f15hb0wn commited on
Commit
c0039ea
·
verified ·
1 Parent(s): d594c07

Upload per-incident GraphML sharded batch 17/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/a/a03da520-2885-11ee-ab6d-398d68629c7b.graphml +63 -0
  2. graph/incidents_graphml/a/a03ddf60-9827-11ee-bcb2-fb3968bcff94.graphml +63 -0
  3. graph/incidents_graphml/a/a04b50e0-120d-11ef-818b-4176151696b3.graphml +63 -0
  4. graph/incidents_graphml/a/a04c3740-9827-11ee-bcb2-fb3968bcff94.graphml +63 -0
  5. graph/incidents_graphml/a/a06637e0-0ebf-11ee-9392-932bfd273540.graphml +77 -0
  6. graph/incidents_graphml/a/a06abf20-84c8-11ee-89b4-37c02fa13bd9.graphml +63 -0
  7. graph/incidents_graphml/a/a06e92f0-7a44-11ee-a612-0577b4410533.graphml +63 -0
  8. graph/incidents_graphml/a/a0737940-0867-11ee-aafb-9397a5ec7d32.graphml +63 -0
  9. graph/incidents_graphml/a/a076d5f0-4191-11ee-b8b0-0f1db008ec38.graphml +63 -0
  10. graph/incidents_graphml/a/a07db700-df82-11ee-8f11-296badf765d8.graphml +63 -0
  11. graph/incidents_graphml/a/a085ca10-4191-11ee-b8b0-0f1db008ec38.graphml +63 -0
  12. graph/incidents_graphml/a/a08be340-0867-11ee-aafb-9397a5ec7d32.graphml +63 -0
  13. graph/incidents_graphml/a/a08d0e50-85f3-11ee-b40b-bf8e12a3a664.graphml +63 -0
  14. graph/incidents_graphml/a/a0907bb0-df82-11ee-8f11-296badf765d8.graphml +63 -0
  15. graph/incidents_graphml/a/a0926ea0-7a44-11ee-a612-0577b4410533.graphml +63 -0
  16. graph/incidents_graphml/a/a092c260-4191-11ee-b8b0-0f1db008ec38.graphml +63 -0
  17. graph/incidents_graphml/a/a0a3fad0-7a44-11ee-a612-0577b4410533.graphml +63 -0
  18. graph/incidents_graphml/a/a0a4c270-0867-11ee-aafb-9397a5ec7d32.graphml +63 -0
  19. graph/incidents_graphml/a/a0a7ffe0-3ea3-11ee-a794-3d0dc768f48a.graphml +63 -0
  20. graph/incidents_graphml/a/a0abefb0-4191-11ee-b8b0-0f1db008ec38.graphml +63 -0
  21. graph/incidents_graphml/a/a0b410e0-0861-11ef-bd54-61e579a3d29b.graphml +337 -0
  22. graph/incidents_graphml/a/a0b5ae10-7a44-11ee-a612-0577b4410533.graphml +63 -0
  23. graph/incidents_graphml/a/a0ba7670-3ea3-11ee-a794-3d0dc768f48a.graphml +63 -0
  24. graph/incidents_graphml/a/a0bf5340-300f-11ee-bf6d-f1637ddc586f.graphml +63 -0
  25. graph/incidents_graphml/a/a0c1c570-01c6-11ee-b478-9b612300fc52.graphml +113 -0
  26. graph/incidents_graphml/a/a0c872c0-7a44-11ee-a612-0577b4410533.graphml +63 -0
  27. graph/incidents_graphml/a/a0c9c8b0-16e3-11ee-8363-57b2dccea5f8.graphml +481 -0
  28. graph/incidents_graphml/a/a0cc50c0-3ea3-11ee-a794-3d0dc768f48a.graphml +63 -0
  29. graph/incidents_graphml/a/a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38.graphml +113 -0
  30. graph/incidents_graphml/a/a0d80320-7a44-11ee-a612-0577b4410533.graphml +63 -0
  31. graph/incidents_graphml/a/a0ddb5e0-3ea3-11ee-a794-3d0dc768f48a.graphml +63 -0
  32. graph/incidents_graphml/a/a0e32ef0-300f-11ee-bf6d-f1637ddc586f.graphml +63 -0
  33. graph/incidents_graphml/a/a0e3cc60-01c6-11ee-b478-9b612300fc52.graphml +221 -0
  34. graph/incidents_graphml/a/a0e5f770-6071-11ed-81d5-3f5b5a73c539.graphml +77 -0
  35. graph/incidents_graphml/a/a0e6a890-182d-11ee-88ad-19cfc5af29bb.graphml +63 -0
  36. graph/incidents_graphml/a/a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38.graphml +77 -0
  37. graph/incidents_graphml/a/a0e94130-7a44-11ee-a612-0577b4410533.graphml +63 -0
  38. graph/incidents_graphml/a/a0f18040-6327-11ee-84e8-6f3a76e74a81.graphml +63 -0
  39. graph/incidents_graphml/a/a0f18c00-3ea3-11ee-a794-3d0dc768f48a.graphml +63 -0
  40. graph/incidents_graphml/a/a0f76860-16e3-11ee-8363-57b2dccea5f8.graphml +63 -0
  41. graph/incidents_graphml/a/a103db80-3ea3-11ee-a794-3d0dc768f48a.graphml +63 -0
  42. graph/incidents_graphml/a/a1042510-df82-11ee-8f11-296badf765d8.graphml +63 -0
  43. graph/incidents_graphml/a/a1070bd0-01c6-11ee-b478-9b612300fc52.graphml +121 -0
  44. graph/incidents_graphml/a/a1105050-9fd7-11ee-a827-c14dee966e17.graphml +63 -0
  45. graph/incidents_graphml/a/a113f810-120d-11ef-818b-4176151696b3.graphml +63 -0
  46. graph/incidents_graphml/a/a1190ca0-df82-11ee-8f11-296badf765d8.graphml +63 -0
  47. graph/incidents_graphml/a/a11f6c60-7a44-11ee-a612-0577b4410533.graphml +63 -0
  48. graph/incidents_graphml/a/a1202ed0-9fd7-11ee-a827-c14dee966e17.graphml +63 -0
  49. graph/incidents_graphml/a/a13104f0-9003-11ee-97ac-71b8150df801.graphml +63 -0
  50. graph/incidents_graphml/a/a131b240-16e3-11ee-8363-57b2dccea5f8.graphml +409 -0
graph/incidents_graphml/a/a03da520-2885-11ee-ab6d-398d68629c7b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.21.61.66</data>
35
+ <data key="n_hostname">172.21.61.66</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c24bd830-2871-11ee-b4f6-c10c41ee2b17">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.48.89</data>
43
+ <data key="n_hostname">100.64.48.89</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2709" target="HOST-8468">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690026488</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a03da520-2885-11ee-ab6d-398d68629c7b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a03ddf60-9827-11ee-bcb2-fb3968bcff94.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ac495690-0628-11ee-8794-6bae0a4a6dd8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.11.99</data>
35
+ <data key="n_hostname">100.64.11.99</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3291" target="HOST-2759">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1702300645</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a03ddf60-9827-11ee-bcb2-fb3968bcff94</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a04b50e0-120d-11ef-818b-4176151696b3.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d5aa46c7-de45-11ee-b630-7d90f7be180f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.10.135</data>
35
+ <data key="n_hostname">100.64.10.135</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.73.92</data>
43
+ <data key="n_hostname">172.26.73.92</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="d5aa46c7-de45-11ee-b630-7d90f7be180f" target="HOST-2724">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1715703520</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a04b50e0-120d-11ef-818b-4176151696b3</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a04c3740-9827-11ee-bcb2-fb3968bcff94.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ac495690-0628-11ee-8794-6bae0a4a6dd8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.11.99</data>
43
+ <data key="n_hostname">100.64.11.99</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-3291">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1702300645</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a04c3740-9827-11ee-bcb2-fb3968bcff94</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a06637e0-0ebf-11ee-9392-932bfd273540.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="36763490-062f-11ee-9ada-07a7b4e16baa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">192.168.128.193</data>
35
+ <data key="n_hostname">192.168.128.193</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="7e300af6-0642-11ee-8a1f-eb69b8331d5d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.197</data>
43
+ <data key="n_hostname">100.64.72.197</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="36763490-062f-11ee-9ada-07a7b4e16baa" target="7e300af6-0642-11ee-8a1f-eb69b8331d5d">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1687192668</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a06637e0-0ebf-11ee-9392-932bfd273540</data>
61
+ </edge>
62
+ <edge id="e2" source="7e300af6-0642-11ee-8a1f-eb69b8331d5d" target="36763490-062f-11ee-9ada-07a7b4e16baa">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1687192668</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7890625</data>
67
+ <data key="e_suspicion_score">0.7890625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">a06637e0-0ebf-11ee-9392-932bfd273540</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/a/a06abf20-84c8-11ee-89b4-37c02fa13bd9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.18.96.192</data>
35
+ <data key="n_hostname">172.18.96.192</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="3190ad32-478d-11ee-b81a-87796155bf28">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.38.147</data>
43
+ <data key="n_hostname">100.64.38.147</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2715" target="HOST-7009">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700170771</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a06abf20-84c8-11ee-89b4-37c02fa13bd9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a06e92f0-7a44-11ee-a612-0577b4410533.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.1.127</data>
35
+ <data key="n_hostname">172.29.1.127</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="83cb8e60-062b-11ee-a7ee-5b5176d9d7ba">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.103</data>
43
+ <data key="n_hostname">100.64.8.103</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2713" target="83cb8e60-062b-11ee-a7ee-5b5176d9d7ba">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699014566</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a06e92f0-7a44-11ee-a612-0577b4410533</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0737940-0867-11ee-aafb-9397a5ec7d32.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.200.243</data>
35
+ <data key="n_hostname">172.30.200.243</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="5245ca40-078e-11ee-b4b8-5592070aec1d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.7.119</data>
43
+ <data key="n_hostname">100.64.7.119</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2706" target="HOST-2752">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686495166</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0737940-0867-11ee-aafb-9397a5ec7d32</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a076d5f0-4191-11ee-b8b0-0f1db008ec38.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d621e734-096f-11ee-b513-7bfba42cab9d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.119</data>
35
+ <data key="n_hostname">100.64.18.119</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.6.172</data>
43
+ <data key="n_hostname">172.31.6.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="d621e734-096f-11ee-b513-7bfba42cab9d" target="HOST-2757">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692780421</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a076d5f0-4191-11ee-b8b0-0f1db008ec38</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a07db700-df82-11ee-8f11-296badf765d8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a0021e60-df82-11ee-baf8-1bd8464bbc7b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.46.222</data>
35
+ <data key="n_hostname">100.64.46.222</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.101.1</data>
43
+ <data key="n_hostname">172.31.101.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="a0021e60-df82-11ee-baf8-1bd8464bbc7b" target="HOST-2821">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710146262</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a07db700-df82-11ee-8f11-296badf765d8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a085ca10-4191-11ee-b8b0-0f1db008ec38.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.6.172</data>
35
+ <data key="n_hostname">172.31.6.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d621e734-096f-11ee-b513-7bfba42cab9d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.119</data>
43
+ <data key="n_hostname">100.64.18.119</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2757" target="HOST-4253">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692780421</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a085ca10-4191-11ee-b8b0-0f1db008ec38</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a08be340-0867-11ee-aafb-9397a5ec7d32.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="97379000-062d-11ee-a253-078b2dba45fa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.8.57</data>
35
+ <data key="n_hostname">USER-0015-1487.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.40.149</data>
43
+ <data key="n_hostname">172.29.40.149</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="97379000-062d-11ee-a253-078b2dba45fa" target="HOST-2834">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686495166</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a08be340-0867-11ee-aafb-9397a5ec7d32</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a08d0e50-85f3-11ee-b40b-bf8e12a3a664.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.214.148</data>
35
+ <data key="n_hostname">172.30.214.148</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="f148c621-53d2-11ee-bf44-a5f86b5e50e2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.55.18</data>
43
+ <data key="n_hostname">100.64.55.18</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2720" target="HOST-9467">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1700299191</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a08d0e50-85f3-11ee-b40b-bf8e12a3a664</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0907bb0-df82-11ee-8f11-296badf765d8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.101.1</data>
35
+ <data key="n_hostname">172.31.101.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a0021e60-df82-11ee-baf8-1bd8464bbc7b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.46.222</data>
43
+ <data key="n_hostname">100.64.46.222</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2821" target="HOST-8259">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710146262</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a0907bb0-df82-11ee-8f11-296badf765d8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0926ea0-7a44-11ee-a612-0577b4410533.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.86.34</data>
35
+ <data key="n_hostname">172.23.86.34</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f171941-7a44-11ee-8b50-8f279ed05f51">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.105</data>
43
+ <data key="n_hostname">100.64.8.105</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2717" target="9f171941-7a44-11ee-8b50-8f279ed05f51">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699014566</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0926ea0-7a44-11ee-a612-0577b4410533</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a092c260-4191-11ee-b8b0-0f1db008ec38.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.168.48</data>
35
+ <data key="n_hostname">172.30.168.48</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="7c9c1603-0f6d-11ee-870f-9526357113c4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.15.161</data>
43
+ <data key="n_hostname">100.64.15.161</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2842" target="HOST-3875">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692780421</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a092c260-4191-11ee-b8b0-0f1db008ec38</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0a3fad0-7a44-11ee-a612-0577b4410533.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.18.96.192</data>
35
+ <data key="n_hostname">172.18.96.192</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f171941-7a44-11ee-8b50-8f279ed05f51">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.105</data>
43
+ <data key="n_hostname">100.64.8.105</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2715" target="HOST-2887">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699014566</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0a3fad0-7a44-11ee-a612-0577b4410533</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0a4c270-0867-11ee-aafb-9397a5ec7d32.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.40.149</data>
35
+ <data key="n_hostname">172.29.40.149</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="97379000-062d-11ee-a253-078b2dba45fa">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.57</data>
43
+ <data key="n_hostname">USER-0015-1487.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2834" target="HOST-11244">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686495166</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a0a4c270-0867-11ee-aafb-9397a5ec7d32</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0a7ffe0-3ea3-11ee-a794-3d0dc768f48a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e8b52d93-0667-11ee-859d-e97bcbaff323">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.9.207</data>
35
+ <data key="n_hostname">100.64.9.207</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.22.127.96</data>
43
+ <data key="n_hostname">172.22.127.96</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="e8b52d93-0667-11ee-859d-e97bcbaff323" target="HOST-2726">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692458299</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0a7ffe0-3ea3-11ee-a794-3d0dc768f48a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0abefb0-4191-11ee-b8b0-0f1db008ec38.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bd7700f2-062a-11ee-a360-0d0424c09388">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.121</data>
35
+ <data key="n_hostname">100.64.18.121</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.38.152</data>
43
+ <data key="n_hostname">172.18.38.152</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="bd7700f2-062a-11ee-a360-0d0424c09388" target="HOST-2844">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692780421</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a0abefb0-4191-11ee-b8b0-0f1db008ec38</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0b410e0-0861-11ef-bd54-61e579a3d29b.graphml ADDED
@@ -0,0 +1,337 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="dd23ab13-ee0a-11ee-89dd-67d937549154">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.14.204</data>
35
+ <data key="n_hostname">100.64.14.204</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.229.11</data>
43
+ <data key="n_hostname">172.30.229.11</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="289be2e2-2a27-11ee-924a-9dcdd960aa27">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.14.205</data>
51
+ <data key="n_hostname">100.64.14.205</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="28e06e04-3a22-11ee-ac20-b1821ab11b44">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.14.206</data>
59
+ <data key="n_hostname">100.64.14.206</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="80d2b300-0626-11ee-b35a-9d13f89576c6">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.14.207</data>
67
+ <data key="n_hostname">100.64.14.207</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="3a0dd3e3-0627-11ee-8578-99ce994a4216">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.14.208</data>
75
+ <data key="n_hostname">100.64.14.208</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">172.31.101.1</data>
83
+ <data key="n_hostname">172.31.101.1</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="248393e5-062a-11ee-b173-c9921719c2f8">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.8.47</data>
91
+ <data key="n_hostname">100.64.8.47</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="dda30ec0-0a01-11ee-9a24-9fcc59a4aec6">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.14.209</data>
99
+ <data key="n_hostname">100.64.14.209</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="00cb51c1-0627-11ee-9a87-6114210b307b">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.13.201</data>
107
+ <data key="n_hostname">100.64.13.201</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.25</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <edge id="e1" source="dd23ab13-ee0a-11ee-89dd-67d937549154" target="HOST-2750">
113
+ <data key="e_type">INCIDENT_LINK</data>
114
+ <data key="e_timestamp">1714640087</data>
115
+ <data key="e_label_binary">malicious</data>
116
+ <data key="e_label_confidence">0.7</data>
117
+ <data key="e_suspicion_score">0.25</data>
118
+ <data key="e_mo_name">Data Theft</data>
119
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
120
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
121
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
122
+ <data key="e_lifecycle_stage">complete-mission</data>
123
+ <data key="e_disposition">Unprocessed</data>
124
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
125
+ </edge>
126
+ <edge id="e2" source="HOST-2750" target="dd23ab13-ee0a-11ee-89dd-67d937549154">
127
+ <data key="e_type">INCIDENT_LINK</data>
128
+ <data key="e_timestamp">1714640087</data>
129
+ <data key="e_label_binary">malicious</data>
130
+ <data key="e_label_confidence">0.7</data>
131
+ <data key="e_suspicion_score">0.25</data>
132
+ <data key="e_mo_name">Data Theft</data>
133
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
134
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
135
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
136
+ <data key="e_lifecycle_stage">complete-mission</data>
137
+ <data key="e_disposition">Unprocessed</data>
138
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
139
+ </edge>
140
+ <edge id="e3" source="289be2e2-2a27-11ee-924a-9dcdd960aa27" target="HOST-2750">
141
+ <data key="e_type">INCIDENT_LINK</data>
142
+ <data key="e_timestamp">1714640087</data>
143
+ <data key="e_label_binary">malicious</data>
144
+ <data key="e_label_confidence">0.7</data>
145
+ <data key="e_suspicion_score">0.25</data>
146
+ <data key="e_mo_name">Data Theft</data>
147
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
148
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
149
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
150
+ <data key="e_lifecycle_stage">complete-mission</data>
151
+ <data key="e_disposition">Unprocessed</data>
152
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
153
+ </edge>
154
+ <edge id="e4" source="HOST-2750" target="289be2e2-2a27-11ee-924a-9dcdd960aa27">
155
+ <data key="e_type">INCIDENT_LINK</data>
156
+ <data key="e_timestamp">1714640087</data>
157
+ <data key="e_label_binary">malicious</data>
158
+ <data key="e_label_confidence">0.7</data>
159
+ <data key="e_suspicion_score">0.25</data>
160
+ <data key="e_mo_name">Data Theft</data>
161
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
162
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
163
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
164
+ <data key="e_lifecycle_stage">complete-mission</data>
165
+ <data key="e_disposition">Unprocessed</data>
166
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
167
+ </edge>
168
+ <edge id="e5" source="28e06e04-3a22-11ee-ac20-b1821ab11b44" target="HOST-2750">
169
+ <data key="e_type">INCIDENT_LINK</data>
170
+ <data key="e_timestamp">1714640087</data>
171
+ <data key="e_label_binary">malicious</data>
172
+ <data key="e_label_confidence">0.7</data>
173
+ <data key="e_suspicion_score">0.25</data>
174
+ <data key="e_mo_name">Data Theft</data>
175
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
176
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
177
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
178
+ <data key="e_lifecycle_stage">complete-mission</data>
179
+ <data key="e_disposition">Unprocessed</data>
180
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
181
+ </edge>
182
+ <edge id="e6" source="HOST-2750" target="28e06e04-3a22-11ee-ac20-b1821ab11b44">
183
+ <data key="e_type">INCIDENT_LINK</data>
184
+ <data key="e_timestamp">1714640087</data>
185
+ <data key="e_label_binary">malicious</data>
186
+ <data key="e_label_confidence">0.7</data>
187
+ <data key="e_suspicion_score">0.25</data>
188
+ <data key="e_mo_name">Data Theft</data>
189
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
190
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
191
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
192
+ <data key="e_lifecycle_stage">complete-mission</data>
193
+ <data key="e_disposition">Unprocessed</data>
194
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
195
+ </edge>
196
+ <edge id="e7" source="80d2b300-0626-11ee-b35a-9d13f89576c6" target="HOST-2750">
197
+ <data key="e_type">INCIDENT_LINK</data>
198
+ <data key="e_timestamp">1714640087</data>
199
+ <data key="e_label_binary">malicious</data>
200
+ <data key="e_label_confidence">0.7</data>
201
+ <data key="e_suspicion_score">0.25</data>
202
+ <data key="e_mo_name">Data Theft</data>
203
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
204
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
205
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
206
+ <data key="e_lifecycle_stage">complete-mission</data>
207
+ <data key="e_disposition">Unprocessed</data>
208
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
209
+ </edge>
210
+ <edge id="e8" source="HOST-2750" target="80d2b300-0626-11ee-b35a-9d13f89576c6">
211
+ <data key="e_type">INCIDENT_LINK</data>
212
+ <data key="e_timestamp">1714640087</data>
213
+ <data key="e_label_binary">malicious</data>
214
+ <data key="e_label_confidence">0.7</data>
215
+ <data key="e_suspicion_score">0.25</data>
216
+ <data key="e_mo_name">Data Theft</data>
217
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
218
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
219
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
220
+ <data key="e_lifecycle_stage">complete-mission</data>
221
+ <data key="e_disposition">Unprocessed</data>
222
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
223
+ </edge>
224
+ <edge id="e9" source="3a0dd3e3-0627-11ee-8578-99ce994a4216" target="HOST-2821">
225
+ <data key="e_type">INCIDENT_LINK</data>
226
+ <data key="e_timestamp">1714640087</data>
227
+ <data key="e_label_binary">malicious</data>
228
+ <data key="e_label_confidence">0.7</data>
229
+ <data key="e_suspicion_score">0.25</data>
230
+ <data key="e_mo_name">Data Theft</data>
231
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
232
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
233
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
234
+ <data key="e_lifecycle_stage">complete-mission</data>
235
+ <data key="e_disposition">Unprocessed</data>
236
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
237
+ </edge>
238
+ <edge id="e10" source="HOST-2821" target="3a0dd3e3-0627-11ee-8578-99ce994a4216">
239
+ <data key="e_type">INCIDENT_LINK</data>
240
+ <data key="e_timestamp">1714640087</data>
241
+ <data key="e_label_binary">malicious</data>
242
+ <data key="e_label_confidence">0.7</data>
243
+ <data key="e_suspicion_score">0.25</data>
244
+ <data key="e_mo_name">Data Theft</data>
245
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
246
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
247
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
248
+ <data key="e_lifecycle_stage">complete-mission</data>
249
+ <data key="e_disposition">Unprocessed</data>
250
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
251
+ </edge>
252
+ <edge id="e11" source="HOST-2856" target="HOST-2821">
253
+ <data key="e_type">INCIDENT_LINK</data>
254
+ <data key="e_timestamp">1714640087</data>
255
+ <data key="e_label_binary">malicious</data>
256
+ <data key="e_label_confidence">0.7</data>
257
+ <data key="e_suspicion_score">0.25</data>
258
+ <data key="e_mo_name">Data Theft</data>
259
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
260
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
261
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
262
+ <data key="e_lifecycle_stage">complete-mission</data>
263
+ <data key="e_disposition">Unprocessed</data>
264
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
265
+ </edge>
266
+ <edge id="e12" source="HOST-2821" target="HOST-2856">
267
+ <data key="e_type">INCIDENT_LINK</data>
268
+ <data key="e_timestamp">1714640087</data>
269
+ <data key="e_label_binary">malicious</data>
270
+ <data key="e_label_confidence">0.7</data>
271
+ <data key="e_suspicion_score">0.25</data>
272
+ <data key="e_mo_name">Data Theft</data>
273
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
274
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
275
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
276
+ <data key="e_lifecycle_stage">complete-mission</data>
277
+ <data key="e_disposition">Unprocessed</data>
278
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
279
+ </edge>
280
+ <edge id="e13" source="dda30ec0-0a01-11ee-9a24-9fcc59a4aec6" target="HOST-2821">
281
+ <data key="e_type">INCIDENT_LINK</data>
282
+ <data key="e_timestamp">1714640087</data>
283
+ <data key="e_label_binary">malicious</data>
284
+ <data key="e_label_confidence">0.7</data>
285
+ <data key="e_suspicion_score">0.25</data>
286
+ <data key="e_mo_name">Data Theft</data>
287
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
288
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
289
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
290
+ <data key="e_lifecycle_stage">complete-mission</data>
291
+ <data key="e_disposition">Unprocessed</data>
292
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
293
+ </edge>
294
+ <edge id="e14" source="HOST-2821" target="dda30ec0-0a01-11ee-9a24-9fcc59a4aec6">
295
+ <data key="e_type">INCIDENT_LINK</data>
296
+ <data key="e_timestamp">1714640087</data>
297
+ <data key="e_label_binary">malicious</data>
298
+ <data key="e_label_confidence">0.7</data>
299
+ <data key="e_suspicion_score">0.25</data>
300
+ <data key="e_mo_name">Data Theft</data>
301
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
302
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
303
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
304
+ <data key="e_lifecycle_stage">complete-mission</data>
305
+ <data key="e_disposition">Unprocessed</data>
306
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
307
+ </edge>
308
+ <edge id="e15" source="HOST-3606" target="HOST-2821">
309
+ <data key="e_type">INCIDENT_LINK</data>
310
+ <data key="e_timestamp">1714640087</data>
311
+ <data key="e_label_binary">malicious</data>
312
+ <data key="e_label_confidence">0.7</data>
313
+ <data key="e_suspicion_score">0.25</data>
314
+ <data key="e_mo_name">Data Theft</data>
315
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
316
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
317
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
318
+ <data key="e_lifecycle_stage">complete-mission</data>
319
+ <data key="e_disposition">Unprocessed</data>
320
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
321
+ </edge>
322
+ <edge id="e16" source="HOST-2821" target="HOST-3606">
323
+ <data key="e_type">INCIDENT_LINK</data>
324
+ <data key="e_timestamp">1714640087</data>
325
+ <data key="e_label_binary">malicious</data>
326
+ <data key="e_label_confidence">0.7</data>
327
+ <data key="e_suspicion_score">0.25</data>
328
+ <data key="e_mo_name">Data Theft</data>
329
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
330
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
331
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
332
+ <data key="e_lifecycle_stage">complete-mission</data>
333
+ <data key="e_disposition">Unprocessed</data>
334
+ <data key="e_incident_id">a0b410e0-0861-11ef-bd54-61e579a3d29b</data>
335
+ </edge>
336
+ </graph>
337
+ </graphml>
graph/incidents_graphml/a/a0b5ae10-7a44-11ee-a612-0577b4410533.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.201.119</data>
35
+ <data key="n_hostname">172.30.201.119</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f171941-7a44-11ee-8b50-8f279ed05f51">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.105</data>
43
+ <data key="n_hostname">100.64.8.105</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2760" target="HOST-2887">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699014566</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0b5ae10-7a44-11ee-a612-0577b4410533</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0ba7670-3ea3-11ee-a794-3d0dc768f48a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.22.127.96</data>
35
+ <data key="n_hostname">172.22.127.96</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="e8b52d93-0667-11ee-859d-e97bcbaff323">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.9.207</data>
43
+ <data key="n_hostname">100.64.9.207</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2726" target="HOST-3078">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692458299</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a0ba7670-3ea3-11ee-a794-3d0dc768f48a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0bf5340-300f-11ee-bf6d-f1637ddc586f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3b0d0024-0642-11ee-93f4-159fa6734fa9">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.73.116</data>
35
+ <data key="n_hostname">100.64.73.116</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="3b0d0024-0642-11ee-93f4-159fa6734fa9" target="HOST-13083">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690855417</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0bf5340-300f-11ee-bf6d-f1637ddc586f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0c1c570-01c6-11ee-b478-9b612300fc52.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="92a5d8d0-9db4-11ed-8d53-2b8af123e178">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.24.17</data>
35
+ <data key="n_hostname">100.64.24.17</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="d9c69361-9d8e-11ed-9ba1-69c845a45d44">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.76.201</data>
43
+ <data key="n_hostname">100.64.76.201</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]</data>
47
+ </node>
48
+ <node id="6b52fe43-9dc6-11ed-a3e7-33b11ed609ee">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.8.49</data>
51
+ <data key="n_hostname">100.64.8.49</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]</data>
55
+ </node>
56
+ <edge id="e1" source="92a5d8d0-9db4-11ed-8d53-2b8af123e178" target="d9c69361-9d8e-11ed-9ba1-69c845a45d44">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1685766310</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">a0c1c570-01c6-11ee-b478-9b612300fc52</data>
69
+ </edge>
70
+ <edge id="e2" source="d9c69361-9d8e-11ed-9ba1-69c845a45d44" target="92a5d8d0-9db4-11ed-8d53-2b8af123e178">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1685766310</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">a0c1c570-01c6-11ee-b478-9b612300fc52</data>
83
+ </edge>
84
+ <edge id="e3" source="HOST-15276" target="d9c69361-9d8e-11ed-9ba1-69c845a45d44">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1685766310</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">a0c1c570-01c6-11ee-b478-9b612300fc52</data>
97
+ </edge>
98
+ <edge id="e4" source="d9c69361-9d8e-11ed-9ba1-69c845a45d44" target="HOST-15276">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1685766310</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">a0c1c570-01c6-11ee-b478-9b612300fc52</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/a/a0c872c0-7a44-11ee-a612-0577b4410533.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2d2acb82-0625-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.78.41</data>
35
+ <data key="n_hostname">172.31.78.41</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f171941-7a44-11ee-8b50-8f279ed05f51">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.105</data>
43
+ <data key="n_hostname">100.64.8.105</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2807" target="HOST-2887">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699014566</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0c872c0-7a44-11ee-a612-0577b4410533</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0c9c8b0-16e3-11ee-8363-57b2dccea5f8.graphml ADDED
@@ -0,0 +1,481 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="25c36c74-0662-11ee-b877-479ae0d4a548">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.34.9</data>
35
+ <data key="n_hostname">100.64.34.9</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fdda4c3-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.117.12.163</data>
43
+ <data key="n_hostname">10.117.12.163</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.9208984375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="9c76f3d0-0691-11ee-891a-2f57c3f874db">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.34.10</data>
51
+ <data key="n_hostname">100.64.34.10</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.30.208.219</data>
59
+ <data key="n_hostname">172.30.208.219</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="a43c5cc1-0625-11ee-9882-3f47c834d49b">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.15.179</data>
67
+ <data key="n_hostname">100.64.15.179</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="e4038f80-0c11-11ee-8078-31d64f5181c3">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.34.11</data>
75
+ <data key="n_hostname">100.64.34.11</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.578125</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="354f2210-14c7-11ee-9568-7ba131cc284a">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.34.12</data>
83
+ <data key="n_hostname">100.64.34.12</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.578125</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="f4429642-16aa-11ee-8956-bfb85ff21489">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.34.13</data>
91
+ <data key="n_hostname">100.64.34.13</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.4375</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="8f452a71-0627-11ee-9792-13ac4ddb104c">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.8.180</data>
99
+ <data key="n_hostname">100.64.8.180</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="609c5261-0628-11ee-87d2-5909d78e9e20">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.9.103</data>
107
+ <data key="n_hostname">100.64.9.103</data>
108
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.578125</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="d7b8e151-0642-11ee-a8d0-459315f54b98">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.10.230</data>
115
+ <data key="n_hostname">100.64.10.230</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.71875</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="147f4db1-08ee-11ee-b878-9301f8287a51">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.27.73</data>
123
+ <data key="n_hostname">100.64.27.73</data>
124
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.7890625</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <node id="773487f0-16e4-11ee-85fa-f77cc9708c6b">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.34.14</data>
131
+ <data key="n_hostname">100.64.34.14</data>
132
+ <data key="n_set_roles">["Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.578125</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="d55431a1-0627-11ee-a510-47d18ec77e75">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.34.15</data>
139
+ <data key="n_hostname">100.64.34.15</data>
140
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
141
+ <data key="n_suspicion_score">0.71875</data>
142
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
143
+ </node>
144
+ <edge id="e1" source="25c36c74-0662-11ee-b877-479ae0d4a548" target="HOST-2773">
145
+ <data key="e_type">INCIDENT_LINK</data>
146
+ <data key="e_timestamp">1688087740</data>
147
+ <data key="e_label_binary">malicious</data>
148
+ <data key="e_label_confidence">0.9208984375</data>
149
+ <data key="e_suspicion_score">0.9208984375</data>
150
+ <data key="e_mo_name">Data Theft</data>
151
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
152
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
153
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
154
+ <data key="e_lifecycle_stage">complete-mission</data>
155
+ <data key="e_disposition">Disrupted</data>
156
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
157
+ </edge>
158
+ <edge id="e2" source="9c76f3d0-0691-11ee-891a-2f57c3f874db" target="HOST-2823">
159
+ <data key="e_type">INCIDENT_LINK</data>
160
+ <data key="e_timestamp">1688087740</data>
161
+ <data key="e_label_binary">malicious</data>
162
+ <data key="e_label_confidence">0.9208984375</data>
163
+ <data key="e_suspicion_score">0.9208984375</data>
164
+ <data key="e_mo_name">Data Theft</data>
165
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
166
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
167
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
168
+ <data key="e_lifecycle_stage">complete-mission</data>
169
+ <data key="e_disposition">Disrupted</data>
170
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
171
+ </edge>
172
+ <edge id="e3" source="HOST-3884" target="HOST-2773">
173
+ <data key="e_type">INCIDENT_LINK</data>
174
+ <data key="e_timestamp">1688087740</data>
175
+ <data key="e_label_binary">malicious</data>
176
+ <data key="e_label_confidence">0.9208984375</data>
177
+ <data key="e_suspicion_score">0.9208984375</data>
178
+ <data key="e_mo_name">Data Theft</data>
179
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
180
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
181
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
182
+ <data key="e_lifecycle_stage">complete-mission</data>
183
+ <data key="e_disposition">Disrupted</data>
184
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
185
+ </edge>
186
+ <edge id="e4" source="HOST-2773" target="HOST-3884">
187
+ <data key="e_type">INCIDENT_LINK</data>
188
+ <data key="e_timestamp">1688087740</data>
189
+ <data key="e_label_binary">malicious</data>
190
+ <data key="e_label_confidence">0.9208984375</data>
191
+ <data key="e_suspicion_score">0.9208984375</data>
192
+ <data key="e_mo_name">Data Theft</data>
193
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
194
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
195
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
196
+ <data key="e_lifecycle_stage">complete-mission</data>
197
+ <data key="e_disposition">Disrupted</data>
198
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
199
+ </edge>
200
+ <edge id="e5" source="e4038f80-0c11-11ee-8078-31d64f5181c3" target="HOST-2773">
201
+ <data key="e_type">INCIDENT_LINK</data>
202
+ <data key="e_timestamp">1688087740</data>
203
+ <data key="e_label_binary">malicious</data>
204
+ <data key="e_label_confidence">0.9208984375</data>
205
+ <data key="e_suspicion_score">0.9208984375</data>
206
+ <data key="e_mo_name">Data Theft</data>
207
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
208
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
209
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
210
+ <data key="e_lifecycle_stage">complete-mission</data>
211
+ <data key="e_disposition">Disrupted</data>
212
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
213
+ </edge>
214
+ <edge id="e6" source="HOST-2773" target="e4038f80-0c11-11ee-8078-31d64f5181c3">
215
+ <data key="e_type">INCIDENT_LINK</data>
216
+ <data key="e_timestamp">1688087740</data>
217
+ <data key="e_label_binary">malicious</data>
218
+ <data key="e_label_confidence">0.9208984375</data>
219
+ <data key="e_suspicion_score">0.9208984375</data>
220
+ <data key="e_mo_name">Data Theft</data>
221
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
222
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
223
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
224
+ <data key="e_lifecycle_stage">complete-mission</data>
225
+ <data key="e_disposition">Disrupted</data>
226
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
227
+ </edge>
228
+ <edge id="e7" source="HOST-2773" target="25c36c74-0662-11ee-b877-479ae0d4a548">
229
+ <data key="e_type">INCIDENT_LINK</data>
230
+ <data key="e_timestamp">1688087740</data>
231
+ <data key="e_label_binary">malicious</data>
232
+ <data key="e_label_confidence">0.9208984375</data>
233
+ <data key="e_suspicion_score">0.9208984375</data>
234
+ <data key="e_mo_name">Data Theft</data>
235
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
236
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
237
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
238
+ <data key="e_lifecycle_stage">complete-mission</data>
239
+ <data key="e_disposition">Disrupted</data>
240
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
241
+ </edge>
242
+ <edge id="e8" source="354f2210-14c7-11ee-9568-7ba131cc284a" target="HOST-2773">
243
+ <data key="e_type">INCIDENT_LINK</data>
244
+ <data key="e_timestamp">1688087740</data>
245
+ <data key="e_label_binary">malicious</data>
246
+ <data key="e_label_confidence">0.9208984375</data>
247
+ <data key="e_suspicion_score">0.9208984375</data>
248
+ <data key="e_mo_name">Data Theft</data>
249
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
250
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
251
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
252
+ <data key="e_lifecycle_stage">complete-mission</data>
253
+ <data key="e_disposition">Disrupted</data>
254
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
255
+ </edge>
256
+ <edge id="e9" source="HOST-2773" target="354f2210-14c7-11ee-9568-7ba131cc284a">
257
+ <data key="e_type">INCIDENT_LINK</data>
258
+ <data key="e_timestamp">1688087740</data>
259
+ <data key="e_label_binary">malicious</data>
260
+ <data key="e_label_confidence">0.9208984375</data>
261
+ <data key="e_suspicion_score">0.9208984375</data>
262
+ <data key="e_mo_name">Data Theft</data>
263
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
264
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
265
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
266
+ <data key="e_lifecycle_stage">complete-mission</data>
267
+ <data key="e_disposition">Disrupted</data>
268
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
269
+ </edge>
270
+ <edge id="e10" source="9c76f3d0-0691-11ee-891a-2f57c3f874db" target="HOST-2773">
271
+ <data key="e_type">INCIDENT_LINK</data>
272
+ <data key="e_timestamp">1688087740</data>
273
+ <data key="e_label_binary">malicious</data>
274
+ <data key="e_label_confidence">0.9208984375</data>
275
+ <data key="e_suspicion_score">0.9208984375</data>
276
+ <data key="e_mo_name">Data Theft</data>
277
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
278
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
279
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
280
+ <data key="e_lifecycle_stage">complete-mission</data>
281
+ <data key="e_disposition">Disrupted</data>
282
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
283
+ </edge>
284
+ <edge id="e11" source="HOST-2773" target="9c76f3d0-0691-11ee-891a-2f57c3f874db">
285
+ <data key="e_type">INCIDENT_LINK</data>
286
+ <data key="e_timestamp">1688087740</data>
287
+ <data key="e_label_binary">malicious</data>
288
+ <data key="e_label_confidence">0.9208984375</data>
289
+ <data key="e_suspicion_score">0.9208984375</data>
290
+ <data key="e_mo_name">Data Theft</data>
291
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
292
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
293
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
294
+ <data key="e_lifecycle_stage">complete-mission</data>
295
+ <data key="e_disposition">Disrupted</data>
296
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
297
+ </edge>
298
+ <edge id="e12" source="HOST-2773" target="f4429642-16aa-11ee-8956-bfb85ff21489">
299
+ <data key="e_type">INCIDENT_LINK</data>
300
+ <data key="e_timestamp">1688087740</data>
301
+ <data key="e_label_binary">malicious</data>
302
+ <data key="e_label_confidence">0.9208984375</data>
303
+ <data key="e_suspicion_score">0.9208984375</data>
304
+ <data key="e_mo_name">Data Theft</data>
305
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
306
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
307
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
308
+ <data key="e_lifecycle_stage">complete-mission</data>
309
+ <data key="e_disposition">Disrupted</data>
310
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
311
+ </edge>
312
+ <edge id="e13" source="HOST-2773" target="HOST-2930">
313
+ <data key="e_type">INCIDENT_LINK</data>
314
+ <data key="e_timestamp">1688087740</data>
315
+ <data key="e_label_binary">malicious</data>
316
+ <data key="e_label_confidence">0.9208984375</data>
317
+ <data key="e_suspicion_score">0.9208984375</data>
318
+ <data key="e_mo_name">Data Theft</data>
319
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
320
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
321
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
322
+ <data key="e_lifecycle_stage">complete-mission</data>
323
+ <data key="e_disposition">Disrupted</data>
324
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
325
+ </edge>
326
+ <edge id="e14" source="HOST-2930" target="HOST-2773">
327
+ <data key="e_type">INCIDENT_LINK</data>
328
+ <data key="e_timestamp">1688087740</data>
329
+ <data key="e_label_binary">malicious</data>
330
+ <data key="e_label_confidence">0.9208984375</data>
331
+ <data key="e_suspicion_score">0.9208984375</data>
332
+ <data key="e_mo_name">Data Theft</data>
333
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
334
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
335
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
336
+ <data key="e_lifecycle_stage">complete-mission</data>
337
+ <data key="e_disposition">Disrupted</data>
338
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
339
+ </edge>
340
+ <edge id="e15" source="HOST-2773" target="HOST-3158">
341
+ <data key="e_type">INCIDENT_LINK</data>
342
+ <data key="e_timestamp">1688087740</data>
343
+ <data key="e_label_binary">malicious</data>
344
+ <data key="e_label_confidence">0.9208984375</data>
345
+ <data key="e_suspicion_score">0.9208984375</data>
346
+ <data key="e_mo_name">Data Theft</data>
347
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
348
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
349
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
350
+ <data key="e_lifecycle_stage">complete-mission</data>
351
+ <data key="e_disposition">Disrupted</data>
352
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
353
+ </edge>
354
+ <edge id="e16" source="HOST-3158" target="HOST-2773">
355
+ <data key="e_type">INCIDENT_LINK</data>
356
+ <data key="e_timestamp">1688087740</data>
357
+ <data key="e_label_binary">malicious</data>
358
+ <data key="e_label_confidence">0.9208984375</data>
359
+ <data key="e_suspicion_score">0.9208984375</data>
360
+ <data key="e_mo_name">Data Theft</data>
361
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
362
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
363
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
364
+ <data key="e_lifecycle_stage">complete-mission</data>
365
+ <data key="e_disposition">Disrupted</data>
366
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
367
+ </edge>
368
+ <edge id="e17" source="HOST-3230" target="HOST-2773">
369
+ <data key="e_type">INCIDENT_LINK</data>
370
+ <data key="e_timestamp">1688087740</data>
371
+ <data key="e_label_binary">malicious</data>
372
+ <data key="e_label_confidence">0.9208984375</data>
373
+ <data key="e_suspicion_score">0.9208984375</data>
374
+ <data key="e_mo_name">Data Theft</data>
375
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
376
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
377
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
378
+ <data key="e_lifecycle_stage">complete-mission</data>
379
+ <data key="e_disposition">Disrupted</data>
380
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
381
+ </edge>
382
+ <edge id="e18" source="HOST-2773" target="HOST-3230">
383
+ <data key="e_type">INCIDENT_LINK</data>
384
+ <data key="e_timestamp">1688087740</data>
385
+ <data key="e_label_binary">malicious</data>
386
+ <data key="e_label_confidence">0.9208984375</data>
387
+ <data key="e_suspicion_score">0.9208984375</data>
388
+ <data key="e_mo_name">Data Theft</data>
389
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
390
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
391
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
392
+ <data key="e_lifecycle_stage">complete-mission</data>
393
+ <data key="e_disposition">Disrupted</data>
394
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
395
+ </edge>
396
+ <edge id="e19" source="HOST-2773" target="HOST-5777">
397
+ <data key="e_type">INCIDENT_LINK</data>
398
+ <data key="e_timestamp">1688087740</data>
399
+ <data key="e_label_binary">malicious</data>
400
+ <data key="e_label_confidence">0.9208984375</data>
401
+ <data key="e_suspicion_score">0.9208984375</data>
402
+ <data key="e_mo_name">Data Theft</data>
403
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
404
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
405
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
406
+ <data key="e_lifecycle_stage">complete-mission</data>
407
+ <data key="e_disposition">Disrupted</data>
408
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
409
+ </edge>
410
+ <edge id="e20" source="HOST-5777" target="HOST-2773">
411
+ <data key="e_type">INCIDENT_LINK</data>
412
+ <data key="e_timestamp">1688087740</data>
413
+ <data key="e_label_binary">malicious</data>
414
+ <data key="e_label_confidence">0.9208984375</data>
415
+ <data key="e_suspicion_score">0.9208984375</data>
416
+ <data key="e_mo_name">Data Theft</data>
417
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
418
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
419
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
420
+ <data key="e_lifecycle_stage">complete-mission</data>
421
+ <data key="e_disposition">Disrupted</data>
422
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
423
+ </edge>
424
+ <edge id="e21" source="773487f0-16e4-11ee-85fa-f77cc9708c6b" target="HOST-2773">
425
+ <data key="e_type">INCIDENT_LINK</data>
426
+ <data key="e_timestamp">1688087740</data>
427
+ <data key="e_label_binary">malicious</data>
428
+ <data key="e_label_confidence">0.9208984375</data>
429
+ <data key="e_suspicion_score">0.9208984375</data>
430
+ <data key="e_mo_name">Data Theft</data>
431
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
432
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
433
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
434
+ <data key="e_lifecycle_stage">complete-mission</data>
435
+ <data key="e_disposition">Disrupted</data>
436
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
437
+ </edge>
438
+ <edge id="e22" source="HOST-2773" target="773487f0-16e4-11ee-85fa-f77cc9708c6b">
439
+ <data key="e_type">INCIDENT_LINK</data>
440
+ <data key="e_timestamp">1688087740</data>
441
+ <data key="e_label_binary">malicious</data>
442
+ <data key="e_label_confidence">0.9208984375</data>
443
+ <data key="e_suspicion_score">0.9208984375</data>
444
+ <data key="e_mo_name">Data Theft</data>
445
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
446
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
447
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
448
+ <data key="e_lifecycle_stage">complete-mission</data>
449
+ <data key="e_disposition">Disrupted</data>
450
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
451
+ </edge>
452
+ <edge id="e23" source="d55431a1-0627-11ee-a510-47d18ec77e75" target="HOST-2773">
453
+ <data key="e_type">INCIDENT_LINK</data>
454
+ <data key="e_timestamp">1688087740</data>
455
+ <data key="e_label_binary">malicious</data>
456
+ <data key="e_label_confidence">0.9208984375</data>
457
+ <data key="e_suspicion_score">0.9208984375</data>
458
+ <data key="e_mo_name">Data Theft</data>
459
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
460
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
461
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
462
+ <data key="e_lifecycle_stage">complete-mission</data>
463
+ <data key="e_disposition">Disrupted</data>
464
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
465
+ </edge>
466
+ <edge id="e24" source="HOST-2773" target="d55431a1-0627-11ee-a510-47d18ec77e75">
467
+ <data key="e_type">INCIDENT_LINK</data>
468
+ <data key="e_timestamp">1688087740</data>
469
+ <data key="e_label_binary">malicious</data>
470
+ <data key="e_label_confidence">0.9208984375</data>
471
+ <data key="e_suspicion_score">0.9208984375</data>
472
+ <data key="e_mo_name">Data Theft</data>
473
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
474
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
475
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
476
+ <data key="e_lifecycle_stage">complete-mission</data>
477
+ <data key="e_disposition">Disrupted</data>
478
+ <data key="e_incident_id">a0c9c8b0-16e3-11ee-8363-57b2dccea5f8</data>
479
+ </edge>
480
+ </graph>
481
+ </graphml>
graph/incidents_graphml/a/a0cc50c0-3ea3-11ee-a794-3d0dc768f48a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a14885a7-1040-11ee-b532-c32c0c65a7e2">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.9.210</data>
35
+ <data key="n_hostname">100.64.9.210</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.217.8</data>
43
+ <data key="n_hostname">172.24.217.8</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="a14885a7-1040-11ee-b532-c32c0c65a7e2" target="HOST-2731">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692458299</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0cc50c0-3ea3-11ee-a794-3d0dc768f48a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8f6f2300-0b3d-11ee-bd40-01777b2a031d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.12</data>
35
+ <data key="n_hostname">100.64.80.12</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="50391331-0642-11ee-a474-c1a66c71fe5c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.1.25</data>
43
+ <data key="n_hostname">HOST-13452</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="8eecf520-0b05-11ee-b69f-bdc6645cec12">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.80.13</data>
51
+ <data key="n_hostname">100.64.80.13</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <edge id="e1" source="8f6f2300-0b3d-11ee-bd40-01777b2a031d" target="HOST-13464">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1686806981</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-13464" target="8f6f2300-0b3d-11ee-bd40-01777b2a031d">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1686806981</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38</data>
83
+ </edge>
84
+ <edge id="e3" source="HOST-13464" target="8eecf520-0b05-11ee-b69f-bdc6645cec12">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1686806981</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38</data>
97
+ </edge>
98
+ <edge id="e4" source="8eecf520-0b05-11ee-b69f-bdc6645cec12" target="HOST-13464">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1686806981</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/a/a0d80320-7a44-11ee-a612-0577b4410533.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.6.172</data>
35
+ <data key="n_hostname">172.31.6.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f171941-7a44-11ee-8b50-8f279ed05f51">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.105</data>
43
+ <data key="n_hostname">100.64.8.105</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2757" target="HOST-2887">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699014567</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0d80320-7a44-11ee-a612-0577b4410533</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0ddb5e0-3ea3-11ee-a794-3d0dc768f48a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.217.8</data>
35
+ <data key="n_hostname">172.24.217.8</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a14885a7-1040-11ee-b532-c32c0c65a7e2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.9.210</data>
43
+ <data key="n_hostname">100.64.9.210</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2731" target="HOST-3079">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692458299</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0ddb5e0-3ea3-11ee-a794-3d0dc768f48a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0e32ef0-300f-11ee-bf6d-f1637ddc586f.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="3b0d0024-0642-11ee-93f4-159fa6734fa9">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.73.116</data>
43
+ <data key="n_hostname">100.64.73.116</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13083" target="HOST-14717">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690855417</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a0e32ef0-300f-11ee-bf6d-f1637ddc586f</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0e3cc60-01c6-11ee-b478-9b612300fc52.graphml ADDED
@@ -0,0 +1,221 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="87e44380-f5db-11ed-ac49-b78fd7f45ca6">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.125</data>
35
+ <data key="n_hostname">100.64.80.125</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="10b24680-9d8a-11ed-98f8-cd6642d241c0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.1.173</data>
43
+ <data key="n_hostname">100.64.1.173</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]</data>
47
+ </node>
48
+ <node id="f70959e1-9db5-11ed-b809-3be3af57b3fa">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.9.120</data>
51
+ <data key="n_hostname">100.64.9.120</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]</data>
55
+ </node>
56
+ <node id="5b6ab5b1-9ff4-11ed-b2b1-33882ebf6b47">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.1.34</data>
59
+ <data key="n_hostname">100.64.1.34</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","Cisco Meraki Firewall","Meraki","Stealthwatch"]</data>
63
+ </node>
64
+ <node id="ae116ac4-9d8d-11ed-9ba1-69c845a45d44">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.74.5</data>
67
+ <data key="n_hostname">100.64.74.5</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.7890625</data>
70
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]</data>
71
+ </node>
72
+ <node id="0d331701-f50f-11ed-8e56-096f1a37084c">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.32.175</data>
75
+ <data key="n_hostname">100.64.32.175</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.578125</data>
78
+ <data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
79
+ </node>
80
+ <edge id="e1" source="87e44380-f5db-11ed-ac49-b78fd7f45ca6" target="10b24680-9d8a-11ed-98f8-cd6642d241c0">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1685766311</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.7890625</data>
85
+ <data key="e_suspicion_score">0.7890625</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Disrupted</data>
92
+ <data key="e_incident_id">a0e3cc60-01c6-11ee-b478-9b612300fc52</data>
93
+ </edge>
94
+ <edge id="e2" source="10b24680-9d8a-11ed-98f8-cd6642d241c0" target="87e44380-f5db-11ed-ac49-b78fd7f45ca6">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1685766311</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.7890625</data>
99
+ <data key="e_suspicion_score">0.7890625</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Disrupted</data>
106
+ <data key="e_incident_id">a0e3cc60-01c6-11ee-b478-9b612300fc52</data>
107
+ </edge>
108
+ <edge id="e3" source="f70959e1-9db5-11ed-b809-3be3af57b3fa" target="5b6ab5b1-9ff4-11ed-b2b1-33882ebf6b47">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1685766311</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.7890625</data>
113
+ <data key="e_suspicion_score">0.7890625</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Disrupted</data>
120
+ <data key="e_incident_id">a0e3cc60-01c6-11ee-b478-9b612300fc52</data>
121
+ </edge>
122
+ <edge id="e4" source="5b6ab5b1-9ff4-11ed-b2b1-33882ebf6b47" target="f70959e1-9db5-11ed-b809-3be3af57b3fa">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1685766311</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.7890625</data>
127
+ <data key="e_suspicion_score">0.7890625</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Disrupted</data>
134
+ <data key="e_incident_id">a0e3cc60-01c6-11ee-b478-9b612300fc52</data>
135
+ </edge>
136
+ <edge id="e5" source="87e44380-f5db-11ed-ac49-b78fd7f45ca6" target="5b6ab5b1-9ff4-11ed-b2b1-33882ebf6b47">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1685766311</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.7890625</data>
141
+ <data key="e_suspicion_score">0.7890625</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Disrupted</data>
148
+ <data key="e_incident_id">a0e3cc60-01c6-11ee-b478-9b612300fc52</data>
149
+ </edge>
150
+ <edge id="e6" source="5b6ab5b1-9ff4-11ed-b2b1-33882ebf6b47" target="87e44380-f5db-11ed-ac49-b78fd7f45ca6">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1685766311</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.7890625</data>
155
+ <data key="e_suspicion_score">0.7890625</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Disrupted</data>
162
+ <data key="e_incident_id">a0e3cc60-01c6-11ee-b478-9b612300fc52</data>
163
+ </edge>
164
+ <edge id="e7" source="ae116ac4-9d8d-11ed-9ba1-69c845a45d44" target="10b24680-9d8a-11ed-98f8-cd6642d241c0">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1685766311</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.7890625</data>
169
+ <data key="e_suspicion_score">0.7890625</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Disrupted</data>
176
+ <data key="e_incident_id">a0e3cc60-01c6-11ee-b478-9b612300fc52</data>
177
+ </edge>
178
+ <edge id="e8" source="10b24680-9d8a-11ed-98f8-cd6642d241c0" target="ae116ac4-9d8d-11ed-9ba1-69c845a45d44">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1685766311</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.7890625</data>
183
+ <data key="e_suspicion_score">0.7890625</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Disrupted</data>
190
+ <data key="e_incident_id">a0e3cc60-01c6-11ee-b478-9b612300fc52</data>
191
+ </edge>
192
+ <edge id="e9" source="0d331701-f50f-11ed-8e56-096f1a37084c" target="10b24680-9d8a-11ed-98f8-cd6642d241c0">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1685766311</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.7890625</data>
197
+ <data key="e_suspicion_score">0.7890625</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">a0e3cc60-01c6-11ee-b478-9b612300fc52</data>
205
+ </edge>
206
+ <edge id="e10" source="10b24680-9d8a-11ed-98f8-cd6642d241c0" target="0d331701-f50f-11ed-8e56-096f1a37084c">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1685766311</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.7890625</data>
211
+ <data key="e_suspicion_score">0.7890625</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">a0e3cc60-01c6-11ee-b478-9b612300fc52</data>
219
+ </edge>
220
+ </graph>
221
+ </graphml>
graph/incidents_graphml/a/a0e5f770-6071-11ed-81d5-3f5b5a73c539.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f4cc4560-2025-11ed-849f-a322874fdacf">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.57.225</data>
35
+ <data key="n_hostname">100.64.57.225</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="081ff790-41a7-11ed-a587-21753cf039e4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.74.221</data>
43
+ <data key="n_hostname">100.64.74.221</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="f4cc4560-2025-11ed-849f-a322874fdacf" target="081ff790-41a7-11ed-a587-21753cf039e4">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1668027666</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a0e5f770-6071-11ed-81d5-3f5b5a73c539</data>
61
+ </edge>
62
+ <edge id="e2" source="081ff790-41a7-11ed-a587-21753cf039e4" target="f4cc4560-2025-11ed-849f-a322874fdacf">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1668027666</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">a0e5f770-6071-11ed-81d5-3f5b5a73c539</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/a/a0e6a890-182d-11ee-88ad-19cfc5af29bb.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="80125761-16c8-11ee-bf2f-5f218b705c9b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.77.187</data>
35
+ <data key="n_hostname">100.64.77.187</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="68b810e1-0639-11ee-8434-e720bc5c09e1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.118</data>
43
+ <data key="n_hostname">100.64.72.118</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="80125761-16c8-11ee-bf2f-5f218b705c9b" target="HOST-12932">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688229474</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0e6a890-182d-11ee-88ad-19cfc5af29bb</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e64bbb62-062a-11ee-98c4-03fbbffc96a5">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.14</data>
35
+ <data key="n_hostname">100.64.80.14</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="e8216d21-0627-11ee-b3b1-23c171fd7d30">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.76.37</data>
43
+ <data key="n_hostname">100.64.76.37</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="e64bbb62-062a-11ee-98c4-03fbbffc96a5" target="e8216d21-0627-11ee-b3b1-23c171fd7d30">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686806981</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38</data>
61
+ </edge>
62
+ <edge id="e2" source="e8216d21-0627-11ee-b3b1-23c171fd7d30" target="e64bbb62-062a-11ee-98c4-03fbbffc96a5">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1686806981</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/a/a0e94130-7a44-11ee-a612-0577b4410533.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.168.48</data>
35
+ <data key="n_hostname">172.30.168.48</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f171941-7a44-11ee-8b50-8f279ed05f51">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.105</data>
43
+ <data key="n_hostname">100.64.8.105</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2842" target="HOST-2887">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699014567</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0e94130-7a44-11ee-a612-0577b4410533</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0f18040-6327-11ee-84e8-6f3a76e74a81.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc5e80-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.182.227</data>
35
+ <data key="n_hostname">172.31.182.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0d8ae936-468b-11ee-a811-abe41e78950d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.12.122</data>
43
+ <data key="n_hostname">100.64.12.122</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2761" target="HOST-3422">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1696473235</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a0f18040-6327-11ee-84e8-6f3a76e74a81</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0f18c00-3ea3-11ee-a794-3d0dc768f48a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3e1934e1-0625-11ee-9792-13ac4ddb104c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.7.152</data>
35
+ <data key="n_hostname">100.64.7.152</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.214.148</data>
43
+ <data key="n_hostname">172.30.214.148</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2779" target="HOST-2720">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692458299</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0f18c00-3ea3-11ee-a794-3d0dc768f48a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a0f76860-16e3-11ee-8363-57b2dccea5f8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="25c36c74-0662-11ee-b877-479ae0d4a548">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.34.9</data>
35
+ <data key="n_hostname">100.64.34.9</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.21.61.66</data>
43
+ <data key="n_hostname">172.21.61.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-6408" target="HOST-2709">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688087741</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a0f76860-16e3-11ee-8363-57b2dccea5f8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a103db80-3ea3-11ee-a794-3d0dc768f48a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.214.148</data>
35
+ <data key="n_hostname">172.30.214.148</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="3e1934e1-0625-11ee-9792-13ac4ddb104c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.7.152</data>
43
+ <data key="n_hostname">100.64.7.152</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2720" target="HOST-2779">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692458299</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a103db80-3ea3-11ee-a794-3d0dc768f48a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a1042510-df82-11ee-8f11-296badf765d8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="21b0a0f0-062e-11ee-891b-d96fe71b3f35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.14.74</data>
35
+ <data key="n_hostname">100.64.14.74</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.101.1</data>
43
+ <data key="n_hostname">172.31.101.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-6040" target="HOST-2821">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710146263</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a1042510-df82-11ee-8f11-296badf765d8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a1070bd0-01c6-11ee-b478-9b612300fc52.graphml ADDED
@@ -0,0 +1,121 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4a00b090-f49f-11ed-94cb-473cbe4e5fe8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.46.120</data>
35
+ <data key="n_hostname">100.64.46.120</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
39
+ </node>
40
+ <node id="acb2b000-9d8b-11ed-98f8-cd6642d241c0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.74.20</data>
43
+ <data key="n_hostname">100.64.74.20</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]</data>
47
+ </node>
48
+ <node id="838f4834-9e6e-11ed-aecc-2b3c1f9e6a86">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.80.22</data>
51
+ <data key="n_hostname">100.64.80.22</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
55
+ </node>
56
+ <node id="fcb0d3f1-9d8d-11ed-98f8-cd6642d241c0">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.73.58</data>
59
+ <data key="n_hostname">100.64.73.58</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]</data>
63
+ </node>
64
+ <edge id="e1" source="4a00b090-f49f-11ed-94cb-473cbe4e5fe8" target="acb2b000-9d8b-11ed-98f8-cd6642d241c0">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1685766311</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.71875</data>
69
+ <data key="e_suspicion_score">0.71875</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">a1070bd0-01c6-11ee-b478-9b612300fc52</data>
77
+ </edge>
78
+ <edge id="e2" source="acb2b000-9d8b-11ed-98f8-cd6642d241c0" target="4a00b090-f49f-11ed-94cb-473cbe4e5fe8">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1685766311</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.71875</data>
83
+ <data key="e_suspicion_score">0.71875</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">a1070bd0-01c6-11ee-b478-9b612300fc52</data>
91
+ </edge>
92
+ <edge id="e3" source="HOST-15430" target="HOST-14598">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1685766311</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.71875</data>
97
+ <data key="e_suspicion_score">0.71875</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">a1070bd0-01c6-11ee-b478-9b612300fc52</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-14598" target="HOST-15430">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1685766311</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.71875</data>
111
+ <data key="e_suspicion_score">0.71875</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">a1070bd0-01c6-11ee-b478-9b612300fc52</data>
119
+ </edge>
120
+ </graph>
121
+ </graphml>
graph/incidents_graphml/a/a1105050-9fd7-11ee-a827-c14dee966e17.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7f2406b2-0628-11ee-8578-99ce994a4216">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.27.240</data>
35
+ <data key="n_hostname">USER-0015-1481.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.1.127</data>
43
+ <data key="n_hostname">172.29.1.127</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="7f2406b2-0628-11ee-8578-99ce994a4216" target="HOST-2713">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703145896</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a1105050-9fd7-11ee-a827-c14dee966e17</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a113f810-120d-11ef-818b-4176151696b3.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c791a131-115f-11ef-afcc-9b6c185ebd2f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.10.137</data>
35
+ <data key="n_hostname">100.64.10.137</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.96.192</data>
43
+ <data key="n_hostname">172.18.96.192</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="c791a131-115f-11ef-afcc-9b6c185ebd2f" target="HOST-2715">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1715703521</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a113f810-120d-11ef-818b-4176151696b3</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a1190ca0-df82-11ee-8f11-296badf765d8.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.101.1</data>
35
+ <data key="n_hostname">172.31.101.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="21b0a0f0-062e-11ee-891b-d96fe71b3f35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.14.74</data>
43
+ <data key="n_hostname">100.64.14.74</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2821" target="HOST-6040">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710146263</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a1190ca0-df82-11ee-8f11-296badf765d8</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a11f6c60-7a44-11ee-a612-0577b4410533.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.200.243</data>
35
+ <data key="n_hostname">172.30.200.243</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f171941-7a44-11ee-8b50-8f279ed05f51">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.105</data>
43
+ <data key="n_hostname">100.64.8.105</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2706" target="HOST-2887">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1699014567</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a11f6c60-7a44-11ee-a612-0577b4410533</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a1202ed0-9fd7-11ee-a827-c14dee966e17.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.1.127</data>
35
+ <data key="n_hostname">172.29.1.127</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="7f2406b2-0628-11ee-8578-99ce994a4216">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.27.240</data>
43
+ <data key="n_hostname">USER-0015-1481.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2713" target="HOST-11212">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703145896</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">a1202ed0-9fd7-11ee-a827-c14dee966e17</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a13104f0-9003-11ee-97ac-71b8150df801.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e215f993-062d-11ee-8c90-c3d9d7223cd5">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.48.128</data>
35
+ <data key="n_hostname">100.64.48.128</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.214.148</data>
43
+ <data key="n_hostname">172.30.214.148</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-8492" target="HOST-2720">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701405575</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">a13104f0-9003-11ee-97ac-71b8150df801</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/a/a131b240-16e3-11ee-8363-57b2dccea5f8.graphml ADDED
@@ -0,0 +1,409 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="25c36c74-0662-11ee-b877-479ae0d4a548">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.34.9</data>
35
+ <data key="n_hostname">100.64.34.9</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0458ba10-062e-11ee-b010-f122865b5659">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.26.23.117</data>
43
+ <data key="n_hostname">172.26.23.117</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="25b766b4-062f-11ee-978b-f374a5593a56">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.30.36</data>
51
+ <data key="n_hostname">100.64.30.36</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.68359375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.31.6.172</data>
59
+ <data key="n_hostname">172.31.6.172</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">172.30.208.219</data>
67
+ <data key="n_hostname">172.30.208.219</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.71875</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="29806782-062d-11ee-96ff-759d178f6b48">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.12.228</data>
75
+ <data key="n_hostname">100.64.12.228</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.578125</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="605dca21-0625-11ee-b19f-ed665a42340f">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.34.23</data>
83
+ <data key="n_hostname">100.64.34.23</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.578125</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="b131e5e2-0fa2-11ee-8dd0-a343ce8a7aaf">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.34.24</data>
91
+ <data key="n_hostname">100.64.34.24</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.71875</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="51fc7a00-0dd5-11ee-97de-e5d06193d7bc">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.34.25</data>
99
+ <data key="n_hostname">100.64.34.25</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="d66a1c90-08e7-11ee-b983-5be6abb53f29">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.34.26</data>
107
+ <data key="n_hostname">100.64.34.26</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.71875</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="1e795272-0628-11ee-9a0c-b9f8978d847e">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.34.27</data>
115
+ <data key="n_hostname">100.64.34.27</data>
116
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
117
+ <data key="n_suspicion_score">0.71875</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="5eb43102-0913-11ee-8c78-ddeb0fd50d56">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.34.28</data>
123
+ <data key="n_hostname">USER-0015-1300.example.internal</data>
124
+ <data key="n_set_roles">["Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.578125</data>
126
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
127
+ </node>
128
+ <edge id="e1" source="HOST-6408" target="HOST-2824">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1688087741</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.841796875</data>
133
+ <data key="e_suspicion_score">0.841796875</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Disrupted</data>
140
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
141
+ </edge>
142
+ <edge id="e2" source="HOST-5898" target="HOST-2757">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1688087741</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.841796875</data>
147
+ <data key="e_suspicion_score">0.841796875</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Disrupted</data>
154
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
155
+ </edge>
156
+ <edge id="e3" source="HOST-5898" target="HOST-2823">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1688087741</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.841796875</data>
161
+ <data key="e_suspicion_score">0.841796875</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Disrupted</data>
168
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
169
+ </edge>
170
+ <edge id="e4" source="29806782-062d-11ee-96ff-759d178f6b48" target="HOST-2824">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1688087741</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.841796875</data>
175
+ <data key="e_suspicion_score">0.841796875</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Disrupted</data>
182
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
183
+ </edge>
184
+ <edge id="e5" source="HOST-2824" target="29806782-062d-11ee-96ff-759d178f6b48">
185
+ <data key="e_type">INCIDENT_LINK</data>
186
+ <data key="e_timestamp">1688087741</data>
187
+ <data key="e_label_binary">malicious</data>
188
+ <data key="e_label_confidence">0.841796875</data>
189
+ <data key="e_suspicion_score">0.841796875</data>
190
+ <data key="e_mo_name">Data Theft</data>
191
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
192
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
193
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
194
+ <data key="e_lifecycle_stage">complete-mission</data>
195
+ <data key="e_disposition">Disrupted</data>
196
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
197
+ </edge>
198
+ <edge id="e6" source="605dca21-0625-11ee-b19f-ed665a42340f" target="HOST-2824">
199
+ <data key="e_type">INCIDENT_LINK</data>
200
+ <data key="e_timestamp">1688087741</data>
201
+ <data key="e_label_binary">malicious</data>
202
+ <data key="e_label_confidence">0.841796875</data>
203
+ <data key="e_suspicion_score">0.841796875</data>
204
+ <data key="e_mo_name">Data Theft</data>
205
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
206
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
207
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
208
+ <data key="e_lifecycle_stage">complete-mission</data>
209
+ <data key="e_disposition">Disrupted</data>
210
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
211
+ </edge>
212
+ <edge id="e7" source="HOST-2824" target="605dca21-0625-11ee-b19f-ed665a42340f">
213
+ <data key="e_type">INCIDENT_LINK</data>
214
+ <data key="e_timestamp">1688087741</data>
215
+ <data key="e_label_binary">malicious</data>
216
+ <data key="e_label_confidence">0.841796875</data>
217
+ <data key="e_suspicion_score">0.841796875</data>
218
+ <data key="e_mo_name">Data Theft</data>
219
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
220
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
221
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
222
+ <data key="e_lifecycle_stage">complete-mission</data>
223
+ <data key="e_disposition">Disrupted</data>
224
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
225
+ </edge>
226
+ <edge id="e8" source="HOST-2824" target="b131e5e2-0fa2-11ee-8dd0-a343ce8a7aaf">
227
+ <data key="e_type">INCIDENT_LINK</data>
228
+ <data key="e_timestamp">1688087741</data>
229
+ <data key="e_label_binary">malicious</data>
230
+ <data key="e_label_confidence">0.841796875</data>
231
+ <data key="e_suspicion_score">0.841796875</data>
232
+ <data key="e_mo_name">Data Theft</data>
233
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
234
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
235
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
236
+ <data key="e_lifecycle_stage">complete-mission</data>
237
+ <data key="e_disposition">Disrupted</data>
238
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
239
+ </edge>
240
+ <edge id="e9" source="b131e5e2-0fa2-11ee-8dd0-a343ce8a7aaf" target="HOST-2824">
241
+ <data key="e_type">INCIDENT_LINK</data>
242
+ <data key="e_timestamp">1688087741</data>
243
+ <data key="e_label_binary">malicious</data>
244
+ <data key="e_label_confidence">0.841796875</data>
245
+ <data key="e_suspicion_score">0.841796875</data>
246
+ <data key="e_mo_name">Data Theft</data>
247
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
248
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
249
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
250
+ <data key="e_lifecycle_stage">complete-mission</data>
251
+ <data key="e_disposition">Disrupted</data>
252
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
253
+ </edge>
254
+ <edge id="e10" source="51fc7a00-0dd5-11ee-97de-e5d06193d7bc" target="HOST-2824">
255
+ <data key="e_type">INCIDENT_LINK</data>
256
+ <data key="e_timestamp">1688087741</data>
257
+ <data key="e_label_binary">malicious</data>
258
+ <data key="e_label_confidence">0.841796875</data>
259
+ <data key="e_suspicion_score">0.841796875</data>
260
+ <data key="e_mo_name">Data Theft</data>
261
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
262
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
263
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
264
+ <data key="e_lifecycle_stage">complete-mission</data>
265
+ <data key="e_disposition">Disrupted</data>
266
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
267
+ </edge>
268
+ <edge id="e11" source="HOST-2824" target="51fc7a00-0dd5-11ee-97de-e5d06193d7bc">
269
+ <data key="e_type">INCIDENT_LINK</data>
270
+ <data key="e_timestamp">1688087741</data>
271
+ <data key="e_label_binary">malicious</data>
272
+ <data key="e_label_confidence">0.841796875</data>
273
+ <data key="e_suspicion_score">0.841796875</data>
274
+ <data key="e_mo_name">Data Theft</data>
275
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
276
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
277
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
278
+ <data key="e_lifecycle_stage">complete-mission</data>
279
+ <data key="e_disposition">Disrupted</data>
280
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
281
+ </edge>
282
+ <edge id="e12" source="HOST-2824" target="HOST-6408">
283
+ <data key="e_type">INCIDENT_LINK</data>
284
+ <data key="e_timestamp">1688087741</data>
285
+ <data key="e_label_binary">malicious</data>
286
+ <data key="e_label_confidence">0.841796875</data>
287
+ <data key="e_suspicion_score">0.841796875</data>
288
+ <data key="e_mo_name">Data Theft</data>
289
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
290
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
291
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
292
+ <data key="e_lifecycle_stage">complete-mission</data>
293
+ <data key="e_disposition">Disrupted</data>
294
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
295
+ </edge>
296
+ <edge id="e13" source="d66a1c90-08e7-11ee-b983-5be6abb53f29" target="HOST-2824">
297
+ <data key="e_type">INCIDENT_LINK</data>
298
+ <data key="e_timestamp">1688087741</data>
299
+ <data key="e_label_binary">malicious</data>
300
+ <data key="e_label_confidence">0.841796875</data>
301
+ <data key="e_suspicion_score">0.841796875</data>
302
+ <data key="e_mo_name">Data Theft</data>
303
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
304
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
305
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
306
+ <data key="e_lifecycle_stage">complete-mission</data>
307
+ <data key="e_disposition">Disrupted</data>
308
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
309
+ </edge>
310
+ <edge id="e14" source="HOST-2824" target="d66a1c90-08e7-11ee-b983-5be6abb53f29">
311
+ <data key="e_type">INCIDENT_LINK</data>
312
+ <data key="e_timestamp">1688087741</data>
313
+ <data key="e_label_binary">malicious</data>
314
+ <data key="e_label_confidence">0.841796875</data>
315
+ <data key="e_suspicion_score">0.841796875</data>
316
+ <data key="e_mo_name">Data Theft</data>
317
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
318
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
319
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
320
+ <data key="e_lifecycle_stage">complete-mission</data>
321
+ <data key="e_disposition">Disrupted</data>
322
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
323
+ </edge>
324
+ <edge id="e15" source="1e795272-0628-11ee-9a0c-b9f8978d847e" target="HOST-2824">
325
+ <data key="e_type">INCIDENT_LINK</data>
326
+ <data key="e_timestamp">1688087741</data>
327
+ <data key="e_label_binary">malicious</data>
328
+ <data key="e_label_confidence">0.841796875</data>
329
+ <data key="e_suspicion_score">0.841796875</data>
330
+ <data key="e_mo_name">Data Theft</data>
331
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
332
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
333
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
334
+ <data key="e_lifecycle_stage">complete-mission</data>
335
+ <data key="e_disposition">Disrupted</data>
336
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
337
+ </edge>
338
+ <edge id="e16" source="HOST-2824" target="1e795272-0628-11ee-9a0c-b9f8978d847e">
339
+ <data key="e_type">INCIDENT_LINK</data>
340
+ <data key="e_timestamp">1688087741</data>
341
+ <data key="e_label_binary">malicious</data>
342
+ <data key="e_label_confidence">0.841796875</data>
343
+ <data key="e_suspicion_score">0.841796875</data>
344
+ <data key="e_mo_name">Data Theft</data>
345
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
346
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
347
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
348
+ <data key="e_lifecycle_stage">complete-mission</data>
349
+ <data key="e_disposition">Disrupted</data>
350
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
351
+ </edge>
352
+ <edge id="e17" source="5eb43102-0913-11ee-8c78-ddeb0fd50d56" target="HOST-2824">
353
+ <data key="e_type">INCIDENT_LINK</data>
354
+ <data key="e_timestamp">1688087741</data>
355
+ <data key="e_label_binary">malicious</data>
356
+ <data key="e_label_confidence">0.841796875</data>
357
+ <data key="e_suspicion_score">0.841796875</data>
358
+ <data key="e_mo_name">Data Theft</data>
359
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
360
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
361
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
362
+ <data key="e_lifecycle_stage">complete-mission</data>
363
+ <data key="e_disposition">Disrupted</data>
364
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
365
+ </edge>
366
+ <edge id="e18" source="HOST-2824" target="5eb43102-0913-11ee-8c78-ddeb0fd50d56">
367
+ <data key="e_type">INCIDENT_LINK</data>
368
+ <data key="e_timestamp">1688087741</data>
369
+ <data key="e_label_binary">malicious</data>
370
+ <data key="e_label_confidence">0.841796875</data>
371
+ <data key="e_suspicion_score">0.841796875</data>
372
+ <data key="e_mo_name">Data Theft</data>
373
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
374
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
375
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
376
+ <data key="e_lifecycle_stage">complete-mission</data>
377
+ <data key="e_disposition">Disrupted</data>
378
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
379
+ </edge>
380
+ <edge id="e19" source="HOST-5898" target="HOST-2824">
381
+ <data key="e_type">INCIDENT_LINK</data>
382
+ <data key="e_timestamp">1688087741</data>
383
+ <data key="e_label_binary">malicious</data>
384
+ <data key="e_label_confidence">0.841796875</data>
385
+ <data key="e_suspicion_score">0.841796875</data>
386
+ <data key="e_mo_name">Data Theft</data>
387
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
388
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
389
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
390
+ <data key="e_lifecycle_stage">complete-mission</data>
391
+ <data key="e_disposition">Disrupted</data>
392
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
393
+ </edge>
394
+ <edge id="e20" source="HOST-2824" target="HOST-5898">
395
+ <data key="e_type">INCIDENT_LINK</data>
396
+ <data key="e_timestamp">1688087741</data>
397
+ <data key="e_label_binary">malicious</data>
398
+ <data key="e_label_confidence">0.841796875</data>
399
+ <data key="e_suspicion_score">0.841796875</data>
400
+ <data key="e_mo_name">Data Theft</data>
401
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
402
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
403
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
404
+ <data key="e_lifecycle_stage">complete-mission</data>
405
+ <data key="e_disposition">Disrupted</data>
406
+ <data key="e_incident_id">a131b240-16e3-11ee-8363-57b2dccea5f8</data>
407
+ </edge>
408
+ </graph>
409
+ </graphml>