8ffe-d166de7672c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.249 + USER-0015-1295.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691285235 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5fdd2ae0-33f8-11ee-8ffe-d166de7672c0 + + + diff --git a/graph/incidents_graphml/5/5fdd3870-909e-11ee-9a83-8f2a027a2cd3.graphml b/graph/incidents_graphml/5/5fdd3870-909e-11ee-9a83-8f2a027a2cd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90a7d1603476f9491decf7d3dbe8233782b446fa --- /dev/null +++ b/graph/incidents_graphml/5/5fdd3870-909e-11ee-9a83-8f2a027a2cd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.145 + 100.64.8.145 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701472038 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5fdd3870-909e-11ee-9a83-8f2a027a2cd3 + + + diff --git a/graph/incidents_graphml/5/5fe07ac0-3820-11ee-8fd0-65f18d6f9b41.graphml b/graph/incidents_graphml/5/5fe07ac0-3820-11ee-8fd0-65f18d6f9b41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ed7369dea4306ba99ed6dd0c91dedb592c89c0e --- /dev/null +++ b/graph/incidents_graphml/5/5fe07ac0-3820-11ee-8fd0-65f18d6f9b41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.11.129 + 100.64.11.129 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1691742219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5fe07ac0-3820-11ee-8fd0-65f18d6f9b41 + + + diff --git a/graph/incidents_graphml/5/5fe70a70-3820-11ee-8fd0-65f18d6f9b41.graphml b/graph/incidents_graphml/5/5fe70a70-3820-11ee-8fd0-65f18d6f9b41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..31010b60d49d979238be9dd24533a3c85124e3e8 --- /dev/null +++ b/graph/incidents_graphml/5/5fe70a70-3820-11ee-8fd0-65f18d6f9b41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1691742219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5fe70a70-3820-11ee-8fd0-65f18d6f9b41 + + + diff --git a/graph/incidents_graphml/5/5fe80830-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/5/5fe80830-3eec-11ee-a139-b35fd7c3aeb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df95e1d104f6618bd93399036bba7f906d8bd12f --- /dev/null +++ b/graph/incidents_graphml/5/5fe80830-3eec-11ee-a139-b35fd7c3aeb6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.196 + 100.64.47.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692489543 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5fe80830-3eec-11ee-a139-b35fd7c3aeb6 + + + diff --git a/graph/incidents_graphml/5/5fe83300-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/5/5fe83300-0c1a-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b48df240fedb8f65d847aae7c1b3b027c3e1bb76 --- /dev/null +++ b/graph/incidents_graphml/5/5fe83300-0c1a-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.232 + 100.64.80.232 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.93 + 100.64.71.93 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686901791 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5fe83300-0c1a-11ee-a535-110da53c9d07 + + + INCIDENT_LINK + 1686901791 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5fe83300-0c1a-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/5/5fe847a0-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/5/5fe847a0-dcdf-11ee-9697-039b254a6d03.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c3586e3dd793acb664e2c7397ce95a0c17b1c83b --- /dev/null +++ b/graph/incidents_graphml/5/5fe847a0-dcdf-11ee-9697-039b254a6d03.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.32.69 + USER-0015-2000.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1709856244 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5fe847a0-dcdf-11ee-9697-039b254a6d03 + + + diff --git a/graph/incidents_graphml/5/5fecc8d0-909e-11ee-9a83-8f2a027a2cd3.graphml b/graph/incidents_graphml/5/5fecc8d0-909e-11ee-9a83-8f2a027a2cd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..783c9ba784bb10a14b01a6a114eeb8d0a1f2f0d5 --- /dev/null +++ b/graph/incidents_graphml/5/5fecc8d0-909e-11ee-9a83-8f2a027a2cd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.145 + 100.64.8.145 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701472038 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 5fecc8d0-909e-11ee-9a83-8f2a027a2cd3 + + + diff --git a/graph/incidents_graphml/5/5fecd570-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5fecd570-552d-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e622f08dc1f166938f0fd8feb05573d3b05c87a --- /dev/null +++ b/graph/incidents_graphml/5/5fecd570-552d-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.78 + 100.64.51.78 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694936386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5fecd570-552d-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/5/5ffb4210-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/5/5ffb4210-3eec-11ee-a139-b35fd7c3aeb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a89b1cc68c36d74262e66dc81274c1c70207c65 --- /dev/null +++ b/graph/incidents_graphml/5/5ffb4210-3eec-11ee-a139-b35fd7c3aeb6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.215 + 100.64.30.215 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692489543 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 5ffb4210-3eec-11ee-a139-b35fd7c3aeb6 + + + diff --git a/graph/incidents_graphml/5/5ffb47c0-909e-11ee-9a83-8f2a027a2cd3.graphml b/graph/incidents_graphml/5/5ffb47c0-909e-11ee-9a83-8f2a027a2cd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9534b7ac3e57f3f44e0952e5f3a7d0b3cf7a41d0 --- /dev/null +++ b/graph/incidents_graphml/5/5ffb47c0-909e-11ee-9a83-8f2a027a2cd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.163 + 100.64.12.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701472038 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 5ffb47c0-909e-11ee-9a83-8f2a027a2cd3 + + + diff --git a/graph/incidents_graphml/5/5ffbf0a0-552d-11ee-add4-2b9be3bdfcf6.graphml b/graph/incidents_graphml/5/5ffbf0a0-552d-11ee-add4-2b9be3bdfcf6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f54f875c932b286f06b4493d53fadff65e9ae223 --- /dev/null +++ b/graph/incidents_graphml/5/5ffbf0a0-552d-11ee-add4-2b9be3bdfcf6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.78 + 100.64.51.78 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694936386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 5ffbf0a0-552d-11ee-add4-2b9be3bdfcf6 + + + diff --git a/graph/incidents_graphml/6/6002f280-6183-11ee-a390-cde4d9cd4c71.graphml b/graph/incidents_graphml/6/6002f280-6183-11ee-a390-cde4d9cd4c71.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d65aadd8050a244c4ca07eaabbb8f64db696dcc8 --- /dev/null +++ b/graph/incidents_graphml/6/6002f280-6183-11ee-a390-cde4d9cd4c71.graphml @@ -0,0 +1,481 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.54.215 + 100.64.54.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"] + + + HOST + 100.64.19.166 + 100.64.19.166 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.40.143 + 100.64.40.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.119 + 100.64.11.119 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.17.176 + 100.64.17.176 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.58.41 + 100.64.58.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + INCIDENT_LINK + 1696292737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6002f280-6183-11ee-a390-cde4d9cd4c71 + + + diff --git a/graph/incidents_graphml/6/600a62f0-909e-11ee-9a83-8f2a027a2cd3.graphml b/graph/incidents_graphml/6/600a62f0-909e-11ee-9a83-8f2a027a2cd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bfc7d33673fe8a1a7037ceb0875e96e4830798d --- /dev/null +++ b/graph/incidents_graphml/6/600a62f0-909e-11ee-9a83-8f2a027a2cd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.163 + 100.64.12.163 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701472038 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 600a62f0-909e-11ee-9a83-8f2a027a2cd3 + + + diff --git a/graph/incidents_graphml/6/600dee30-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/600dee30-075e-11ee-a67b-a9ce333dbcaf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a27ee4d48e4fdad7291f5bf1596d90d012a28cab --- /dev/null +++ b/graph/incidents_graphml/6/600dee30-075e-11ee-a67b-a9ce333dbcaf.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.202 + 100.64.75.202 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.58 + 100.64.72.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686381241 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 600dee30-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381241 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 600dee30-075e-11ee-a67b-a9ce333dbcaf + + + diff --git a/graph/incidents_graphml/6/60139790-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/6/60139790-4106-11ee-b538-995248355bc9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f6b53bceb5a55b8c8175a66dc0edfc2a4668c1d --- /dev/null +++ b/graph/incidents_graphml/6/60139790-4106-11ee-b538-995248355bc9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.205 + 100.64.69.205 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692720613 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60139790-4106-11ee-b538-995248355bc9 + + + diff --git a/graph/incidents_graphml/6/60167dc0-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/6/60167dc0-4106-11ee-b538-995248355bc9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf1a2572044c07e7b00cecda7160abb7e28e3976 --- /dev/null +++ b/graph/incidents_graphml/6/60167dc0-4106-11ee-b538-995248355bc9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.205 + 100.64.69.205 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692720613 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60167dc0-4106-11ee-b538-995248355bc9 + + + diff --git a/graph/incidents_graphml/6/601979f0-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/601979f0-6e77-11ee-9076-51a308ac33b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..905f66cc557deb61831a8f54e7800f87acd4907e --- /dev/null +++ b/graph/incidents_graphml/6/601979f0-6e77-11ee-9076-51a308ac33b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.152 + 100.64.15.152 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697716948 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 601979f0-6e77-11ee-9076-51a308ac33b9 + + + diff --git a/graph/incidents_graphml/6/601c26b0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/6/601c26b0-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3e6ecfacc0fa61b63ec09fef00596faa84e20fa --- /dev/null +++ b/graph/incidents_graphml/6/601c26b0-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.43 + 100.64.47.43 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475239 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 601c26b0-47e3-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693475239 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 601c26b0-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/6/60278580-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60278580-ec7e-11ec-8d79-47d8ab3639ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a975b7ba7fb29838ce24b9d0bc57673133f7d1fa --- /dev/null +++ b/graph/incidents_graphml/6/60278580-ec7e-11ec-8d79-47d8ab3639ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.4 + USER-0015-1777.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655278806 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60278580-ec7e-11ec-8d79-47d8ab3639ae + + + diff --git a/graph/incidents_graphml/6/602b45d0-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/602b45d0-ff3d-11ed-97b1-dfa052c79ac3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7d29cf2bbe40ed8cd9c9879417033d23e89b5cd --- /dev/null +++ b/graph/incidents_graphml/6/602b45d0-ff3d-11ed-97b1-dfa052c79ac3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.4 + 100.64.8.4 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685487459 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 602b45d0-ff3d-11ed-97b1-dfa052c79ac3 + + + diff --git a/graph/incidents_graphml/6/602c5350-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/6/602c5350-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e0ea588e7460e950d65715d13388037a40e396f --- /dev/null +++ b/graph/incidents_graphml/6/602c5350-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.43 + 100.64.47.43 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475239 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 602c5350-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/6/6032f560-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/6032f560-6e77-11ee-9076-51a308ac33b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a551130ffadb7e339672df87bca1e09f3bf12110 --- /dev/null +++ b/graph/incidents_graphml/6/6032f560-6e77-11ee-9076-51a308ac33b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.152 + 100.64.15.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697716948 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6032f560-6e77-11ee-9076-51a308ac33b9 + + + diff --git a/graph/incidents_graphml/6/603391f0-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/6/603391f0-01a8-11ee-a3af-a97ccd3b2ee2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c228fd35215cef73b01addbeff418e8b20def19 --- /dev/null +++ b/graph/incidents_graphml/6/603391f0-01a8-11ee-a3af-a97ccd3b2ee2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.1.158 + HOST-13435 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.23.137 + 100.64.23.137 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685753317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 603391f0-01a8-11ee-a3af-a97ccd3b2ee2 + + + INCIDENT_LINK + 1685753317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 603391f0-01a8-11ee-a3af-a97ccd3b2ee2 + + + INCIDENT_LINK + 1685753317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 603391f0-01a8-11ee-a3af-a97ccd3b2ee2 + + + INCIDENT_LINK + 1685753317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 603391f0-01a8-11ee-a3af-a97ccd3b2ee2 + + + diff --git a/graph/incidents_graphml/6/6034f790-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/6/6034f790-e13e-11ee-a61b-817c3085f6d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91b5778655bbede6d83ee34b8883fb4d397bda3d --- /dev/null +++ b/graph/incidents_graphml/6/6034f790-e13e-11ee-a61b-817c3085f6d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.228 + 100.64.36.228 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710336851 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6034f790-e13e-11ee-a61b-817c3085f6d7 + + + diff --git a/graph/incidents_graphml/6/603ed2e0-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/6/603ed2e0-22e1-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3add0be0bbaa0c68e2d6cb8fd1e1fe70517b0de --- /dev/null +++ b/graph/incidents_graphml/6/603ed2e0-22e1-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.149 + 100.64.9.149 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689406187 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 603ed2e0-22e1-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/6/60478f20-01a8-11ee-a3af-a97ccd3b2ee2.graphml b/graph/incidents_graphml/6/60478f20-01a8-11ee-a3af-a97ccd3b2ee2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6017190580451db39d8b4ff85f4331c7e9ee71d5 --- /dev/null +++ b/graph/incidents_graphml/6/60478f20-01a8-11ee-a3af-a97ccd3b2ee2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.153 + 100.64.72.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.152 + 100.64.72.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685753317 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60478f20-01a8-11ee-a3af-a97ccd3b2ee2 + + + INCIDENT_LINK + 1685753317 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60478f20-01a8-11ee-a3af-a97ccd3b2ee2 + + + diff --git a/graph/incidents_graphml/6/604a0630-e13e-11ee-a61b-817c3085f6d7.graphml b/graph/incidents_graphml/6/604a0630-e13e-11ee-a61b-817c3085f6d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92588beaf18af93755d078cde9e7e74eb0b265e7 --- /dev/null +++ b/graph/incidents_graphml/6/604a0630-e13e-11ee-a61b-817c3085f6d7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.228 + 100.64.36.228 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710336851 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 604a0630-e13e-11ee-a61b-817c3085f6d7 + + + diff --git a/graph/incidents_graphml/6/604a5e30-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/604a5e30-1eaf-11ed-a2eb-f90f4aab4c31.graphml new file mode 100644 index 0000000000000000000000000000000000000000..044096647a80013caaf371953e6dbf80fee24e56 --- /dev/null +++ b/graph/incidents_graphml/6/604a5e30-1eaf-11ed-a2eb-f90f4aab4c31.graphml @@ -0,0 +1,481 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.76 + 100.64.80.76 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.20 + 100.64.74.20 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.77 + 100.64.80.77 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.69.113 + 100.64.69.113 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.78 + 100.64.80.78 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.234 + 100.64.70.234 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.22.113 + 100.64.22.113 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.74 + 100.64.75.74 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.102 + 100.64.1.102 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.79 + 100.64.80.79 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.80.80 + 100.64.80.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.81 + 100.64.80.81 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.80.82 + 100.64.80.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 604a5e30-1eaf-11ed-a2eb-f90f4aab4c31 + + + diff --git a/graph/incidents_graphml/6/6054c4b0-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/6054c4b0-69d6-11ee-b4c0-f17986d6e969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77283d34507a84fc207a7555db815251433e9c56 --- /dev/null +++ b/graph/incidents_graphml/6/6054c4b0-69d6-11ee-b4c0-f17986d6e969.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.65 + 100.64.38.65 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697207995 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6054c4b0-69d6-11ee-b4c0-f17986d6e969 + + + diff --git a/graph/incidents_graphml/6/60588310-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/60588310-2d6e-11ee-86c4-f93b83b6b0bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92c032832dede6018c124d9105d8d4390008425a --- /dev/null +++ b/graph/incidents_graphml/6/60588310-2d6e-11ee-86c4-f93b83b6b0bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690566258 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60588310-2d6e-11ee-86c4-f93b83b6b0bc + + + diff --git a/graph/incidents_graphml/6/6058a210-10e5-11ed-98bd-158c7bf8b3a5.graphml b/graph/incidents_graphml/6/6058a210-10e5-11ed-98bd-158c7bf8b3a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a0964ae5a15b0d0267395212370e141a34c453b --- /dev/null +++ b/graph/incidents_graphml/6/6058a210-10e5-11ed-98bd-158c7bf8b3a5.graphml @@ -0,0 +1,537 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.129 + 100.64.71.129 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.216 + 100.64.71.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.93 + 100.64.71.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.26 + 100.64.75.26 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.5.18 + 100.64.5.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.40 + 100.64.71.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.27 + 100.64.75.27 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.28 + 100.64.75.28 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.100 + USER-0015-1617.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.130 + 100.64.71.130 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.29 + 100.64.75.29 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.30 + 100.64.75.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.31 + 100.64.75.31 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6058a210-10e5-11ed-98bd-158c7bf8b3a5 + + + diff --git a/graph/incidents_graphml/6/605ac9e0-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/605ac9e0-5627-11ee-a521-41f4addc913f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e08df76c51a555483bc502b81cd92bd29bdd965d --- /dev/null +++ b/graph/incidents_graphml/6/605ac9e0-5627-11ee-a521-41f4addc913f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.121 + 100.64.95.121 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695043761 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 605ac9e0-5627-11ee-a521-41f4addc913f + + + diff --git a/graph/incidents_graphml/6/605d0ee0-10e5-11ed-98bd-158c7bf8b3a5.graphml b/graph/incidents_graphml/6/605d0ee0-10e5-11ed-98bd-158c7bf8b3a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b54706c61a7dbfe800f22caf6e856f7395b62ed5 --- /dev/null +++ b/graph/incidents_graphml/6/605d0ee0-10e5-11ed-98bd-158c7bf8b3a5.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.109 + 100.64.73.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.32 + 100.64.75.32 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 605d0ee0-10e5-11ed-98bd-158c7bf8b3a5 + + + INCIDENT_LINK + 1659281286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 605d0ee0-10e5-11ed-98bd-158c7bf8b3a5 + + + diff --git a/graph/incidents_graphml/6/605d3000-8d3f-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/6/605d3000-8d3f-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2fc4ab8a4daf1c69935014c06e612fcd5c42632 --- /dev/null +++ b/graph/incidents_graphml/6/605d3000-8d3f-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.85 + 100.64.63.85 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.86 + 100.64.63.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.87 + 100.64.63.87 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.203 + 100.64.26.203 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.102 + 100.64.21.102 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.167 + 100.64.20.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.88 + 100.64.63.88 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.131 + 100.64.33.131 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.89 + 100.64.63.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.90 + 100.64.63.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.54 + 100.64.37.54 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.91 + USER-0015-1453.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.226 + 100.64.50.226 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.92 + 100.64.63.92 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.188 + 100.64.10.188 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.15 + 100.64.27.15 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.138 + 100.64.19.138 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.123 + 100.64.26.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 605d3000-8d3f-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/6/60626ba0-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60626ba0-ec7e-11ec-8d79-47d8ab3639ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..784180fb3d2d980b6ea0a11338df5098523aaf70 --- /dev/null +++ b/graph/incidents_graphml/6/60626ba0-ec7e-11ec-8d79-47d8ab3639ae.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.76 + 100.64.78.76 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.1.102 + USER-0015-1720.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655278806 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60626ba0-ec7e-11ec-8d79-47d8ab3639ae + + + INCIDENT_LINK + 1655278806 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60626ba0-ec7e-11ec-8d79-47d8ab3639ae + + + diff --git a/graph/incidents_graphml/6/60643d10-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/6/60643d10-3eec-11ee-a139-b35fd7c3aeb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95517674d3f258142fbde44124124f6b26ae6640 --- /dev/null +++ b/graph/incidents_graphml/6/60643d10-3eec-11ee-a139-b35fd7c3aeb6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.105 + 100.64.28.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692489544 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60643d10-3eec-11ee-a139-b35fd7c3aeb6 + + + diff --git a/graph/incidents_graphml/6/60657840-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/60657840-5627-11ee-a521-41f4addc913f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12d271ddb5ee39f0f90c86aaf74dbbac1ebcd2a1 --- /dev/null +++ b/graph/incidents_graphml/6/60657840-5627-11ee-a521-41f4addc913f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.122 + 100.64.95.122 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695043761 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60657840-5627-11ee-a521-41f4addc913f + + + diff --git a/graph/incidents_graphml/6/6066f7d0-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/6/6066f7d0-0b89-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52126d28b4553497ca5a5f46543ac4dc8513428d --- /dev/null +++ b/graph/incidents_graphml/6/6066f7d0-0b89-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.30.207 + 192.168.30.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.0.196 + 100.64.0.196 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686839515 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6066f7d0-0b89-11ee-a535-110da53c9d07 + + + INCIDENT_LINK + 1686839515 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6066f7d0-0b89-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/6/6069da30-8d3f-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/6/6069da30-8d3f-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6168f22ea5b7aac2dcb5abfe154bcb8156d0795a --- /dev/null +++ b/graph/incidents_graphml/6/6069da30-8d3f-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.103 + 100.64.63.103 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.159 + USER-0015-1382.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.104 + 100.64.63.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.105 + 100.64.63.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.106 + 100.64.63.106 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.223 + 100.64.25.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.107 + 100.64.63.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.49 + 100.64.62.49 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.108 + 100.64.63.108 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.109 + 100.64.63.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.110 + 100.64.63.110 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.255 + 100.64.41.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.111 + 100.64.63.111 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.153 + USER-0015-1454.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.112 + 100.64.63.112 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.113 + 100.64.63.113 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.114 + 100.64.63.114 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.252 + 100.64.7.252 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.51 + 100.64.7.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1701101383 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6069da30-8d3f-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/6/60715200-5aaf-11ee-892e-3b87e68adb1a.graphml b/graph/incidents_graphml/6/60715200-5aaf-11ee-892e-3b87e68adb1a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8152b9f1b7ff7f3c5c109185ba14ec349c8c1be5 --- /dev/null +++ b/graph/incidents_graphml/6/60715200-5aaf-11ee-892e-3b87e68adb1a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.10 + 100.64.37.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1695541977 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60715200-5aaf-11ee-892e-3b87e68adb1a + + + diff --git a/graph/incidents_graphml/6/60738200-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/60738200-5627-11ee-a521-41f4addc913f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..146591e6d92d6e5b567a6f8f618b0520e4ddfbda --- /dev/null +++ b/graph/incidents_graphml/6/60738200-5627-11ee-a521-41f4addc913f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.122 + 100.64.95.122 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695043761 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60738200-5627-11ee-a521-41f4addc913f + + + diff --git a/graph/incidents_graphml/6/6075c4e0-0b89-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/6/6075c4e0-0b89-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70c5ddf0b5c4a94e9837e24e0f75a98dab60a57d --- /dev/null +++ b/graph/incidents_graphml/6/6075c4e0-0b89-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.249 + 100.64.24.249 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.92 + 100.64.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686839515 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6075c4e0-0b89-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/6/60773a90-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/6/60773a90-090f-11ee-8afe-6d26bac63fb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2963d7437db3a5dbb302044d96faad4d4e5e7dd5 --- /dev/null +++ b/graph/incidents_graphml/6/60773a90-090f-11ee-8afe-6d26bac63fb3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.58 + 100.64.24.58 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.255 + 100.64.73.255 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686567214 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60773a90-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567214 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60773a90-090f-11ee-8afe-6d26bac63fb3 + + + diff --git a/graph/incidents_graphml/6/6077ec20-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/6/6077ec20-3eec-11ee-a139-b35fd7c3aeb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d1e19d2b34b460789c1d4caa2d75f9dc6fe4f2f --- /dev/null +++ b/graph/incidents_graphml/6/6077ec20-3eec-11ee-a139-b35fd7c3aeb6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.105 + 100.64.28.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692489544 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6077ec20-3eec-11ee-a139-b35fd7c3aeb6 + + + diff --git a/graph/incidents_graphml/6/60814d80-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/6/60814d80-4106-11ee-b538-995248355bc9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f1136646c2d39c47f4c36e9c86cb8910be9b8b8 --- /dev/null +++ b/graph/incidents_graphml/6/60814d80-4106-11ee-b538-995248355bc9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.14.83 + USER-0015-1534.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692720613 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60814d80-4106-11ee-b538-995248355bc9 + + + diff --git a/graph/incidents_graphml/6/6083a410-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/6083a410-33f8-11ee-8ffe-d166de7672c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e123e9874637f329932b491accac609d63cbe862 --- /dev/null +++ b/graph/incidents_graphml/6/6083a410-33f8-11ee-8ffe-d166de7672c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.9 + 100.64.22.9 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691285236 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6083a410-33f8-11ee-8ffe-d166de7672c0 + + + diff --git a/graph/incidents_graphml/6/60875570-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/6/60875570-3eec-11ee-a139-b35fd7c3aeb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1182aff8c1f9e164f2e995139ec486a0c2b30a70 --- /dev/null +++ b/graph/incidents_graphml/6/60875570-3eec-11ee-a139-b35fd7c3aeb6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.203 + 100.64.34.203 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692489544 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 60875570-3eec-11ee-a139-b35fd7c3aeb6 + + + diff --git a/graph/incidents_graphml/6/6088b460-ea27-11ee-9c4f-25cb7d94c0ce.graphml b/graph/incidents_graphml/6/6088b460-ea27-11ee-9c4f-25cb7d94c0ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e090738d2cbc3f3e360a09d93145696721ee1b79 --- /dev/null +++ b/graph/incidents_graphml/6/6088b460-ea27-11ee-9c4f-25cb7d94c0ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.66 + 100.64.23.66 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711316534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6088b460-ea27-11ee-9c4f-25cb7d94c0ce + + + diff --git a/graph/incidents_graphml/6/6088edd0-090f-11ee-8afe-6d26bac63fb3.graphml b/graph/incidents_graphml/6/6088edd0-090f-11ee-8afe-6d26bac63fb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a5fbb24a87817fa8f2c48c8a8dfebcdb9adc7d0 --- /dev/null +++ b/graph/incidents_graphml/6/6088edd0-090f-11ee-8afe-6d26bac63fb3.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.130 + 100.64.11.130 + ["Exploiting Target","Exploiting Host"] + 0.9634375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.180 + 100.64.71.180 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.49 + 100.64.78.49 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.50 + 100.64.78.50 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.51 + 100.64.78.51 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686567214 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6088edd0-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567214 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6088edd0-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567214 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6088edd0-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567214 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6088edd0-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567214 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6088edd0-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567214 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6088edd0-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567214 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6088edd0-090f-11ee-8afe-6d26bac63fb3 + + + INCIDENT_LINK + 1686567214 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6088edd0-090f-11ee-8afe-6d26bac63fb3 + + + diff --git a/graph/incidents_graphml/6/60892d80-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60892d80-ec7e-11ec-8d79-47d8ab3639ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d008a0d77b8eb512dc10496beb1ecd157cf4406d --- /dev/null +++ b/graph/incidents_graphml/6/60892d80-ec7e-11ec-8d79-47d8ab3639ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.74.211 + USER-0015-1778.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655278807 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60892d80-ec7e-11ec-8d79-47d8ab3639ae + + + diff --git a/graph/incidents_graphml/6/608f3bf0-dd61-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/6/608f3bf0-dd61-11ee-aed8-bd6bc51fe73f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2b359ec6dada763c7b5b98bcfa0c592a2ade324 --- /dev/null +++ b/graph/incidents_graphml/6/608f3bf0-dd61-11ee-aed8-bd6bc51fe73f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.123 + USER-0015-1971.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1709912079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 608f3bf0-dd61-11ee-aed8-bd6bc51fe73f + + + diff --git a/graph/incidents_graphml/6/60936930-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/60936930-2d6e-11ee-86c4-f93b83b6b0bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e57149ab76ae82567e0e2645f4c6fb2ff40ed289 --- /dev/null +++ b/graph/incidents_graphml/6/60936930-2d6e-11ee-86c4-f93b83b6b0bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690566258 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60936930-2d6e-11ee-86c4-f93b83b6b0bc + + + diff --git a/graph/incidents_graphml/6/60937a80-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/6/60937a80-fced-11ed-ae6a-5f6768ebee7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f75054b37f00fae8fce634d169c8f0774d3016b9 --- /dev/null +++ b/graph/incidents_graphml/6/60937a80-fced-11ed-ae6a-5f6768ebee7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.59 + 100.64.34.59 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685233197 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60937a80-fced-11ed-ae6a-5f6768ebee7b + + + diff --git a/graph/incidents_graphml/6/609dd560-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/609dd560-1eaf-11ed-a2eb-f90f4aab4c31.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af3e14eb42cbc40978f013020571c4a70a7e421b --- /dev/null +++ b/graph/incidents_graphml/6/609dd560-1eaf-11ed-a2eb-f90f4aab4c31.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.84 + 100.64.80.84 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.119 + 100.64.77.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.100 + USER-0015-1617.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.85 + 100.64.80.85 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.79.228 + 100.64.79.228 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.115 + 100.64.72.115 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.86 + 100.64.80.86 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 609dd560-1eaf-11ed-a2eb-f90f4aab4c31 + + + diff --git a/graph/incidents_graphml/6/60a04660-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/60a04660-1eaf-11ed-a2eb-f90f4aab4c31.graphml new file mode 100644 index 0000000000000000000000000000000000000000..938c5f3bbb7816a9980439f3016a2ac46b10ad83 --- /dev/null +++ b/graph/incidents_graphml/6/60a04660-1eaf-11ed-a2eb-f90f4aab4c31.graphml @@ -0,0 +1,143 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.87 + 100.64.80.87 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.71 + 100.64.73.71 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.88 + 100.64.80.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.6.187 + 100.64.6.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.240 + 100.64.1.240 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60a04660-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60a04660-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60a04660-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60a04660-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60a04660-1eaf-11ed-a2eb-f90f4aab4c31 + + + diff --git a/graph/incidents_graphml/6/60a200a0-dd61-11ee-aed8-bd6bc51fe73f.graphml b/graph/incidents_graphml/6/60a200a0-dd61-11ee-aed8-bd6bc51fe73f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8e8a6d46f23871ea10cd070abf6d7ec106285cd --- /dev/null +++ b/graph/incidents_graphml/6/60a200a0-dd61-11ee-aed8-bd6bc51fe73f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.85.123 + USER-0015-1971.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709912079 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 60a200a0-dd61-11ee-aed8-bd6bc51fe73f + + + diff --git a/graph/incidents_graphml/6/60a48c20-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/60a48c20-1eaf-11ed-a2eb-f90f4aab4c31.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed1295df79ec73ab0b9544769cfe3c38fbc996bc --- /dev/null +++ b/graph/incidents_graphml/6/60a48c20-1eaf-11ed-a2eb-f90f4aab4c31.graphml @@ -0,0 +1,697 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.235 + 100.64.6.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.196 + 100.64.75.196 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.87 + 100.64.74.87 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.20.68 + 100.64.20.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.89 + 100.64.80.89 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.226 + 100.64.1.226 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.90 + 100.64.80.90 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.198 + 100.64.79.198 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.20.44 + 100.64.20.44 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.2 + 100.64.76.2 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.91 + 100.64.80.91 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.40 + 100.64.73.40 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.92 + 100.64.80.92 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.80.93 + 100.64.80.93 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.76.202 + 100.64.76.202 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.44 + 100.64.73.44 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.94 + 100.64.80.94 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.228 + 100.64.79.228 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.80.95 + 100.64.80.95 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797410 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60a48c20-1eaf-11ed-a2eb-f90f4aab4c31 + + + diff --git a/graph/incidents_graphml/6/60ac3a80-ad8c-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/6/60ac3a80-ad8c-11ed-a9cd-bdbbd3b810c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4fedcea02955e1a29ed27a0d45c02f36c4067c21 --- /dev/null +++ b/graph/incidents_graphml/6/60ac3a80-ad8c-11ed-a9cd-bdbbd3b810c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.125 + 100.64.83.125 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.46.208.212 + 10.46.208.212 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1676505394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 60ac3a80-ad8c-11ed-a9cd-bdbbd3b810c7 + + + diff --git a/graph/incidents_graphml/6/60afbcf0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/6/60afbcf0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c7d03894e1ec925d35dac66bb8bff8e9319eb29 --- /dev/null +++ b/graph/incidents_graphml/6/60afbcf0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.46.208.212 + 10.46.208.212 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.125 + 100.64.83.125 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1676505394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 60afbcf0-ad8c-11ed-a9cd-bdbbd3b810c7 + + + diff --git a/graph/incidents_graphml/6/60afef60-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60afef60-ec7e-11ec-8d79-47d8ab3639ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a9a8cf9f44553b6225cc383d3317d7f08e2214c --- /dev/null +++ b/graph/incidents_graphml/6/60afef60-ec7e-11ec-8d79-47d8ab3639ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.75 + 100.64.78.75 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655278807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60afef60-ec7e-11ec-8d79-47d8ab3639ae + + + diff --git a/graph/incidents_graphml/6/60b1dfd0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/6/60b1dfd0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44e4835e5764d35eedea48360c6914485ddd3b25 --- /dev/null +++ b/graph/incidents_graphml/6/60b1dfd0-ad8c-11ed-a9cd-bdbbd3b810c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.126 + 100.64.83.126 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.46.208.212 + 10.46.208.212 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1676505394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60b1dfd0-ad8c-11ed-a9cd-bdbbd3b810c7 + + + diff --git a/graph/incidents_graphml/6/60b2b3d0-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/6/60b2b3d0-08e2-11ef-ae93-51753793321f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1bed504b5d25907f805e27c3b2773fa22503a07 --- /dev/null +++ b/graph/incidents_graphml/6/60b2b3d0-08e2-11ef-ae93-51753793321f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.126 + 100.64.95.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1714695385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60b2b3d0-08e2-11ef-ae93-51753793321f + + + diff --git a/graph/incidents_graphml/6/60b56240-ad8c-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/6/60b56240-ad8c-11ed-a9cd-bdbbd3b810c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65a02562fa2990dec794aa528d004924ca58ced0 --- /dev/null +++ b/graph/incidents_graphml/6/60b56240-ad8c-11ed-a9cd-bdbbd3b810c7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.46.208.212 + 10.46.208.212 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.126 + 100.64.83.126 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1676505394 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60b56240-ad8c-11ed-a9cd-bdbbd3b810c7 + + + diff --git a/graph/incidents_graphml/6/60ba4550-0c4d-11ef-8e07-3732a564a2cf.graphml b/graph/incidents_graphml/6/60ba4550-0c4d-11ef-8e07-3732a564a2cf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7036fd1c4bce7683d392bb95165af3489e8fdb58 --- /dev/null +++ b/graph/incidents_graphml/6/60ba4550-0c4d-11ef-8e07-3732a564a2cf.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.65 + 100.64.31.65 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715071194 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60ba4550-0c4d-11ef-8e07-3732a564a2cf + + + INCIDENT_LINK + 1715071194 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60ba4550-0c4d-11ef-8e07-3732a564a2cf + + + diff --git a/graph/incidents_graphml/6/60c28c60-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/60c28c60-5627-11ee-a521-41f4addc913f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fe98ccd1a1b2221f8e20710dbaf55a09f3fabe9 --- /dev/null +++ b/graph/incidents_graphml/6/60c28c60-5627-11ee-a521-41f4addc913f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.52 + 100.64.31.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695043762 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 60c28c60-5627-11ee-a521-41f4addc913f + + + diff --git a/graph/incidents_graphml/6/60cb1dd0-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/6/60cb1dd0-08e2-11ef-ae93-51753793321f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e525806c85a1bdb276df9fb9b1dc7b3c41e8d1a --- /dev/null +++ b/graph/incidents_graphml/6/60cb1dd0-08e2-11ef-ae93-51753793321f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.95.126 + 100.64.95.126 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714695385 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60cb1dd0-08e2-11ef-ae93-51753793321f + + + diff --git a/graph/incidents_graphml/6/60cc2c70-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/60cc2c70-2d6e-11ee-86c4-f93b83b6b0bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b556a205b3ea3770b0621c69e2322f2438371364 --- /dev/null +++ b/graph/incidents_graphml/6/60cc2c70-2d6e-11ee-86c4-f93b83b6b0bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.23 + 100.64.62.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690566259 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60cc2c70-2d6e-11ee-86c4-f93b83b6b0bc + + + diff --git a/graph/incidents_graphml/6/60d21cc0-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/60d21cc0-5627-11ee-a521-41f4addc913f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9071bf9a609c5d7792687bfe4c12f0ca7d7813fb --- /dev/null +++ b/graph/incidents_graphml/6/60d21cc0-5627-11ee-a521-41f4addc913f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.31.52 + 100.64.31.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695043762 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60d21cc0-5627-11ee-a521-41f4addc913f + + + diff --git a/graph/incidents_graphml/6/60d37cf0-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60d37cf0-ec7e-11ec-8d79-47d8ab3639ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20b1669568eeb2a501f88b695d8184b8341d114b --- /dev/null +++ b/graph/incidents_graphml/6/60d37cf0-ec7e-11ec-8d79-47d8ab3639ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.78.75 + 100.64.78.75 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655278807 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60d37cf0-ec7e-11ec-8d79-47d8ab3639ae + + + diff --git a/graph/incidents_graphml/6/60d84ac0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/6/60d84ac0-47e3-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..602a6b8e4f87611b4be1bc35c3945e34db9103e7 --- /dev/null +++ b/graph/incidents_graphml/6/60d84ac0-47e3-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.45 + 100.64.47.45 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693475240 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60d84ac0-47e3-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/6/60e56b60-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/60e56b60-5850-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f522923974f6a3d3c9aefc610b2963c8cfb5ea7 --- /dev/null +++ b/graph/incidents_graphml/6/60e56b60-5850-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.126 + 100.64.11.126 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695281274 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60e56b60-5850-11ee-8dda-91d41ca493d8 + + + INCIDENT_LINK + 1695281274 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60e56b60-5850-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/6/60f66e40-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/60f66e40-ec7e-11ec-8d79-47d8ab3639ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca4f75d525ffd34998342d53e901e93eb93226fd --- /dev/null +++ b/graph/incidents_graphml/6/60f66e40-ec7e-11ec-8d79-47d8ab3639ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.133 + USER-0015-1621.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655278807 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60f66e40-ec7e-11ec-8d79-47d8ab3639ae + + + diff --git a/graph/incidents_graphml/6/60f71ea0-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/60f71ea0-5850-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9c5c6d3acecc5961db1332e5f39a00e67e52550 --- /dev/null +++ b/graph/incidents_graphml/6/60f71ea0-5850-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.126 + 100.64.11.126 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695281274 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60f71ea0-5850-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/6/60f92fc0-909e-11ee-9a83-8f2a027a2cd3.graphml b/graph/incidents_graphml/6/60f92fc0-909e-11ee-9a83-8f2a027a2cd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3359de4e36aa4fe05d064b4d84f7382a380856d --- /dev/null +++ b/graph/incidents_graphml/6/60f92fc0-909e-11ee-9a83-8f2a027a2cd3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.165 + 100.64.12.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701472040 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60f92fc0-909e-11ee-9a83-8f2a027a2cd3 + + + diff --git a/graph/incidents_graphml/6/60fe0430-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/60fe0430-33f8-11ee-8ffe-d166de7672c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7570f457f9e650beef9f3bcc4c6c2c9f403b3880 --- /dev/null +++ b/graph/incidents_graphml/6/60fe0430-33f8-11ee-8ffe-d166de7672c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.174 + 100.64.14.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691285236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60fe0430-33f8-11ee-8ffe-d166de7672c0 + + + diff --git a/graph/incidents_graphml/6/60fe68c0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/60fe68c0-572b-11ee-a5b9-039463966207.graphml new file mode 100644 index 0000000000000000000000000000000000000000..142615897d5e43a66013a93eac51831515a10d04 --- /dev/null +++ b/graph/incidents_graphml/6/60fe68c0-572b-11ee-a5b9-039463966207.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.37 + 100.64.14.37 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695155431 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 60fe68c0-572b-11ee-a5b9-039463966207 + + + diff --git a/graph/incidents_graphml/6/60fed530-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/60fed530-2d6e-11ee-86c4-f93b83b6b0bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7329c2c4fab656210057b8c3513e67fbed21064d --- /dev/null +++ b/graph/incidents_graphml/6/60fed530-2d6e-11ee-86c4-f93b83b6b0bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.23 + 100.64.62.23 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690566259 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 60fed530-2d6e-11ee-86c4-f93b83b6b0bc + + + diff --git a/graph/incidents_graphml/6/6103b160-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/6/6103b160-3eec-11ee-a139-b35fd7c3aeb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce861e2091f844b62d598c8903c2b6f43b5dccff --- /dev/null +++ b/graph/incidents_graphml/6/6103b160-3eec-11ee-a139-b35fd7c3aeb6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692489545 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6103b160-3eec-11ee-a139-b35fd7c3aeb6 + + + diff --git a/graph/incidents_graphml/6/6107de90-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/6107de90-075e-11ee-a67b-a9ce333dbcaf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b982767e0b1f9c907f82563260a4621b3ef98a8c --- /dev/null +++ b/graph/incidents_graphml/6/6107de90-075e-11ee-a67b-a9ce333dbcaf.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.66 + 100.64.25.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.235 + 100.64.72.235 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.203 + 100.64.75.203 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686381243 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6107de90-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381243 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6107de90-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381243 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6107de90-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381243 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6107de90-075e-11ee-a67b-a9ce333dbcaf + + + diff --git a/graph/incidents_graphml/6/610ce7b0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/610ce7b0-572b-11ee-a5b9-039463966207.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3e518b56301965a44ae29826425ef50f3298a64 --- /dev/null +++ b/graph/incidents_graphml/6/610ce7b0-572b-11ee-a5b9-039463966207.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.37 + 100.64.14.37 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695155431 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 610ce7b0-572b-11ee-a5b9-039463966207 + + + diff --git a/graph/incidents_graphml/6/61106f40-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/61106f40-7a0b-11ee-bc21-531635bc60cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c151c8fa41086f3226058a648a518bb2e3456ef --- /dev/null +++ b/graph/incidents_graphml/6/61106f40-7a0b-11ee-bc21-531635bc60cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.160 + 100.64.7.160 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698989978 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61106f40-7a0b-11ee-bc21-531635bc60cd + + + diff --git a/graph/incidents_graphml/6/61114940-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/61114940-ec7e-11ec-8d79-47d8ab3639ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d6dfe04584822cbe0f132627722827df286417c --- /dev/null +++ b/graph/incidents_graphml/6/61114940-ec7e-11ec-8d79-47d8ab3639ae.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.49 + 100.64.23.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.38 + USER-0015-1740.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655278808 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61114940-ec7e-11ec-8d79-47d8ab3639ae + + + INCIDENT_LINK + 1655278808 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61114940-ec7e-11ec-8d79-47d8ab3639ae + + + diff --git a/graph/incidents_graphml/6/61181d80-41e5-11ed-ad31-51848920452c.graphml b/graph/incidents_graphml/6/61181d80-41e5-11ed-ad31-51848920452c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c60b068ed8fb72434cae1e6563dc103cbd24bef --- /dev/null +++ b/graph/incidents_graphml/6/61181d80-41e5-11ed-ad31-51848920452c.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.219 + 100.64.75.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.222 + 100.64.71.222 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.220 + 100.64.75.220 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.221 + 100.64.75.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.222 + 100.64.75.222 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1664668895 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61181d80-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668895 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61181d80-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668895 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61181d80-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668895 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61181d80-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668895 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61181d80-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668895 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61181d80-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668895 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61181d80-41e5-11ed-ad31-51848920452c + + + INCIDENT_LINK + 1664668895 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61181d80-41e5-11ed-ad31-51848920452c + + + diff --git a/graph/incidents_graphml/6/61186a00-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/61186a00-33f8-11ee-8ffe-d166de7672c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a87f9a2b393a3117443b0ef7aed6685e461a447 --- /dev/null +++ b/graph/incidents_graphml/6/61186a00-33f8-11ee-8ffe-d166de7672c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.174 + 100.64.14.174 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691285237 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61186a00-33f8-11ee-8ffe-d166de7672c0 + + + diff --git a/graph/incidents_graphml/6/611991d0-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/611991d0-075e-11ee-a67b-a9ce333dbcaf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64eb9cc03a3f5a14243d61403fb28c0ead85b364 --- /dev/null +++ b/graph/incidents_graphml/6/611991d0-075e-11ee-a67b-a9ce333dbcaf.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.70 + 100.64.20.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.74.30 + 100.64.74.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686381243 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 611991d0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381243 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 611991d0-075e-11ee-a67b-a9ce333dbcaf + + + diff --git a/graph/incidents_graphml/6/611e3e40-3eec-11ee-a139-b35fd7c3aeb6.graphml b/graph/incidents_graphml/6/611e3e40-3eec-11ee-a139-b35fd7c3aeb6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df959e9f1aad62a776350fcfaac6d86d3d8ce680 --- /dev/null +++ b/graph/incidents_graphml/6/611e3e40-3eec-11ee-a139-b35fd7c3aeb6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.200 + 100.64.47.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692489545 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 611e3e40-3eec-11ee-a139-b35fd7c3aeb6 + + + diff --git a/graph/incidents_graphml/6/611e4690-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/6/611e4690-f6bd-11ee-861e-3f1320280b96.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ca9bfc17af5dcf93a6ad0c3611352cf6aaab94f --- /dev/null +++ b/graph/incidents_graphml/6/611e4690-f6bd-11ee-861e-3f1320280b96.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.200 + USER-0015-1333.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712700373 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 611e4690-f6bd-11ee-861e-3f1320280b96 + + + diff --git a/graph/incidents_graphml/6/611f6810-dcdf-11ee-9697-039b254a6d03.graphml b/graph/incidents_graphml/6/611f6810-dcdf-11ee-9697-039b254a6d03.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6617decb6395ddfb11405d594ce1e59646a592fe --- /dev/null +++ b/graph/incidents_graphml/6/611f6810-dcdf-11ee-9697-039b254a6d03.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.72 + 100.64.13.72 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1709856246 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 611f6810-dcdf-11ee-9697-039b254a6d03 + + + diff --git a/graph/incidents_graphml/6/6120bdd0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/6120bdd0-572b-11ee-a5b9-039463966207.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f83ef7330420fd56959ec5b39ab828c3e0ff1cde --- /dev/null +++ b/graph/incidents_graphml/6/6120bdd0-572b-11ee-a5b9-039463966207.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.233 + 100.64.65.233 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695155432 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 6120bdd0-572b-11ee-a5b9-039463966207 + + + diff --git a/graph/incidents_graphml/6/61214e30-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/61214e30-5627-11ee-a521-41f4addc913f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9eb6c8dd00766e2e26b33ea7ca54bad6c7318c5b --- /dev/null +++ b/graph/incidents_graphml/6/61214e30-5627-11ee-a521-41f4addc913f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.245 + USER-0015-1220.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.190.96.179 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1695043762 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61214e30-5627-11ee-a521-41f4addc913f + + + diff --git a/graph/incidents_graphml/6/612a5200-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/612a5200-2d6e-11ee-86c4-f93b83b6b0bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..339fdacd7777a619cfc5114f83867fe69ba5218a --- /dev/null +++ b/graph/incidents_graphml/6/612a5200-2d6e-11ee-86c4-f93b83b6b0bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.187 + USER-0015-1268.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690566259 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 612a5200-2d6e-11ee-86c4-f93b83b6b0bc + + + diff --git a/graph/incidents_graphml/6/61316910-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/61316910-69d6-11ee-b4c0-f17986d6e969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..671de79838db14963932b48c8cdd41311e32894a --- /dev/null +++ b/graph/incidents_graphml/6/61316910-69d6-11ee-b4c0-f17986d6e969.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.67 + 100.64.38.67 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697207997 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61316910-69d6-11ee-b4c0-f17986d6e969 + + + diff --git a/graph/incidents_graphml/6/61317ad0-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/61317ad0-5627-11ee-a521-41f4addc913f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64c1fe365e7862f5b502fe17b63b8c10c1b7a01e --- /dev/null +++ b/graph/incidents_graphml/6/61317ad0-5627-11ee-a521-41f4addc913f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.190.96.179 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.19.245 + USER-0015-1220.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695043763 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61317ad0-5627-11ee-a521-41f4addc913f + + + diff --git a/graph/incidents_graphml/6/6134db40-1129-11ef-bb83-81e72f4f2ed0.graphml b/graph/incidents_graphml/6/6134db40-1129-11ef-bb83-81e72f4f2ed0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0568c08bb56099b252430aa8ea1af6dec7c8cbf6 --- /dev/null +++ b/graph/incidents_graphml/6/6134db40-1129-11ef-bb83-81e72f4f2ed0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.191 + 100.64.7.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715605489 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6134db40-1129-11ef-bb83-81e72f4f2ed0 + + + diff --git a/graph/incidents_graphml/6/613717d0-ea5e-11ee-b380-23a0be8babf0.graphml b/graph/incidents_graphml/6/613717d0-ea5e-11ee-b380-23a0be8babf0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..23b03e26c1938ff4ade6c5ae1706c3e0070e1fef --- /dev/null +++ b/graph/incidents_graphml/6/613717d0-ea5e-11ee-b380-23a0be8babf0.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.143 + 100.64.39.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.144 + 100.64.39.144 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.94 + 100.64.25.94 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1711340157 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 613717d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340157 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 613717d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340157 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 613717d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340157 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 613717d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340157 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 613717d0-ea5e-11ee-b380-23a0be8babf0 + + + INCIDENT_LINK + 1711340157 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 613717d0-ea5e-11ee-b380-23a0be8babf0 + + + diff --git a/graph/incidents_graphml/6/61380bd0-f0f9-11ee-9141-97f57fdeb7f9.graphml b/graph/incidents_graphml/6/61380bd0-f0f9-11ee-9141-97f57fdeb7f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82280ef0bc9c56dc0cbaafb7a94d4f045c82cd52 --- /dev/null +++ b/graph/incidents_graphml/6/61380bd0-f0f9-11ee-9141-97f57fdeb7f9.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.160 + 100.64.69.160 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.42.127 + 100.64.42.127 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1712066436 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61380bd0-f0f9-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712066436 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61380bd0-f0f9-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712066436 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61380bd0-f0f9-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712066436 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61380bd0-f0f9-11ee-9141-97f57fdeb7f9 + + + diff --git a/graph/incidents_graphml/6/61396fb0-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/6/61396fb0-f6bd-11ee-861e-3f1320280b96.graphml new file mode 100644 index 0000000000000000000000000000000000000000..903116f7605c67a6f6256ef4123013166e15271f --- /dev/null +++ b/graph/incidents_graphml/6/61396fb0-f6bd-11ee-861e-3f1320280b96.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.200 + USER-0015-1333.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712700373 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61396fb0-f6bd-11ee-861e-3f1320280b96 + + + diff --git a/graph/incidents_graphml/6/613cc570-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/613cc570-5627-11ee-a521-41f4addc913f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..187ccfda986e2a0d98457a28760db05107a9bac8 --- /dev/null +++ b/graph/incidents_graphml/6/613cc570-5627-11ee-a521-41f4addc913f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.68 + USER-0015-2130.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695043763 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 613cc570-5627-11ee-a521-41f4addc913f + + + diff --git a/graph/incidents_graphml/6/614096a0-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/614096a0-ec7e-11ec-8d79-47d8ab3639ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc254eb3f59438fe1a491c9cc1d07126868934da --- /dev/null +++ b/graph/incidents_graphml/6/614096a0-ec7e-11ec-8d79-47d8ab3639ae.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.77 + 100.64.78.77 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.93 + 100.64.73.93 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655278808 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 614096a0-ec7e-11ec-8d79-47d8ab3639ae + + + INCIDENT_LINK + 1655278808 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 614096a0-ec7e-11ec-8d79-47d8ab3639ae + + + INCIDENT_LINK + 1655278808 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 614096a0-ec7e-11ec-8d79-47d8ab3639ae + + + INCIDENT_LINK + 1655278808 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 614096a0-ec7e-11ec-8d79-47d8ab3639ae + + + diff --git a/graph/incidents_graphml/6/6141e3d0-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/6141e3d0-69d6-11ee-b4c0-f17986d6e969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..442ac962b610081b630613fad6971aa96e7de770 --- /dev/null +++ b/graph/incidents_graphml/6/6141e3d0-69d6-11ee-b4c0-f17986d6e969.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.67 + 100.64.38.67 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697207997 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6141e3d0-69d6-11ee-b4c0-f17986d6e969 + + + diff --git a/graph/incidents_graphml/6/614a8110-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/614a8110-5627-11ee-a521-41f4addc913f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9c3ff1623de8335dd84538dc68bd849c84b14be --- /dev/null +++ b/graph/incidents_graphml/6/614a8110-5627-11ee-a521-41f4addc913f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.32.68 + USER-0015-2130.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695043763 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 614a8110-5627-11ee-a521-41f4addc913f + + + diff --git a/graph/incidents_graphml/6/614cafd0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/614cafd0-572b-11ee-a5b9-039463966207.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40b74663ed10bce154d267f68f013ecc33370a45 --- /dev/null +++ b/graph/incidents_graphml/6/614cafd0-572b-11ee-a5b9-039463966207.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.47 + 100.64.7.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695155432 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614cafd0-572b-11ee-a5b9-039463966207 + + + diff --git a/graph/incidents_graphml/6/614e60b0-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/614e60b0-1eaf-11ed-a2eb-f90f4aab4c31.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d435b502784b2229b375541f52e2251bfb8d867 --- /dev/null +++ b/graph/incidents_graphml/6/614e60b0-1eaf-11ed-a2eb-f90f4aab4c31.graphml @@ -0,0 +1,775 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.237 + 100.64.71.237 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.233 + 100.64.73.233 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.40 + 100.64.1.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.69 + 100.64.73.69 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.253 + 100.64.70.253 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.96 + 100.64.80.96 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.249 + 100.64.73.249 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.243 + 100.64.71.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.97 + 100.64.80.97 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.160 + 100.64.76.160 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.98 + 100.64.80.98 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.99 + 100.64.80.99 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.217 + 100.64.74.217 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.93 + 100.64.71.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.100 + 100.64.80.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.63 + USER-0015-1731.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.157 + 100.64.71.157 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.101 + 100.64.80.101 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.179 + 100.64.71.179 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 614e60b0-1eaf-11ed-a2eb-f90f4aab4c31 + + + diff --git a/graph/incidents_graphml/6/615077a0-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/615077a0-2d6e-11ee-86c4-f93b83b6b0bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f8f6d2e5cea92ef5b5f5210273c52905013f740 --- /dev/null +++ b/graph/incidents_graphml/6/615077a0-2d6e-11ee-86c4-f93b83b6b0bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.187 + USER-0015-1268.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690566259 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 615077a0-2d6e-11ee-86c4-f93b83b6b0bc + + + diff --git a/graph/incidents_graphml/6/6155cbb0-5627-11ee-a521-41f4addc913f.graphml b/graph/incidents_graphml/6/6155cbb0-5627-11ee-a521-41f4addc913f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77c620ad6b3721b205979cbd53c550c82be91179 --- /dev/null +++ b/graph/incidents_graphml/6/6155cbb0-5627-11ee-a521-41f4addc913f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.221 + 100.64.13.221 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695043763 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6155cbb0-5627-11ee-a521-41f4addc913f + + + diff --git a/graph/incidents_graphml/6/61573700-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/61573700-452b-11ee-8fcc-0fb1848fa316.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b223e26b92e785beb3cdd734c71dd5f2caf9674f --- /dev/null +++ b/graph/incidents_graphml/6/61573700-452b-11ee-8fcc-0fb1848fa316.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.87 + 100.64.27.87 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61573700-452b-11ee-8fcc-0fb1848fa316 + + + diff --git a/graph/incidents_graphml/6/615c8e50-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/615c8e50-572b-11ee-a5b9-039463966207.graphml new file mode 100644 index 0000000000000000000000000000000000000000..264d4dea5708d600d3c84745b6c2b9f0326bfd4d --- /dev/null +++ b/graph/incidents_graphml/6/615c8e50-572b-11ee-a5b9-039463966207.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.47 + 100.64.7.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695155432 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 615c8e50-572b-11ee-a5b9-039463966207 + + + diff --git a/graph/incidents_graphml/6/615de2a0-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/615de2a0-ec7e-11ec-8d79-47d8ab3639ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fbcfa30beb0c5cdcde0a5827a1ba90902f1bcd1 --- /dev/null +++ b/graph/incidents_graphml/6/615de2a0-ec7e-11ec-8d79-47d8ab3639ae.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.85 + 100.64.73.85 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.10.46 + 100.64.10.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655278808 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 615de2a0-ec7e-11ec-8d79-47d8ab3639ae + + + INCIDENT_LINK + 1655278808 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 615de2a0-ec7e-11ec-8d79-47d8ab3639ae + + + diff --git a/graph/incidents_graphml/6/616ae410-dc46-11ed-a13f-b55f72705f61.graphml b/graph/incidents_graphml/6/616ae410-dc46-11ed-a13f-b55f72705f61.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f0e6de41da3c1cd95fe22f5b3a673790bdbb6a6 --- /dev/null +++ b/graph/incidents_graphml/6/616ae410-dc46-11ed-a13f-b55f72705f61.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.7 + 100.64.68.7 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Target","Exploiting Host","Ransomware Target","Ransomware Source"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + INCIDENT_LINK + 1681643035 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target","Ransomware Source"] + complete-mission + Unprocessed + 616ae410-dc46-11ed-a13f-b55f72705f61 + + + diff --git a/graph/incidents_graphml/6/616b0d40-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/616b0d40-572b-11ee-a5b9-039463966207.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdc16558b8f250abb5d488ca8ea8862102ee08aa --- /dev/null +++ b/graph/incidents_graphml/6/616b0d40-572b-11ee-a5b9-039463966207.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.118 + 100.64.15.118 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695155432 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 616b0d40-572b-11ee-a5b9-039463966207 + + + diff --git a/graph/incidents_graphml/6/616d9620-ea27-11ee-9c4f-25cb7d94c0ce.graphml b/graph/incidents_graphml/6/616d9620-ea27-11ee-9c4f-25cb7d94c0ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..baaffc6e803e1fc797fd91bc31615270dc3261cf --- /dev/null +++ b/graph/incidents_graphml/6/616d9620-ea27-11ee-9c4f-25cb7d94c0ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.171 + 100.64.52.171 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711316535 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 616d9620-ea27-11ee-9c4f-25cb7d94c0ce + + + diff --git a/graph/incidents_graphml/6/61725780-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/61725780-2d6e-11ee-86c4-f93b83b6b0bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cef7b35c871fc0fe8c5e723abe73f9d1540b711d --- /dev/null +++ b/graph/incidents_graphml/6/61725780-2d6e-11ee-86c4-f93b83b6b0bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.25 + 100.64.62.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690566260 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61725780-2d6e-11ee-86c4-f93b83b6b0bc + + + diff --git a/graph/incidents_graphml/6/6172da90-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/6172da90-7a0b-11ee-bc21-531635bc60cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d90bfe721d64cd789b99268002c696e90f99f417 --- /dev/null +++ b/graph/incidents_graphml/6/6172da90-7a0b-11ee-bc21-531635bc60cd.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.178 + 100.64.11.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698989979 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6172da90-7a0b-11ee-bc21-531635bc60cd + + + INCIDENT_LINK + 1698989979 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6172da90-7a0b-11ee-bc21-531635bc60cd + + + diff --git a/graph/incidents_graphml/6/6178eff0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/6178eff0-572b-11ee-a5b9-039463966207.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cee710a7906bceac3bfae5a8086111070a439754 --- /dev/null +++ b/graph/incidents_graphml/6/6178eff0-572b-11ee-a5b9-039463966207.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.118 + 100.64.15.118 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695155432 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6178eff0-572b-11ee-a5b9-039463966207 + + + diff --git a/graph/incidents_graphml/6/617a9260-ec7e-11ec-8d79-47d8ab3639ae.graphml b/graph/incidents_graphml/6/617a9260-ec7e-11ec-8d79-47d8ab3639ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7dcfdfd3aafec1b8a72e28caabaaaa278e7ed04 --- /dev/null +++ b/graph/incidents_graphml/6/617a9260-ec7e-11ec-8d79-47d8ab3639ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.189 + USER-0015-1779.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655278808 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 617a9260-ec7e-11ec-8d79-47d8ab3639ae + + + diff --git a/graph/incidents_graphml/6/6183df60-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/6183df60-6e77-11ee-9076-51a308ac33b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d57b12070a486b28a1b9d3c19c1486ec97ada51 --- /dev/null +++ b/graph/incidents_graphml/6/6183df60-6e77-11ee-9076-51a308ac33b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.154 + 100.64.15.154 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697716951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6183df60-6e77-11ee-9076-51a308ac33b9 + + + diff --git a/graph/incidents_graphml/6/6184fde0-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/6184fde0-572b-11ee-a5b9-039463966207.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3edae8d77d73efe62bb7b8702d8afa4cf42c530 --- /dev/null +++ b/graph/incidents_graphml/6/6184fde0-572b-11ee-a5b9-039463966207.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.109 + 100.64.19.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695155432 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6184fde0-572b-11ee-a5b9-039463966207 + + + diff --git a/graph/incidents_graphml/6/61852a10-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/61852a10-7a0b-11ee-bc21-531635bc60cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7276fb6ae785b06565190f63ad85393d351db5be --- /dev/null +++ b/graph/incidents_graphml/6/61852a10-7a0b-11ee-bc21-531635bc60cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.178 + 100.64.11.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698989979 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 61852a10-7a0b-11ee-bc21-531635bc60cd + + + diff --git a/graph/incidents_graphml/6/6191f630-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/6191f630-572b-11ee-a5b9-039463966207.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8d2414c116a51108e9d7ee9c2cf7b305daed6af --- /dev/null +++ b/graph/incidents_graphml/6/6191f630-572b-11ee-a5b9-039463966207.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.109 + 100.64.19.109 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695155432 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6191f630-572b-11ee-a5b9-039463966207 + + + diff --git a/graph/incidents_graphml/6/619c5f50-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/619c5f50-5850-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b27706bd2b609909dbe05c34d6142ce59fbc622c --- /dev/null +++ b/graph/incidents_graphml/6/619c5f50-5850-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.45 + 100.64.19.45 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695281275 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 619c5f50-5850-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/6/619d0cb0-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/619d0cb0-6e77-11ee-9076-51a308ac33b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2524280e607835508ea072f29c494ead5ded2100 --- /dev/null +++ b/graph/incidents_graphml/6/619d0cb0-6e77-11ee-9076-51a308ac33b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.154 + 100.64.15.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697716951 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 619d0cb0-6e77-11ee-9076-51a308ac33b9 + + + diff --git a/graph/incidents_graphml/6/619eb100-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/619eb100-33f8-11ee-8ffe-d166de7672c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..681ba0add23c58e2156ca4a48edbe7ee3a3f8809 --- /dev/null +++ b/graph/incidents_graphml/6/619eb100-33f8-11ee-8ffe-d166de7672c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.24 + 100.64.41.24 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691285237 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 619eb100-33f8-11ee-8ffe-d166de7672c0 + + + diff --git a/graph/incidents_graphml/6/61a15900-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/61a15900-3b5f-11ee-8185-4b4569232a9b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..263045337fd51d0e98e4b6f920d2ce1e8b2a1539 --- /dev/null +++ b/graph/incidents_graphml/6/61a15900-3b5f-11ee-8185-4b4569232a9b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.151 + 100.64.27.151 + ["Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692099134 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a15900-3b5f-11ee-8185-4b4569232a9b + + + diff --git a/graph/incidents_graphml/6/61a5f690-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/61a5f690-1eaf-11ed-a2eb-f90f4aab4c31.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b229ceadd57a909cbcaf1b094f64b9d89751ddd3 --- /dev/null +++ b/graph/incidents_graphml/6/61a5f690-1eaf-11ed-a2eb-f90f4aab4c31.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.92 + 100.64.74.92 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.92 + 100.64.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.102 + 100.64.80.102 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.19.196 + 100.64.19.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.13.187 + 100.64.13.187 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.13 + 100.64.74.13 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.45.196 + 100.64.45.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.59 + 100.64.1.59 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.103 + 100.64.80.103 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.63.223 + 100.64.63.223 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.75 + 100.64.73.75 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.2.213 + 100.64.2.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.104 + 100.64.80.104 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.202 + 100.64.76.202 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.105 + 100.64.80.105 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.106 + 100.64.80.106 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.45 + 100.64.73.45 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.107 + 100.64.80.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.215 + 100.64.72.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.108 + 100.64.80.108 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.42 + 100.64.72.42 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797412 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61a5f690-1eaf-11ed-a2eb-f90f4aab4c31 + + + diff --git a/graph/incidents_graphml/6/61a8bab0-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/6/61a8bab0-f286-11ec-babd-d5ed2eda1ac6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be1a848a674fc6158ac44672d29ff09e56553ba4 --- /dev/null +++ b/graph/incidents_graphml/6/61a8bab0-f286-11ec-babd-d5ed2eda1ac6.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.28 + 100.64.1.28 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.158 + 100.64.1.158 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.29 + USER-0015-1894.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.104 + 100.64.81.104 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655941951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61a8bab0-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61a8bab0-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61a8bab0-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61a8bab0-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61a8bab0-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61a8bab0-f286-11ec-babd-d5ed2eda1ac6 + + + diff --git a/graph/incidents_graphml/6/61abefb0-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/61abefb0-5850-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68645e9d5dea211e3565b93f737526aeab645c99 --- /dev/null +++ b/graph/incidents_graphml/6/61abefb0-5850-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.45 + 100.64.19.45 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695281275 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61abefb0-5850-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/6/61ae71d0-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/61ae71d0-6e77-11ee-9076-51a308ac33b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e4215e5521acfa41c48ff5ecc706f6134b7aa66 --- /dev/null +++ b/graph/incidents_graphml/6/61ae71d0-6e77-11ee-9076-51a308ac33b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.156 + 100.64.15.156 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697716951 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61ae71d0-6e77-11ee-9076-51a308ac33b9 + + + diff --git a/graph/incidents_graphml/6/61b657b0-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/61b657b0-33f8-11ee-8ffe-d166de7672c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59e48df62f6bf60de051f5db75ce91766713f516 --- /dev/null +++ b/graph/incidents_graphml/6/61b657b0-33f8-11ee-8ffe-d166de7672c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.24 + 100.64.41.24 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691285238 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61b657b0-33f8-11ee-8ffe-d166de7672c0 + + + diff --git a/graph/incidents_graphml/6/61b899e0-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/61b899e0-5850-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84bdadef629bc41a5cf61b04bcbf22186c05ed8c --- /dev/null +++ b/graph/incidents_graphml/6/61b899e0-5850-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.117 + 100.64.65.117 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695281275 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 61b899e0-5850-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/6/61bbc550-572b-11ee-a5b9-039463966207.graphml b/graph/incidents_graphml/6/61bbc550-572b-11ee-a5b9-039463966207.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c61a520c4c675fe0fb385329af6440f122a1119 --- /dev/null +++ b/graph/incidents_graphml/6/61bbc550-572b-11ee-a5b9-039463966207.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.235 + 100.64.65.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695155433 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61bbc550-572b-11ee-a5b9-039463966207 + + + diff --git a/graph/incidents_graphml/6/61c0e860-6e77-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/6/61c0e860-6e77-11ee-9076-51a308ac33b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6cc69b336b163f704ecef49511952593a61852a4 --- /dev/null +++ b/graph/incidents_graphml/6/61c0e860-6e77-11ee-9076-51a308ac33b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.156 + 100.64.15.156 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697716951 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61c0e860-6e77-11ee-9076-51a308ac33b9 + + + diff --git a/graph/incidents_graphml/6/61c718d0-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/61c718d0-5850-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3409f094cac3ccc4d83fc284079dfb09a9ab59c1 --- /dev/null +++ b/graph/incidents_graphml/6/61c718d0-5850-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.117 + 100.64.65.117 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695281275 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61c718d0-5850-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/6/61c7a5b0-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/61c7a5b0-3b5f-11ee-8185-4b4569232a9b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86fa8cf155ea9d4f19bf8d8d18ef9c360b1e6618 --- /dev/null +++ b/graph/incidents_graphml/6/61c7a5b0-3b5f-11ee-8185-4b4569232a9b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.151 + 100.64.27.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692099134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 61c7a5b0-3b5f-11ee-8185-4b4569232a9b + + + diff --git a/graph/incidents_graphml/6/61ce7390-33f8-11ee-8ffe-d166de7672c0.graphml b/graph/incidents_graphml/6/61ce7390-33f8-11ee-8ffe-d166de7672c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4529af169435c80168aaffda47c3d41851fde537 --- /dev/null +++ b/graph/incidents_graphml/6/61ce7390-33f8-11ee-8ffe-d166de7672c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.26 + 100.64.41.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691285238 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61ce7390-33f8-11ee-8ffe-d166de7672c0 + + + diff --git a/graph/incidents_graphml/6/61d0f4c0-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/6/61d0f4c0-f6bd-11ee-861e-3f1320280b96.graphml new file mode 100644 index 0000000000000000000000000000000000000000..695f1ab318d3e005fb1977f6c415573e661a8ff3 --- /dev/null +++ b/graph/incidents_graphml/6/61d0f4c0-f6bd-11ee-861e-3f1320280b96.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.166 + 100.64.61.166 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712700374 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61d0f4c0-f6bd-11ee-861e-3f1320280b96 + + + diff --git a/graph/incidents_graphml/6/61d18e40-85f1-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/6/61d18e40-85f1-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..183ab05e1ad89ad7c557129258222f1d8f97bdfe --- /dev/null +++ b/graph/incidents_graphml/6/61d18e40-85f1-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.187 + 100.64.37.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700298227 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61d18e40-85f1-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/6/61d567b0-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/61d567b0-452b-11ee-8fcc-0fb1848fa316.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1ff21ee0083f40b038af1d8cf63efde79fdac14 --- /dev/null +++ b/graph/incidents_graphml/6/61d567b0-452b-11ee-8fcc-0fb1848fa316.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.210 + 100.64.10.210 + ["Exploiting Target","Exploiting Host"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176312 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61d567b0-452b-11ee-8fcc-0fb1848fa316 + + + diff --git a/graph/incidents_graphml/6/61d9b5c0-f286-11ec-babd-d5ed2eda1ac6.graphml b/graph/incidents_graphml/6/61d9b5c0-f286-11ec-babd-d5ed2eda1ac6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..97593ba91f547434de613433a82682fbd5679ec5 --- /dev/null +++ b/graph/incidents_graphml/6/61d9b5c0-f286-11ec-babd-d5ed2eda1ac6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.89 + 100.64.13.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.235 + 100.64.72.235 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655941952 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61d9b5c0-f286-11ec-babd-d5ed2eda1ac6 + + + INCIDENT_LINK + 1655941952 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61d9b5c0-f286-11ec-babd-d5ed2eda1ac6 + + + diff --git a/graph/incidents_graphml/6/61e280f0-f6bd-11ee-861e-3f1320280b96.graphml b/graph/incidents_graphml/6/61e280f0-f6bd-11ee-861e-3f1320280b96.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c78b5f31c188c76b0a6a5fa770e9f738b5d4ac39 --- /dev/null +++ b/graph/incidents_graphml/6/61e280f0-f6bd-11ee-861e-3f1320280b96.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.166 + 100.64.61.166 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712700374 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61e280f0-f6bd-11ee-861e-3f1320280b96 + + + diff --git a/graph/incidents_graphml/6/61e32580-1b60-11ed-9931-5799b48b5de2.graphml b/graph/incidents_graphml/6/61e32580-1b60-11ed-9931-5799b48b5de2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..781318c0539f83b70d1673024819e6dacbeb55ae --- /dev/null +++ b/graph/incidents_graphml/6/61e32580-1b60-11ed-9931-5799b48b5de2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.13 + 100.64.72.13 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660433629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61e32580-1b60-11ed-9931-5799b48b5de2 + + + diff --git a/graph/incidents_graphml/6/61ecec90-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/61ecec90-7a0b-11ee-bc21-531635bc60cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3b10fa691d584451c9b06bd6961bcd26c34d4d1 --- /dev/null +++ b/graph/incidents_graphml/6/61ecec90-7a0b-11ee-bc21-531635bc60cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.56 + 100.64.13.56 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698989980 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61ecec90-7a0b-11ee-bc21-531635bc60cd + + + diff --git a/graph/incidents_graphml/6/61eeb5b0-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/61eeb5b0-3b5f-11ee-8185-4b4569232a9b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e34cce42f1baedfff0ed715b273315293a9c4f5 --- /dev/null +++ b/graph/incidents_graphml/6/61eeb5b0-3b5f-11ee-8185-4b4569232a9b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.151 + 100.64.27.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692099134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61eeb5b0-3b5f-11ee-8185-4b4569232a9b + + + diff --git a/graph/incidents_graphml/6/61f63970-1eaf-11ed-a2eb-f90f4aab4c31.graphml b/graph/incidents_graphml/6/61f63970-1eaf-11ed-a2eb-f90f4aab4c31.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65f17a8520fc19a06565202c0c16b21d56e75aa5 --- /dev/null +++ b/graph/incidents_graphml/6/61f63970-1eaf-11ed-a2eb-f90f4aab4c31.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.251 + 100.64.71.251 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.170 + 100.64.72.170 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.13.115 + 100.64.13.115 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.76 + 100.64.74.76 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.109 + 100.64.80.109 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.8.153 + 100.64.8.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.152 + 100.64.72.152 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.110 + 100.64.80.110 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.68.216 + 100.64.68.216 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.101 + 100.64.71.101 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.220 + 100.64.73.220 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.14.189 + 100.64.14.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.105 + 100.64.11.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.180 + 100.64.71.180 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.111 + 100.64.80.111 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.208 + 100.64.73.208 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.146 + 100.64.77.146 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.160 + 100.64.72.160 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.112 + 100.64.80.112 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.113 + 100.64.80.113 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.80.114 + 100.64.80.114 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + INCIDENT_LINK + 1660797413 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 61f63970-1eaf-11ed-a2eb-f90f4aab4c31 + + + diff --git a/graph/incidents_graphml/6/61f64ef0-09b4-11ef-9ef0-737536dee9f3.graphml b/graph/incidents_graphml/6/61f64ef0-09b4-11ef-9ef0-737536dee9f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f68fd81f2dc4d9f42de77de56adf2758e3e6bdce --- /dev/null +++ b/graph/incidents_graphml/6/61f64ef0-09b4-11ef-9ef0-737536dee9f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.92 + 100.64.64.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714785581 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 61f64ef0-09b4-11ef-9ef0-737536dee9f3 + + + diff --git a/graph/incidents_graphml/6/61fe51b0-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/61fe51b0-7a0b-11ee-bc21-531635bc60cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8550645e5c69214375fc04560c6bd150c3ef8833 --- /dev/null +++ b/graph/incidents_graphml/6/61fe51b0-7a0b-11ee-bc21-531635bc60cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.56 + 100.64.13.56 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698989980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 61fe51b0-7a0b-11ee-bc21-531635bc60cd + + + diff --git a/graph/incidents_graphml/6/620b9820-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/620b9820-7a0b-11ee-bc21-531635bc60cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2d39a75bac7a2f614d5b66bea377671682b7339 --- /dev/null +++ b/graph/incidents_graphml/6/620b9820-7a0b-11ee-bc21-531635bc60cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.89 + 100.64.53.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698989980 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 620b9820-7a0b-11ee-bc21-531635bc60cd + + + diff --git a/graph/incidents_graphml/6/621b0170-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/621b0170-7a0b-11ee-bc21-531635bc60cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fc1b0e5deffb0e6b5fb78de92bb46f857f83530 --- /dev/null +++ b/graph/incidents_graphml/6/621b0170-7a0b-11ee-bc21-531635bc60cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.89 + 100.64.53.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698989980 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 621b0170-7a0b-11ee-bc21-531635bc60cd + + + diff --git a/graph/incidents_graphml/6/621fb0c0-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/621fb0c0-3b5f-11ee-8185-4b4569232a9b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7328db1602482004582b44645e6677ef93094e02 --- /dev/null +++ b/graph/incidents_graphml/6/621fb0c0-3b5f-11ee-8185-4b4569232a9b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.151 + 100.64.27.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692099135 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 621fb0c0-3b5f-11ee-8185-4b4569232a9b + + + diff --git a/graph/incidents_graphml/6/623f7e50-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/6/623f7e50-140e-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a9f38fde9ac7ea3e2cc807c5831f8034eccbcfb --- /dev/null +++ b/graph/incidents_graphml/6/623f7e50-140e-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.202 + 100.64.32.202 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.184 + 100.64.77.184 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687776250 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 623f7e50-140e-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687776250 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 623f7e50-140e-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/6/6246a430-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/6/6246a430-4106-11ee-b538-995248355bc9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec8642c4d8a13f3ff83c61db332b8190fa7e6ea7 --- /dev/null +++ b/graph/incidents_graphml/6/6246a430-4106-11ee-b538-995248355bc9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692720616 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6246a430-4106-11ee-b538-995248355bc9 + + + diff --git a/graph/incidents_graphml/6/62498a60-4106-11ee-b538-995248355bc9.graphml b/graph/incidents_graphml/6/62498a60-4106-11ee-b538-995248355bc9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a16e75a010d4a41548321b881084ba683988299 --- /dev/null +++ b/graph/incidents_graphml/6/62498a60-4106-11ee-b538-995248355bc9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1692720616 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 62498a60-4106-11ee-b538-995248355bc9 + + + diff --git a/graph/incidents_graphml/6/624f0490-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/624f0490-075e-11ee-a67b-a9ce333dbcaf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ca1e0de2923d2fe777a6e22cd5566290615ead0 --- /dev/null +++ b/graph/incidents_graphml/6/624f0490-075e-11ee-a67b-a9ce333dbcaf.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.165 + 100.64.33.165 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.104 + HOST-13883 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.204 + 100.64.75.204 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.205 + 100.64.75.205 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686381245 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 624f0490-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 624f0490-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 624f0490-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 624f0490-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 624f0490-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 624f0490-075e-11ee-a67b-a9ce333dbcaf + + + diff --git a/graph/incidents_graphml/6/625404f0-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/625404f0-2d6e-11ee-86c4-f93b83b6b0bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00077821926a559255639a51dc53dac662d6be63 --- /dev/null +++ b/graph/incidents_graphml/6/625404f0-2d6e-11ee-86c4-f93b83b6b0bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.27 + 100.64.62.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690566261 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 625404f0-2d6e-11ee-86c4-f93b83b6b0bc + + + diff --git a/graph/incidents_graphml/6/62586b50-ea27-11ee-9c4f-25cb7d94c0ce.graphml b/graph/incidents_graphml/6/62586b50-ea27-11ee-9c4f-25cb7d94c0ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..939d177a98c550c19c4583da0140ef12a840dabd --- /dev/null +++ b/graph/incidents_graphml/6/62586b50-ea27-11ee-9c4f-25cb7d94c0ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.173 + 100.64.52.173 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711316537 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62586b50-ea27-11ee-9c4f-25cb7d94c0ce + + + diff --git a/graph/incidents_graphml/6/625f03b0-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/625f03b0-3b5f-11ee-8185-4b4569232a9b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27622a4b0264accbee98082f5ac66ff8615ef181 --- /dev/null +++ b/graph/incidents_graphml/6/625f03b0-3b5f-11ee-8185-4b4569232a9b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.151 + 100.64.27.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692099135 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 625f03b0-3b5f-11ee-8185-4b4569232a9b + + + diff --git a/graph/incidents_graphml/6/62668420-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/62668420-452b-11ee-8fcc-0fb1848fa316.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4dee60f6b6c71822c5524e169a7521a541ea9b84 --- /dev/null +++ b/graph/incidents_graphml/6/62668420-452b-11ee-8fcc-0fb1848fa316.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.89 + 100.64.27.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176313 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62668420-452b-11ee-8fcc-0fb1848fa316 + + + diff --git a/graph/incidents_graphml/6/6266d250-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/6266d250-075e-11ee-a67b-a9ce333dbcaf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34eae21be4ab10159958fd71a6044ca6fb418bfa --- /dev/null +++ b/graph/incidents_graphml/6/6266d250-075e-11ee-a67b-a9ce333dbcaf.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.38 + 100.64.73.38 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.206 + 100.64.75.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.207 + 100.64.75.207 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.33.67 + 100.64.33.67 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.208 + 100.64.75.208 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.20.233 + 100.64.20.233 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.209 + 100.64.75.209 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381245 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6266d250-075e-11ee-a67b-a9ce333dbcaf + + + diff --git a/graph/incidents_graphml/6/6273d660-07d2-11ef-8107-af8140eb4c5b.graphml b/graph/incidents_graphml/6/6273d660-07d2-11ef-8107-af8140eb4c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca6b65adf8cb8809eccf880a384cb62a650b8584 --- /dev/null +++ b/graph/incidents_graphml/6/6273d660-07d2-11ef-8107-af8140eb4c5b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"] + + + HOST + 100.64.87.13 + 100.64.87.13 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714578564 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6273d660-07d2-11ef-8107-af8140eb4c5b + + + INCIDENT_LINK + 1714578564 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6273d660-07d2-11ef-8107-af8140eb4c5b + + + diff --git a/graph/incidents_graphml/6/6275a460-6b40-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/6/6275a460-6b40-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9cfc244b73fa6c883bdd6a982c363d92de2cfde2 --- /dev/null +++ b/graph/incidents_graphml/6/6275a460-6b40-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.31 + 100.64.25.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697363476 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6275a460-6b40-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/6/6275f2b0-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/6275f2b0-7a0b-11ee-bc21-531635bc60cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e9e8d357bfd0c888b4619ad1e47bf54c5a7d262 --- /dev/null +++ b/graph/incidents_graphml/6/6275f2b0-7a0b-11ee-bc21-531635bc60cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698989981 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6275f2b0-7a0b-11ee-bc21-531635bc60cd + + + diff --git a/graph/incidents_graphml/6/6278ac90-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/6278ac90-452b-11ee-8fcc-0fb1848fa316.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6cc5306166959fba97c8cf3921eeabf8aa127789 --- /dev/null +++ b/graph/incidents_graphml/6/6278ac90-452b-11ee-8fcc-0fb1848fa316.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.89 + 100.64.27.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176313 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6278ac90-452b-11ee-8fcc-0fb1848fa316 + + + diff --git a/graph/incidents_graphml/6/62849880-6b40-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/6/62849880-6b40-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32bd225d5c16fab6d1449ae93f6d21e1e8a4ced3 --- /dev/null +++ b/graph/incidents_graphml/6/62849880-6b40-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.31 + 100.64.25.31 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697363477 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 62849880-6b40-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/6/6284b1e0-2d6e-11ee-86c4-f93b83b6b0bc.graphml b/graph/incidents_graphml/6/6284b1e0-2d6e-11ee-86c4-f93b83b6b0bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2095b7380db29e5ac673a48d77a926471cf9187 --- /dev/null +++ b/graph/incidents_graphml/6/6284b1e0-2d6e-11ee-86c4-f93b83b6b0bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.27 + 100.64.62.27 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690566261 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6284b1e0-2d6e-11ee-86c4-f93b83b6b0bc + + + diff --git a/graph/incidents_graphml/6/62875290-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/62875290-452b-11ee-8fcc-0fb1848fa316.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d22e47bd72f1edb2d7200fe025e2400df673cbc --- /dev/null +++ b/graph/incidents_graphml/6/62875290-452b-11ee-8fcc-0fb1848fa316.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.138 + 100.64.15.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176313 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62875290-452b-11ee-8fcc-0fb1848fa316 + + + diff --git a/graph/incidents_graphml/6/6287cd00-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/6287cd00-7a0b-11ee-bc21-531635bc60cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..464d56a545b5179b12c436e1291e45fe3c04eaf7 --- /dev/null +++ b/graph/incidents_graphml/6/6287cd00-7a0b-11ee-bc21-531635bc60cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.226 + 100.64.17.226 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698989981 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 6287cd00-7a0b-11ee-bc21-531635bc60cd + + + diff --git a/graph/incidents_graphml/6/62938130-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/62938130-3b5f-11ee-8185-4b4569232a9b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf1bedfedbda81c5b67ccf29077cbe69e042f5cb --- /dev/null +++ b/graph/incidents_graphml/6/62938130-3b5f-11ee-8185-4b4569232a9b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.151 + 100.64.27.151 + ["Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692099135 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 62938130-3b5f-11ee-8185-4b4569232a9b + + + diff --git a/graph/incidents_graphml/6/6296e2f0-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/6296e2f0-452b-11ee-8fcc-0fb1848fa316.graphml new file mode 100644 index 0000000000000000000000000000000000000000..850e7cb7549041da3dd7e39fcce52f686ea8ac18 --- /dev/null +++ b/graph/incidents_graphml/6/6296e2f0-452b-11ee-8fcc-0fb1848fa316.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.138 + 100.64.15.138 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176313 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6296e2f0-452b-11ee-8fcc-0fb1848fa316 + + + diff --git a/graph/incidents_graphml/6/62b36010-368f-11ee-b546-fb0db7567997.graphml b/graph/incidents_graphml/6/62b36010-368f-11ee-b546-fb0db7567997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1690c3c3f5128af15ebb8b9b1914d5547641efcb --- /dev/null +++ b/graph/incidents_graphml/6/62b36010-368f-11ee-b546-fb0db7567997.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.6 + 100.64.4.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691569996 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62b36010-368f-11ee-b546-fb0db7567997 + + + diff --git a/graph/incidents_graphml/6/62c80a50-7a0b-11ee-bc21-531635bc60cd.graphml b/graph/incidents_graphml/6/62c80a50-7a0b-11ee-bc21-531635bc60cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ceaeb6f882a42e481d0ad34de00071ad7f17a91 --- /dev/null +++ b/graph/incidents_graphml/6/62c80a50-7a0b-11ee-bc21-531635bc60cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.132 + 100.64.14.132 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698989981 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62c80a50-7a0b-11ee-bc21-531635bc60cd + + + diff --git a/graph/incidents_graphml/6/62d10e70-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/6/62d10e70-fced-11ed-ae6a-5f6768ebee7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5feff183df838807fd39e7d6e029425fcb6b49bc --- /dev/null +++ b/graph/incidents_graphml/6/62d10e70-fced-11ed-ae6a-5f6768ebee7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.163 + 100.64.14.163 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685233201 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 62d10e70-fced-11ed-ae6a-5f6768ebee7b + + + diff --git a/graph/incidents_graphml/6/62d6ab00-20f7-11ed-b732-bb79295f13d0.graphml b/graph/incidents_graphml/6/62d6ab00-20f7-11ed-b732-bb79295f13d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bc7c8d7c7d5c97f94a69cae373eadcbaf4f7987 --- /dev/null +++ b/graph/incidents_graphml/6/62d6ab00-20f7-11ed-b732-bb79295f13d0.graphml @@ -0,0 +1,201 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.49 + 100.64.14.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.100 + USER-0015-1617.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.252 + 100.64.82.252 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.253 + 100.64.82.253 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.69 + 100.64.73.69 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.254 + 100.64.82.254 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661048240 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62d6ab00-20f7-11ed-b732-bb79295f13d0 + + + INCIDENT_LINK + 1661048240 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62d6ab00-20f7-11ed-b732-bb79295f13d0 + + + INCIDENT_LINK + 1661048240 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62d6ab00-20f7-11ed-b732-bb79295f13d0 + + + INCIDENT_LINK + 1661048240 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62d6ab00-20f7-11ed-b732-bb79295f13d0 + + + INCIDENT_LINK + 1661048240 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62d6ab00-20f7-11ed-b732-bb79295f13d0 + + + INCIDENT_LINK + 1661048240 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62d6ab00-20f7-11ed-b732-bb79295f13d0 + + + INCIDENT_LINK + 1661048240 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62d6ab00-20f7-11ed-b732-bb79295f13d0 + + + INCIDENT_LINK + 1661048240 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 62d6ab00-20f7-11ed-b732-bb79295f13d0 + + + diff --git a/graph/incidents_graphml/6/62e011b0-a5a6-11ee-8971-634a5f7f6016.graphml b/graph/incidents_graphml/6/62e011b0-a5a6-11ee-8971-634a5f7f6016.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa6ec732defac13f8b5712f318c65a8411d14928 --- /dev/null +++ b/graph/incidents_graphml/6/62e011b0-a5a6-11ee-8971-634a5f7f6016.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.168 + 100.64.30.168 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703784453 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 62e011b0-a5a6-11ee-8971-634a5f7f6016 + + + diff --git a/graph/incidents_graphml/6/62e0b1a0-368f-11ee-b546-fb0db7567997.graphml b/graph/incidents_graphml/6/62e0b1a0-368f-11ee-b546-fb0db7567997.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbc18a702ff84dbd0b451b205e6fe21edd4ba2fc --- /dev/null +++ b/graph/incidents_graphml/6/62e0b1a0-368f-11ee-b546-fb0db7567997.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.6 + 100.64.4.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691569996 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 62e0b1a0-368f-11ee-b546-fb0db7567997 + + + diff --git a/graph/incidents_graphml/6/62e5df30-4bd6-11ed-a7c5-958e7a84b2a2.graphml b/graph/incidents_graphml/6/62e5df30-4bd6-11ed-a7c5-958e7a84b2a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..089b75d66cdd85f7b7b8e0a5b580967ab880e16d --- /dev/null +++ b/graph/incidents_graphml/6/62e5df30-4bd6-11ed-a7c5-958e7a84b2a2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.184.1 + 192.168.184.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory","Cisco Meraki Firewall"] + + + HOST + 100.64.77.35 + 100.64.77.35 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + INCIDENT_LINK + 1665761967 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 62e5df30-4bd6-11ed-a7c5-958e7a84b2a2 + + + INCIDENT_LINK + 1665761967 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 62e5df30-4bd6-11ed-a7c5-958e7a84b2a2 + + + diff --git a/graph/incidents_graphml/6/62ee0c50-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/6/62ee0c50-fced-11ed-ae6a-5f6768ebee7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d4d050f64c77b53d5c04dacd00096a9bfc9f16a --- /dev/null +++ b/graph/incidents_graphml/6/62ee0c50-fced-11ed-ae6a-5f6768ebee7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.163 + 100.64.14.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685233201 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 62ee0c50-fced-11ed-ae6a-5f6768ebee7b + + + diff --git a/graph/incidents_graphml/6/63030330-ea27-11ee-9c4f-25cb7d94c0ce.graphml b/graph/incidents_graphml/6/63030330-ea27-11ee-9c4f-25cb7d94c0ce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c42fa2df1e4268cf63799bbe250da886fc29c2da --- /dev/null +++ b/graph/incidents_graphml/6/63030330-ea27-11ee-9c4f-25cb7d94c0ce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.175 + 100.64.52.175 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1711316538 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 63030330-ea27-11ee-9c4f-25cb7d94c0ce + + + diff --git a/graph/incidents_graphml/6/631aa2a0-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/6/631aa2a0-22e1-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a48848a6d2069792424357d284c4374a659096a3 --- /dev/null +++ b/graph/incidents_graphml/6/631aa2a0-22e1-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.11 + 100.64.33.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689406192 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 631aa2a0-22e1-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/6/631dc630-452b-11ee-8fcc-0fb1848fa316.graphml b/graph/incidents_graphml/6/631dc630-452b-11ee-8fcc-0fb1848fa316.graphml new file mode 100644 index 0000000000000000000000000000000000000000..157a4332c799eef17a6421b84f8026a340c469f1 --- /dev/null +++ b/graph/incidents_graphml/6/631dc630-452b-11ee-8fcc-0fb1848fa316.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.157 + 100.64.14.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693176314 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 631dc630-452b-11ee-8fcc-0fb1848fa316 + + + diff --git a/graph/incidents_graphml/6/6322fb60-6b40-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/6/6322fb60-6b40-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6fcfaa05cb35c06f61990705519ba762b3f9e16 --- /dev/null +++ b/graph/incidents_graphml/6/6322fb60-6b40-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.114 + 100.64.8.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697363478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 6322fb60-6b40-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/6/633ab4d0-a5a6-11ee-8971-634a5f7f6016.graphml b/graph/incidents_graphml/6/633ab4d0-a5a6-11ee-8971-634a5f7f6016.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4134e190765b74603df4c130e46d93334b9a392d --- /dev/null +++ b/graph/incidents_graphml/6/633ab4d0-a5a6-11ee-8971-634a5f7f6016.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.6 + 100.64.47.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703784454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 633ab4d0-a5a6-11ee-8971-634a5f7f6016 + + + INCIDENT_LINK + 1703784454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 633ab4d0-a5a6-11ee-8971-634a5f7f6016 + + + diff --git a/graph/incidents_graphml/6/63413d70-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/6/63413d70-22e1-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9b511063fe31069ef5ce0ad1d4c574824ee94ba --- /dev/null +++ b/graph/incidents_graphml/6/63413d70-22e1-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.11 + 100.64.33.11 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689406192 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 63413d70-22e1-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/6/63437690-20f7-11ed-b732-bb79295f13d0.graphml b/graph/incidents_graphml/6/63437690-20f7-11ed-b732-bb79295f13d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0dfcee5f23c4b0990b2d521d34140609d4b93ad5 --- /dev/null +++ b/graph/incidents_graphml/6/63437690-20f7-11ed-b732-bb79295f13d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.255 + 100.64.82.255 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.238 + 100.64.71.238 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661048241 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 63437690-20f7-11ed-b732-bb79295f13d0 + + + diff --git a/graph/incidents_graphml/6/63437bb0-6b40-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/6/63437bb0-6b40-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58fb1d0ef8112e071f9f180ff83ec5311546031e --- /dev/null +++ b/graph/incidents_graphml/6/63437bb0-6b40-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.88 + 100.64.15.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697363478 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 63437bb0-6b40-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/6/63449820-043d-11ee-8693-9b63b760243c.graphml b/graph/incidents_graphml/6/63449820-043d-11ee-8693-9b63b760243c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5528a139bda6f2294802c9a049bb7e1188392dd9 --- /dev/null +++ b/graph/incidents_graphml/6/63449820-043d-11ee-8693-9b63b760243c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.140 + 100.64.26.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Stealthwatch"] + + + HOST + 100.64.71.2 + 100.64.71.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1686037220 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63449820-043d-11ee-8693-9b63b760243c + + + INCIDENT_LINK + 1686037220 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63449820-043d-11ee-8693-9b63b760243c + + + diff --git a/graph/incidents_graphml/6/63478610-a5a6-11ee-8971-634a5f7f6016.graphml b/graph/incidents_graphml/6/63478610-a5a6-11ee-8971-634a5f7f6016.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a53f6906207949464bd67b0ed426777ca82fefc8 --- /dev/null +++ b/graph/incidents_graphml/6/63478610-a5a6-11ee-8971-634a5f7f6016.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.6 + 100.64.47.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703784454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 63478610-a5a6-11ee-8971-634a5f7f6016 + + + diff --git a/graph/incidents_graphml/6/63491be0-20f7-11ed-b732-bb79295f13d0.graphml b/graph/incidents_graphml/6/63491be0-20f7-11ed-b732-bb79295f13d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fade2bd6c01f2a1929cca045466cd3d9eb68af15 --- /dev/null +++ b/graph/incidents_graphml/6/63491be0-20f7-11ed-b732-bb79295f13d0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.238 + 100.64.71.238 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.255 + 100.64.82.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661048241 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 63491be0-20f7-11ed-b732-bb79295f13d0 + + + diff --git a/graph/incidents_graphml/6/63522550-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/6/63522550-0228-11ef-b1dd-bbcb3e283d29.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eba058a434f416973f7456e81d5f4ddb03548bb8 --- /dev/null +++ b/graph/incidents_graphml/6/63522550-0228-11ef-b1dd-bbcb3e283d29.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.180 + 100.64.24.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713955796 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63522550-0228-11ef-b1dd-bbcb3e283d29 + + + diff --git a/graph/incidents_graphml/6/635345e0-a5a6-11ee-8971-634a5f7f6016.graphml b/graph/incidents_graphml/6/635345e0-a5a6-11ee-8971-634a5f7f6016.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f48d5ecc7503c1735b42516d06489ff13207665 --- /dev/null +++ b/graph/incidents_graphml/6/635345e0-a5a6-11ee-8971-634a5f7f6016.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.160 + 100.64.61.160 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703784454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 635345e0-a5a6-11ee-8971-634a5f7f6016 + + + diff --git a/graph/incidents_graphml/6/63567650-589b-11ee-9d9b-1fd1aea7c056.graphml b/graph/incidents_graphml/6/63567650-589b-11ee-9d9b-1fd1aea7c056.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be44b0f6152a83ba0cc6ea209e0ca60691dabf46 --- /dev/null +++ b/graph/incidents_graphml/6/63567650-589b-11ee-9d9b-1fd1aea7c056.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.44 + 100.64.20.44 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695313490 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 63567650-589b-11ee-9d9b-1fd1aea7c056 + + + diff --git a/graph/incidents_graphml/6/6358bc60-043d-11ee-8693-9b63b760243c.graphml b/graph/incidents_graphml/6/6358bc60-043d-11ee-8693-9b63b760243c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50f171a7a20798096aad6c1dcf0a0bfa529ced04 --- /dev/null +++ b/graph/incidents_graphml/6/6358bc60-043d-11ee-8693-9b63b760243c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.192 + 100.64.77.192 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.78.157 + 100.64.78.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1686037220 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6358bc60-043d-11ee-8693-9b63b760243c + + + INCIDENT_LINK + 1686037220 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6358bc60-043d-11ee-8693-9b63b760243c + + + diff --git a/graph/incidents_graphml/6/636ab660-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/6/636ab660-0228-11ef-b1dd-bbcb3e283d29.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8641390b07220a50fd7dff66966f5774fb17d903 --- /dev/null +++ b/graph/incidents_graphml/6/636ab660-0228-11ef-b1dd-bbcb3e283d29.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.180 + 100.64.24.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713955796 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 636ab660-0228-11ef-b1dd-bbcb3e283d29 + + + diff --git a/graph/incidents_graphml/6/6376ec40-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/6376ec40-69d6-11ee-b4c0-f17986d6e969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69ed0258ad547eaa0c305c7ba03df968bba7a9c2 --- /dev/null +++ b/graph/incidents_graphml/6/6376ec40-69d6-11ee-b4c0-f17986d6e969.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.69 + 100.64.38.69 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697208000 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6376ec40-69d6-11ee-b4c0-f17986d6e969 + + + diff --git a/graph/incidents_graphml/6/6376f6a0-589b-11ee-9d9b-1fd1aea7c056.graphml b/graph/incidents_graphml/6/6376f6a0-589b-11ee-9d9b-1fd1aea7c056.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e0951e3984f7fdec43ba79af17ed38ccab368d4 --- /dev/null +++ b/graph/incidents_graphml/6/6376f6a0-589b-11ee-9d9b-1fd1aea7c056.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.70 + USER-0015-1460.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695313490 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6376f6a0-589b-11ee-9d9b-1fd1aea7c056 + + + diff --git a/graph/incidents_graphml/6/638199c0-0228-11ef-b1dd-bbcb3e283d29.graphml b/graph/incidents_graphml/6/638199c0-0228-11ef-b1dd-bbcb3e283d29.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc0778b04df233d2f03fd6fa3d1e6aff050348e6 --- /dev/null +++ b/graph/incidents_graphml/6/638199c0-0228-11ef-b1dd-bbcb3e283d29.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.182 + 100.64.24.182 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713955796 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 638199c0-0228-11ef-b1dd-bbcb3e283d29 + + + diff --git a/graph/incidents_graphml/6/638eaaa0-08e2-11ef-ae93-51753793321f.graphml b/graph/incidents_graphml/6/638eaaa0-08e2-11ef-ae93-51753793321f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb972331b2dbcd226c1e37a719a13cb7f48f8dcc --- /dev/null +++ b/graph/incidents_graphml/6/638eaaa0-08e2-11ef-ae93-51753793321f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.46.208 + 172.16.46.208 + ["Exploiting Host"] + 0.578125 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.128 + 100.64.95.128 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1714695389 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 638eaaa0-08e2-11ef-ae93-51753793321f + + + diff --git a/graph/incidents_graphml/6/6391ae70-a5a6-11ee-8971-634a5f7f6016.graphml b/graph/incidents_graphml/6/6391ae70-a5a6-11ee-8971-634a5f7f6016.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c142d044f2dbfab884e9d86625f48db97c37839 --- /dev/null +++ b/graph/incidents_graphml/6/6391ae70-a5a6-11ee-8971-634a5f7f6016.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.40 + 100.64.43.40 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703784454 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 6391ae70-a5a6-11ee-8971-634a5f7f6016 + + + diff --git a/graph/incidents_graphml/6/63c12010-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/63c12010-83be-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..557a20c1cde03c1c592ea0e4da6a869cf0a38d94 --- /dev/null +++ b/graph/incidents_graphml/6/63c12010-83be-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.193 + 100.64.12.193 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056423 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 63c12010-83be-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/6/63c2c470-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/63c2c470-ff3d-11ed-97b1-dfa052c79ac3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11dda455e6d0826a2b2d81140d6e94c7ab34d3c0 --- /dev/null +++ b/graph/incidents_graphml/6/63c2c470-ff3d-11ed-97b1-dfa052c79ac3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.118 + 100.64.42.118 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685487465 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63c2c470-ff3d-11ed-97b1-dfa052c79ac3 + + + diff --git a/graph/incidents_graphml/6/63ca7980-4863-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/6/63ca7980-4863-11ee-a737-6b545b426b37.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6376f5e3611594d468559cfa0e4458185c1a946c --- /dev/null +++ b/graph/incidents_graphml/6/63ca7980-4863-11ee-a737-6b545b426b37.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.165 + 100.64.10.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693530220 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 63ca7980-4863-11ee-a737-6b545b426b37 + + + diff --git a/graph/incidents_graphml/6/63d2ac40-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/63d2ac40-83be-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36c74594aa9874a7640674808494b2356ac446a8 --- /dev/null +++ b/graph/incidents_graphml/6/63d2ac40-83be-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.216 + HOST-4306 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056423 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 63d2ac40-83be-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/6/63e019c0-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/63e019c0-83be-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18c7c3cedb49491af9305357b99aff363a5ab511 --- /dev/null +++ b/graph/incidents_graphml/6/63e019c0-83be-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.216 + HOST-4306 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056423 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 63e019c0-83be-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/6/63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7.graphml b/graph/incidents_graphml/6/63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a17e9bb9946991adfaada411bc9d9a799c5cb60a --- /dev/null +++ b/graph/incidents_graphml/6/63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7.graphml @@ -0,0 +1,531 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.221 + USER-0015-1293.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.221 + 100.64.39.221 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.222 + 100.64.39.222 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.51 + 100.64.29.51 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.62 + 100.64.29.62 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.223 + 100.64.39.223 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.91 + 100.64.30.91 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.17 + 100.64.28.17 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.224 + 100.64.39.224 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.203 + 100.64.7.203 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.225 + 100.64.39.225 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.125 + 100.64.6.125 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63eaf220-0a4f-11ee-8254-9ff4ea1b8ad7 + + + diff --git a/graph/incidents_graphml/6/63f7f9a0-075e-11ee-a67b-a9ce333dbcaf.graphml b/graph/incidents_graphml/6/63f7f9a0-075e-11ee-a67b-a9ce333dbcaf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71dcf14669aa51ff2939698da57249a8de82354e --- /dev/null +++ b/graph/incidents_graphml/6/63f7f9a0-075e-11ee-a67b-a9ce333dbcaf.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.157 + 100.64.14.157 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.128 + 100.64.71.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.55.3 + 100.64.55.3 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686381248 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63f7f9a0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381248 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63f7f9a0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381248 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63f7f9a0-075e-11ee-a67b-a9ce333dbcaf + + + INCIDENT_LINK + 1686381248 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 63f7f9a0-075e-11ee-a67b-a9ce333dbcaf + + + diff --git a/graph/incidents_graphml/6/63f8efa0-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/63f8efa0-ff3d-11ed-97b1-dfa052c79ac3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f548b424cc4ae6562b43c759ea9c76622b39ecf2 --- /dev/null +++ b/graph/incidents_graphml/6/63f8efa0-ff3d-11ed-97b1-dfa052c79ac3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.120 + 100.64.42.120 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685487465 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 63f8efa0-ff3d-11ed-97b1-dfa052c79ac3 + + + diff --git a/graph/incidents_graphml/6/64019f80-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/64019f80-5850-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eee3718d54836b656c8eb56a1173f04c2e767bf2 --- /dev/null +++ b/graph/incidents_graphml/6/64019f80-5850-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.43 + 100.64.19.43 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695281279 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 64019f80-5850-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/6/640ad340-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/640ad340-83be-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..417e35869499a47fb82ee07aa0af0cc0d1d653b8 --- /dev/null +++ b/graph/incidents_graphml/6/640ad340-83be-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.63 + 100.64.50.63 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 640ad340-83be-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/6/640f6c10-c84e-11ed-9476-bf08a649e623.graphml b/graph/incidents_graphml/6/640f6c10-c84e-11ed-9476-bf08a649e623.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fb07dd4dbfa9dc741be0a9a48efb19c32289ac4 --- /dev/null +++ b/graph/incidents_graphml/6/640f6c10-c84e-11ed-9476-bf08a649e623.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.7.183 + 172.18.7.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"] + + + HOST + 100.64.1.138 + 100.64.1.138 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.239 + 100.64.87.239 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1679447453 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 640f6c10-c84e-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447453 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 640f6c10-c84e-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447453 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 640f6c10-c84e-11ed-9476-bf08a649e623 + + + INCIDENT_LINK + 1679447453 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 640f6c10-c84e-11ed-9476-bf08a649e623 + + + diff --git a/graph/incidents_graphml/6/6410adc0-72f6-11ee-8b7a-61395a0def43.graphml b/graph/incidents_graphml/6/6410adc0-72f6-11ee-8b7a-61395a0def43.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc2230ce6900def457b3402ffbd4838685a17487 --- /dev/null +++ b/graph/incidents_graphml/6/6410adc0-72f6-11ee-8b7a-61395a0def43.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.217 + 100.64.12.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698211306 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6410adc0-72f6-11ee-8b7a-61395a0def43 + + + diff --git a/graph/incidents_graphml/6/64152780-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/64152780-5850-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f43d04e08a830a419802500d30443266b156f78 --- /dev/null +++ b/graph/incidents_graphml/6/64152780-5850-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.43 + 100.64.19.43 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695281279 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 64152780-5850-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/6/641ca440-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/641ca440-ff3d-11ed-97b1-dfa052c79ac3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e4eb1bc08673f39639399084ac740fc63192f06 --- /dev/null +++ b/graph/incidents_graphml/6/641ca440-ff3d-11ed-97b1-dfa052c79ac3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.42.120 + 100.64.42.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685487465 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 641ca440-ff3d-11ed-97b1-dfa052c79ac3 + + + diff --git a/graph/incidents_graphml/6/6421c4c0-72f6-11ee-8b7a-61395a0def43.graphml b/graph/incidents_graphml/6/6421c4c0-72f6-11ee-8b7a-61395a0def43.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e67e66b8c08ba3223358ad4b80688bfe61cb823a --- /dev/null +++ b/graph/incidents_graphml/6/6421c4c0-72f6-11ee-8b7a-61395a0def43.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.217 + 100.64.12.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698211306 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6421c4c0-72f6-11ee-8b7a-61395a0def43 + + + diff --git a/graph/incidents_graphml/6/64263e80-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/64263e80-5850-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8f80fc6fbd7b75539c73d5fa4248ae8ef8f7035 --- /dev/null +++ b/graph/incidents_graphml/6/64263e80-5850-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.43 + 100.64.19.43 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695281279 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 64263e80-5850-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/6/642f4b30-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/642f4b30-83be-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67ac93655f6b15ee30b50dd323090973a2b1974b --- /dev/null +++ b/graph/incidents_graphml/6/642f4b30-83be-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.65 + 100.64.50.65 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 642f4b30-83be-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/6/6436e050-5850-11ee-8dda-91d41ca493d8.graphml b/graph/incidents_graphml/6/6436e050-5850-11ee-8dda-91d41ca493d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca8706bc6bea1c9bb25b8774f0c7a2eef0ae0c6f --- /dev/null +++ b/graph/incidents_graphml/6/6436e050-5850-11ee-8dda-91d41ca493d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.126 + 100.64.11.126 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695281279 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6436e050-5850-11ee-8dda-91d41ca493d8 + + + diff --git a/graph/incidents_graphml/6/64381b80-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/64381b80-ff3d-11ed-97b1-dfa052c79ac3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a56fc8dc7f1d88e039f3d38b8e155df1064183e4 --- /dev/null +++ b/graph/incidents_graphml/6/64381b80-ff3d-11ed-97b1-dfa052c79ac3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685487465 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 64381b80-ff3d-11ed-97b1-dfa052c79ac3 + + + diff --git a/graph/incidents_graphml/6/643a9330-3662-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/6/643a9330-3662-11ef-b33d-111abc4c57da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af914f4c723f475004c6291caff71b2550c54623 --- /dev/null +++ b/graph/incidents_graphml/6/643a9330-3662-11ef-b33d-111abc4c57da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.108 + 100.64.8.108 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719698168 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 643a9330-3662-11ef-b33d-111abc4c57da + + + diff --git a/graph/incidents_graphml/6/643d54f0-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/643d54f0-83be-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..381dc32c85ca68c16be242ba011372bed325f005 --- /dev/null +++ b/graph/incidents_graphml/6/643d54f0-83be-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.65 + 100.64.50.65 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056424 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 643d54f0-83be-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/6/643e2bf0-de41-11ed-8036-d144f5e7f2f2.graphml b/graph/incidents_graphml/6/643e2bf0-de41-11ed-8036-d144f5e7f2f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f199241be945cd144a1879f0faf6ef7c7522463 --- /dev/null +++ b/graph/incidents_graphml/6/643e2bf0-de41-11ed-8036-d144f5e7f2f2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.240 + HOST-13123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.14.148 + 100.64.14.148 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1681860795 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 643e2bf0-de41-11ed-8036-d144f5e7f2f2 + + + diff --git a/graph/incidents_graphml/6/6447a970-faeb-11ed-a275-17f0ef22ba49.graphml b/graph/incidents_graphml/6/6447a970-faeb-11ed-a275-17f0ef22ba49.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7221e930260d6175b41a40431790c376596a0f16 --- /dev/null +++ b/graph/incidents_graphml/6/6447a970-faeb-11ed-a275-17f0ef22ba49.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.203 + 100.64.7.203 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + 0.746875 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","Azure Security","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.151 + 100.64.69.151 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.51.248 + 100.64.51.248 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1685012442 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 6447a970-faeb-11ed-a275-17f0ef22ba49 + + + INCIDENT_LINK + 1685012442 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 6447a970-faeb-11ed-a275-17f0ef22ba49 + + + INCIDENT_LINK + 1685012442 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 6447a970-faeb-11ed-a275-17f0ef22ba49 + + + INCIDENT_LINK + 1685012442 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 6447a970-faeb-11ed-a275-17f0ef22ba49 + + + INCIDENT_LINK + 1685012442 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 6447a970-faeb-11ed-a275-17f0ef22ba49 + + + INCIDENT_LINK + 1685012442 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 6447a970-faeb-11ed-a275-17f0ef22ba49 + + + INCIDENT_LINK + 1685012442 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 6447a970-faeb-11ed-a275-17f0ef22ba49 + + + INCIDENT_LINK + 1685012442 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + 6447a970-faeb-11ed-a275-17f0ef22ba49 + + + diff --git a/graph/incidents_graphml/6/6449b100-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/6449b100-83be-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..920fd59eced813302463814aa477ebcd3041ca7b --- /dev/null +++ b/graph/incidents_graphml/6/6449b100-83be-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,239 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.143 + 100.64.26.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6449b100-83be-11ee-b40b-bf8e12a3a664 + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6449b100-83be-11ee-b40b-bf8e12a3a664 + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6449b100-83be-11ee-b40b-bf8e12a3a664 + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6449b100-83be-11ee-b40b-bf8e12a3a664 + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6449b100-83be-11ee-b40b-bf8e12a3a664 + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6449b100-83be-11ee-b40b-bf8e12a3a664 + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6449b100-83be-11ee-b40b-bf8e12a3a664 + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6449b100-83be-11ee-b40b-bf8e12a3a664 + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6449b100-83be-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/6/644f2ca0-3662-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/6/644f2ca0-3662-11ef-b33d-111abc4c57da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c603a9bbbefcb85ff24fd0e33313e90efa33af70 --- /dev/null +++ b/graph/incidents_graphml/6/644f2ca0-3662-11ef-b33d-111abc4c57da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.108 + 100.64.8.108 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719698169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 644f2ca0-3662-11ef-b33d-111abc4c57da + + + diff --git a/graph/incidents_graphml/6/64500e30-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/64500e30-69d6-11ee-b4c0-f17986d6e969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..833a6f1334f4eddd39e9f7f9724063f2a7a12683 --- /dev/null +++ b/graph/incidents_graphml/6/64500e30-69d6-11ee-b4c0-f17986d6e969.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.71 + 100.64.38.71 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697208002 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 64500e30-69d6-11ee-b4c0-f17986d6e969 + + + diff --git a/graph/incidents_graphml/6/645342b0-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/6/645342b0-624f-11ed-93f8-4552f33ca5e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b578310b81abc93e01ff4c546c1c7557c54d95e0 --- /dev/null +++ b/graph/incidents_graphml/6/645342b0-624f-11ed-93f8-4552f33ca5e0.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.130 + 100.64.83.130 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 10.146.99.50 + 10.146.99.50 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.131 + 100.64.83.131 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.132 + 100.64.83.132 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.80.196 + 100.64.80.196 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.83 + 100.64.83.83 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.133 + 100.64.83.133 + ["Exploiting Target"] + 0.8875 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.55.189 + 100.64.55.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.18.227 + 100.64.18.227 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.134 + 100.64.83.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.135 + 100.64.83.135 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.9.46 + 100.64.9.46 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.69.2 + 100.64.69.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.12.246 + 100.64.12.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.71.226 + 100.64.71.226 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.136 + 100.64.83.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.39.27 + 100.64.39.27 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.39.13 + 100.64.39.13 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.137 + 100.64.83.137 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.115 + 100.64.83.115 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.138 + 100.64.83.138 + ["Exploiting Host"] + 0.4375 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + INCIDENT_LINK + 1668232864 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645342b0-624f-11ed-93f8-4552f33ca5e0 + + + diff --git a/graph/incidents_graphml/6/645407f0-ff3d-11ed-97b1-dfa052c79ac3.graphml b/graph/incidents_graphml/6/645407f0-ff3d-11ed-97b1-dfa052c79ac3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14eaf405d95b800184be230ea07ed8f83c178331 --- /dev/null +++ b/graph/incidents_graphml/6/645407f0-ff3d-11ed-97b1-dfa052c79ac3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685487466 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 645407f0-ff3d-11ed-97b1-dfa052c79ac3 + + + diff --git a/graph/incidents_graphml/6/6455e600-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/6455e600-83be-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f82d1778c73897ff1f007d1c9b0dcbedb4ebcec --- /dev/null +++ b/graph/incidents_graphml/6/6455e600-83be-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.143 + 100.64.26.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 6455e600-83be-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/6/6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7.graphml b/graph/incidents_graphml/6/6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..875de1c8ae501a73d8e2b395e5034c7210a5c0a2 --- /dev/null +++ b/graph/incidents_graphml/6/6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.231 + 100.64.39.231 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.232 + 100.64.39.232 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686704659 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 6456fa60-0a4f-11ee-8254-9ff4ea1b8ad7 + + + diff --git a/graph/incidents_graphml/6/64577850-3b5f-11ee-8185-4b4569232a9b.graphml b/graph/incidents_graphml/6/64577850-3b5f-11ee-8185-4b4569232a9b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3703c492d9de72d5172855dc6e71b3b24c909a39 --- /dev/null +++ b/graph/incidents_graphml/6/64577850-3b5f-11ee-8185-4b4569232a9b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.153 + 100.64.27.153 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692099138 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 64577850-3b5f-11ee-8185-4b4569232a9b + + + diff --git a/graph/incidents_graphml/6/645d8310-36e7-11ef-997a-f7dc07e23a4a.graphml b/graph/incidents_graphml/6/645d8310-36e7-11ef-997a-f7dc07e23a4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea0c2a657d19d22519fbc7663a0bc4be5476ad3f --- /dev/null +++ b/graph/incidents_graphml/6/645d8310-36e7-11ef-997a-f7dc07e23a4a.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.177 + 100.64.86.177 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.178 + 100.64.86.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.179 + 100.64.86.179 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.60 + 100.64.41.60 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719755292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645d8310-36e7-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645d8310-36e7-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645d8310-36e7-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645d8310-36e7-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645d8310-36e7-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645d8310-36e7-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645d8310-36e7-11ef-997a-f7dc07e23a4a + + + INCIDENT_LINK + 1719755292 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 645d8310-36e7-11ef-997a-f7dc07e23a4a + + + diff --git a/graph/incidents_graphml/6/645f7780-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/645f7780-69d6-11ee-b4c0-f17986d6e969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1dad737a7a1ba930c99995cad6209b131484d6fd --- /dev/null +++ b/graph/incidents_graphml/6/645f7780-69d6-11ee-b4c0-f17986d6e969.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.71 + 100.64.38.71 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697208002 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 645f7780-69d6-11ee-b4c0-f17986d6e969 + + + diff --git a/graph/incidents_graphml/6/64629030-83be-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/6/64629030-83be-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17a8ab34b7e52d91cd87ecabbfb5116af8333cfb --- /dev/null +++ b/graph/incidents_graphml/6/64629030-83be-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.71 + 100.64.50.71 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056424 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 64629030-83be-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/6/6463c610-3662-11ef-b33d-111abc4c57da.graphml b/graph/incidents_graphml/6/6463c610-3662-11ef-b33d-111abc4c57da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94a3c4c5268a165c0f2e6c5e1137dc8b4b8845cb --- /dev/null +++ b/graph/incidents_graphml/6/6463c610-3662-11ef-b33d-111abc4c57da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.174 + 100.64.8.174 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719698169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6463c610-3662-11ef-b33d-111abc4c57da + + + diff --git a/graph/incidents_graphml/6/646ac950-22e1-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/6/646ac950-22e1-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c10561dba137f24c215306be00b89862e217eaf3 --- /dev/null +++ b/graph/incidents_graphml/6/646ac950-22e1-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.123 + USER-0015-1429.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689406194 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 646ac950-22e1-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/6/646c5720-0a4f-11ee-8254-9ff4ea1b8ad7.graphml b/graph/incidents_graphml/6/646c5720-0a4f-11ee-8254-9ff4ea1b8ad7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5e4574137ca9ae88f9d9791ffa71cd730a4ceee --- /dev/null +++ b/graph/incidents_graphml/6/646c5720-0a4f-11ee-8254-9ff4ea1b8ad7.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.235 + 100.64.39.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.236 + 100.64.39.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.83 + 100.64.11.83 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686704659 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704659 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 646c5720-0a4f-11ee-8254-9ff4ea1b8ad7 + + + diff --git a/graph/incidents_graphml/6/6471ee10-69d6-11ee-b4c0-f17986d6e969.graphml b/graph/incidents_graphml/6/6471ee10-69d6-11ee-b4c0-f17986d6e969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..453e76411037434268db35542ae47956767d0fb7 --- /dev/null +++ b/graph/incidents_graphml/6/6471ee10-69d6-11ee-b4c0-f17986d6e969.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.168 + 100.64.35.168 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697208002 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6471ee10-69d6-11ee-b4c0-f17986d6e969 + + + diff --git a/graph/incidents_graphml/6/647f5ab0-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/6/647f5ab0-fced-11ed-ae6a-5f6768ebee7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8431d5b1d216a71eabe35f0c8d7c48ccc1b17c70 --- /dev/null +++ b/graph/incidents_graphml/6/647f5ab0-fced-11ed-ae6a-5f6768ebee7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.61 + 100.64.34.61 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685233204 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 647f5ab0-fced-11ed-ae6a-5f6768ebee7b + + + diff --git a/graph/incidents_graphml/6/6485ddc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/6/6485ddc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..582f9fcb007393b0f5eaa0b1a192c573efba7d56 --- /dev/null +++ b/graph/incidents_graphml/6/6485ddc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.115 + USER-0015-1970.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673515244 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 6485ddc0-925a-11ed-bd3d-c1cfbb0dc4f8 + + + diff --git a/graph/incidents_graphml/6/6488eb00-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/6/6488eb00-925a-11ed-bd3d-c1cfbb0dc4f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29c4763876dc29c565383b961920c58b7b2ee16f --- /dev/null +++ b/graph/incidents_graphml/6/6488eb00-925a-11ed-bd3d-c1cfbb0dc4f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.115 + USER-0015-1970.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673515244 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 6488eb00-925a-11ed-bd3d-c1cfbb0dc4f8 + + + diff --git a/graph/incidents_graphml/6/648abfc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/6/648abfc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..628ab1740539d1ae473d42d6471faa3eb867ddcd --- /dev/null +++ b/graph/incidents_graphml/6/648abfc0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.50 + 100.64.24.50 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673515244 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 648abfc0-925a-11ed-bd3d-c1cfbb0dc4f8 + + + diff --git a/graph/incidents_graphml/6/648d7ee0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml b/graph/incidents_graphml/6/648d7ee0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55e4069dd14e4dd87d305fc9b14a9f340a66b66c --- /dev/null +++ b/graph/incidents_graphml/6/648d7ee0-925a-11ed-bd3d-c1cfbb0dc4f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.24.50 + 100.64.24.50 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673515245 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 648d7ee0-925a-11ed-bd3d-c1cfbb0dc4f8 + + + diff --git a/graph/incidents_graphml/6/649b3f90-9641-11ed-88e6-1908ce0c8a06.graphml b/graph/incidents_graphml/6/649b3f90-9641-11ed-88e6-1908ce0c8a06.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2f61225f259499e032b3e065f593b1cb7df7298 --- /dev/null +++ b/graph/incidents_graphml/6/649b3f90-9641-11ed-88e6-1908ce0c8a06.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.114 + 100.64.11.114 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673944312 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 649b3f90-9641-11ed-88e6-1908ce0c8a06 + + + diff --git a/graph/incidents_graphml/6/64a52aa0-9641-11ed-88e6-1908ce0c8a06.graphml b/graph/incidents_graphml/6/64a52aa0-9641-11ed-88e6-1908ce0c8a06.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d127470a9436a023c937f9261dd0201c06528417 --- /dev/null +++ b/graph/incidents_graphml/6/64a52aa0-9641-11ed-88e6-1908ce0c8a06.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.114 + 100.64.11.114 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673944312 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 64a52aa0-9641-11ed-88e6-1908ce0c8a06 + + + diff --git a/graph/incidents_graphml/6/64af6890-fa69-11ec-afb6-b9a2c990c2ed.graphml b/graph/incidents_graphml/6/64af6890-fa69-11ec-afb6-b9a2c990c2ed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..14635341561fe457a7d309e7822a86d54e7937f7 --- /dev/null +++ b/graph/incidents_graphml/6/64af6890-fa69-11ec-afb6-b9a2c990c2ed.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.100.52 + 192.168.100.52 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.76.7 + 100.64.76.7 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656809110 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 64af6890-fa69-11ec-afb6-b9a2c990c2ed + + + INCIDENT_LINK + 1656809110 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 64af6890-fa69-11ec-afb6-b9a2c990c2ed + + + diff --git a/graph/incidents_graphml/6/64b32bd0-4863-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/6/64b32bd0-4863-11ee-a737-6b545b426b37.graphml new file mode 100644 index 0000000000000000000000000000000000000000..769cbda0e2cb0399f38265f37704a3c4f3f717ec --- /dev/null +++ b/graph/incidents_graphml/6/64b32bd0-4863-11ee-a737-6b545b426b37.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.202 + 100.64.58.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693530222 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 64b32bd0-4863-11ee-a737-6b545b426b37 + + + diff --git a/graph/incidents_graphml/6/64b5fb10-fced-11ed-ae6a-5f6768ebee7b.graphml b/graph/incidents_graphml/6/64b5fb10-fced-11ed-ae6a-5f6768ebee7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83c33def48d600f8ec5964c10755e0ee26d35859 --- /dev/null +++ b/graph/incidents_graphml/6/64b5fb10-fced-11ed-ae6a-5f6768ebee7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.21 + 100.64.16.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685233204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 64b5fb10-fced-11ed-ae6a-5f6768ebee7b + + + diff --git a/graph/incidents_graphml/6/64bb2860-fa69-11ec-afb6-b9a2c990c2ed.graphml b/graph/incidents_graphml/6/64bb2860-fa69-11ec-afb6-b9a2c990c2ed.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0a2cc2883f88f8b3dcc9d7cf21af8b8378d9c99 --- /dev/null +++ b/graph/incidents_graphml/6/64bb2860-fa69-11ec-afb6-b9a2c990c2ed.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.195 + 100.64.78.195 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1656809111 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 64bb2860-fa69-11ec-afb6-b9a2c990c2ed + + +