diff --git a/graph/incidents_graphml/a/a03da520-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/a/a03da520-2885-11ee-ab6d-398d68629c7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a07f18fa1c98c5cfb9d238a07387d5050e38ae37 --- /dev/null +++ b/graph/incidents_graphml/a/a03da520-2885-11ee-ab6d-398d68629c7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.89 + 100.64.48.89 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690026488 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a03da520-2885-11ee-ab6d-398d68629c7b + + + diff --git a/graph/incidents_graphml/a/a03ddf60-9827-11ee-bcb2-fb3968bcff94.graphml b/graph/incidents_graphml/a/a03ddf60-9827-11ee-bcb2-fb3968bcff94.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fe31b17ea7b173336c3b8cd4f0890c6aac7b178 --- /dev/null +++ b/graph/incidents_graphml/a/a03ddf60-9827-11ee-bcb2-fb3968bcff94.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.99 + 100.64.11.99 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702300645 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a03ddf60-9827-11ee-bcb2-fb3968bcff94 + + + diff --git a/graph/incidents_graphml/a/a04b50e0-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/a/a04b50e0-120d-11ef-818b-4176151696b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f84447f03ca10b4da196b3dcecf413d85b53070d --- /dev/null +++ b/graph/incidents_graphml/a/a04b50e0-120d-11ef-818b-4176151696b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.135 + 100.64.10.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715703520 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a04b50e0-120d-11ef-818b-4176151696b3 + + + diff --git a/graph/incidents_graphml/a/a04c3740-9827-11ee-bcb2-fb3968bcff94.graphml b/graph/incidents_graphml/a/a04c3740-9827-11ee-bcb2-fb3968bcff94.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87cf7f93465d9109f281036af56dd57eaabe3300 --- /dev/null +++ b/graph/incidents_graphml/a/a04c3740-9827-11ee-bcb2-fb3968bcff94.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.99 + 100.64.11.99 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702300645 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a04c3740-9827-11ee-bcb2-fb3968bcff94 + + + diff --git a/graph/incidents_graphml/a/a06637e0-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/a/a06637e0-0ebf-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b812cd7d725b45265233616e646ead1cd0c84eca --- /dev/null +++ b/graph/incidents_graphml/a/a06637e0-0ebf-11ee-9392-932bfd273540.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.128.193 + 192.168.128.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.197 + 100.64.72.197 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687192668 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a06637e0-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192668 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a06637e0-0ebf-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/a/a06abf20-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/a/a06abf20-84c8-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00beaa0d5e0dde97d9b5b440a54f00aaab8c7e16 --- /dev/null +++ b/graph/incidents_graphml/a/a06abf20-84c8-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.147 + 100.64.38.147 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700170771 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a06abf20-84c8-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/a/a06e92f0-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a06e92f0-7a44-11ee-a612-0577b4410533.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83d232685aaa91553bec67c7929eaef38362edf5 --- /dev/null +++ b/graph/incidents_graphml/a/a06e92f0-7a44-11ee-a612-0577b4410533.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699014566 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a06e92f0-7a44-11ee-a612-0577b4410533 + + + diff --git a/graph/incidents_graphml/a/a0737940-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/a/a0737940-0867-11ee-aafb-9397a5ec7d32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c02d39bb01e99f1b6d5d957e65c640b014df6725 --- /dev/null +++ b/graph/incidents_graphml/a/a0737940-0867-11ee-aafb-9397a5ec7d32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.119 + 100.64.7.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686495166 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a0737940-0867-11ee-aafb-9397a5ec7d32 + + + diff --git a/graph/incidents_graphml/a/a076d5f0-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/a/a076d5f0-4191-11ee-b8b0-0f1db008ec38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5a5b5011779036ed71ec8eeb05dec7534c99b50 --- /dev/null +++ b/graph/incidents_graphml/a/a076d5f0-4191-11ee-b8b0-0f1db008ec38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.119 + 100.64.18.119 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692780421 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a076d5f0-4191-11ee-b8b0-0f1db008ec38 + + + diff --git a/graph/incidents_graphml/a/a07db700-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/a/a07db700-df82-11ee-8f11-296badf765d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e6a0a1f84581c35b9959cc6b18067b326ead1f8 --- /dev/null +++ b/graph/incidents_graphml/a/a07db700-df82-11ee-8f11-296badf765d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.222 + 100.64.46.222 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710146262 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a07db700-df82-11ee-8f11-296badf765d8 + + + diff --git a/graph/incidents_graphml/a/a085ca10-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/a/a085ca10-4191-11ee-b8b0-0f1db008ec38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e32b792dc1c067c7b14ef48f13ffe5223226a74 --- /dev/null +++ b/graph/incidents_graphml/a/a085ca10-4191-11ee-b8b0-0f1db008ec38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.119 + 100.64.18.119 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692780421 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a085ca10-4191-11ee-b8b0-0f1db008ec38 + + + diff --git a/graph/incidents_graphml/a/a08be340-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/a/a08be340-0867-11ee-aafb-9397a5ec7d32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a6724b22dfcf881b2db6077ba7d3716360471c2 --- /dev/null +++ b/graph/incidents_graphml/a/a08be340-0867-11ee-aafb-9397a5ec7d32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.57 + USER-0015-1487.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686495166 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a08be340-0867-11ee-aafb-9397a5ec7d32 + + + diff --git a/graph/incidents_graphml/a/a08d0e50-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a08d0e50-85f3-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d316b2c9cedc80526a0c9a932fbd65bf60f4a582 --- /dev/null +++ b/graph/incidents_graphml/a/a08d0e50-85f3-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.18 + 100.64.55.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299191 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a08d0e50-85f3-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a0907bb0-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/a/a0907bb0-df82-11ee-8f11-296badf765d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8a6c05f02abc5a09b0f31263cab6180ac35cff4 --- /dev/null +++ b/graph/incidents_graphml/a/a0907bb0-df82-11ee-8f11-296badf765d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.222 + 100.64.46.222 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710146262 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0907bb0-df82-11ee-8f11-296badf765d8 + + + diff --git a/graph/incidents_graphml/a/a0926ea0-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0926ea0-7a44-11ee-a612-0577b4410533.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4034e31c4c9faff949aba9b326fd1e32754f975 --- /dev/null +++ b/graph/incidents_graphml/a/a0926ea0-7a44-11ee-a612-0577b4410533.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.105 + 100.64.8.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699014566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a0926ea0-7a44-11ee-a612-0577b4410533 + + + diff --git a/graph/incidents_graphml/a/a092c260-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/a/a092c260-4191-11ee-b8b0-0f1db008ec38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5688d421197bf375b88c120dc7ef8971fe2d1f94 --- /dev/null +++ b/graph/incidents_graphml/a/a092c260-4191-11ee-b8b0-0f1db008ec38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.161 + 100.64.15.161 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692780421 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a092c260-4191-11ee-b8b0-0f1db008ec38 + + + diff --git a/graph/incidents_graphml/a/a0a3fad0-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0a3fad0-7a44-11ee-a612-0577b4410533.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4f794ff9b0e9499074aad7482fa841f73c1ebd3 --- /dev/null +++ b/graph/incidents_graphml/a/a0a3fad0-7a44-11ee-a612-0577b4410533.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.105 + 100.64.8.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699014566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a0a3fad0-7a44-11ee-a612-0577b4410533 + + + diff --git a/graph/incidents_graphml/a/a0a4c270-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/a/a0a4c270-0867-11ee-aafb-9397a5ec7d32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef1aab874d011a2d618eff3e7948201d58c819ba --- /dev/null +++ b/graph/incidents_graphml/a/a0a4c270-0867-11ee-aafb-9397a5ec7d32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.57 + USER-0015-1487.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686495166 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0a4c270-0867-11ee-aafb-9397a5ec7d32 + + + diff --git a/graph/incidents_graphml/a/a0a7ffe0-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a0a7ffe0-3ea3-11ee-a794-3d0dc768f48a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..522bbf4cf1dffc89406dead6836fdba829f97fbb --- /dev/null +++ b/graph/incidents_graphml/a/a0a7ffe0-3ea3-11ee-a794-3d0dc768f48a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.207 + 100.64.9.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692458299 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0a7ffe0-3ea3-11ee-a794-3d0dc768f48a + + + diff --git a/graph/incidents_graphml/a/a0abefb0-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/a/a0abefb0-4191-11ee-b8b0-0f1db008ec38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9dfd09f37abcdc9904c3d1ccf373745e74588e96 --- /dev/null +++ b/graph/incidents_graphml/a/a0abefb0-4191-11ee-b8b0-0f1db008ec38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.121 + 100.64.18.121 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692780421 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0abefb0-4191-11ee-b8b0-0f1db008ec38 + + + diff --git a/graph/incidents_graphml/a/a0b410e0-0861-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/a/a0b410e0-0861-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bdfa35acee6455f9d3118d6b6ad01e3662b2d78 --- /dev/null +++ b/graph/incidents_graphml/a/a0b410e0-0861-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.204 + 100.64.14.204 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.205 + 100.64.14.205 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.206 + 100.64.14.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.207 + 100.64.14.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.208 + 100.64.14.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.47 + 100.64.8.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.209 + 100.64.14.209 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.201 + 100.64.13.201 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640087 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0b410e0-0861-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/a/a0b5ae10-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0b5ae10-7a44-11ee-a612-0577b4410533.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46e51e7202d80af322d811447093c353a96f8b61 --- /dev/null +++ b/graph/incidents_graphml/a/a0b5ae10-7a44-11ee-a612-0577b4410533.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.105 + 100.64.8.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699014566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a0b5ae10-7a44-11ee-a612-0577b4410533 + + + diff --git a/graph/incidents_graphml/a/a0ba7670-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a0ba7670-3ea3-11ee-a794-3d0dc768f48a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cff6d01dff1f0d0f1810a88a457a5364828dd12f --- /dev/null +++ b/graph/incidents_graphml/a/a0ba7670-3ea3-11ee-a794-3d0dc768f48a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.207 + 100.64.9.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692458299 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0ba7670-3ea3-11ee-a794-3d0dc768f48a + + + diff --git a/graph/incidents_graphml/a/a0bf5340-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/a/a0bf5340-300f-11ee-bf6d-f1637ddc586f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16055a4a5bd609da56d6d12400427fe5fafd23f3 --- /dev/null +++ b/graph/incidents_graphml/a/a0bf5340-300f-11ee-bf6d-f1637ddc586f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.116 + 100.64.73.116 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690855417 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0bf5340-300f-11ee-bf6d-f1637ddc586f + + + diff --git a/graph/incidents_graphml/a/a0c1c570-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/a/a0c1c570-01c6-11ee-b478-9b612300fc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a09da861272b922175daf961db2155aba0e6706 --- /dev/null +++ b/graph/incidents_graphml/a/a0c1c570-01c6-11ee-b478-9b612300fc52.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.17 + 100.64.24.17 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.76.201 + 100.64.76.201 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685766310 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c1c570-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766310 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c1c570-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766310 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c1c570-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766310 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c1c570-01c6-11ee-b478-9b612300fc52 + + + diff --git a/graph/incidents_graphml/a/a0c872c0-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0c872c0-7a44-11ee-a612-0577b4410533.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca87dbf891de7f22ae59e8e45bc6e178379a49e3 --- /dev/null +++ b/graph/incidents_graphml/a/a0c872c0-7a44-11ee-a612-0577b4410533.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.105 + 100.64.8.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699014566 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a0c872c0-7a44-11ee-a612-0577b4410533 + + + diff --git a/graph/incidents_graphml/a/a0c9c8b0-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/a/a0c9c8b0-16e3-11ee-8363-57b2dccea5f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80e51a528307bf2921fa0a2a4450b0e656ea52ba --- /dev/null +++ b/graph/incidents_graphml/a/a0c9c8b0-16e3-11ee-8363-57b2dccea5f8.graphml @@ -0,0 +1,481 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.9 + 100.64.34.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.10 + 100.64.34.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.179 + 100.64.15.179 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.11 + 100.64.34.11 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.12 + 100.64.34.12 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.13 + 100.64.34.13 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.180 + 100.64.8.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.230 + 100.64.10.230 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.73 + 100.64.27.73 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.14 + 100.64.34.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.15 + 100.64.34.15 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087740 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0c9c8b0-16e3-11ee-8363-57b2dccea5f8 + + + diff --git a/graph/incidents_graphml/a/a0cc50c0-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a0cc50c0-3ea3-11ee-a794-3d0dc768f48a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89b8a9c8293e009f0e45ae58a95fbde7fe44f8e8 --- /dev/null +++ b/graph/incidents_graphml/a/a0cc50c0-3ea3-11ee-a794-3d0dc768f48a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.210 + 100.64.9.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692458299 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0cc50c0-3ea3-11ee-a794-3d0dc768f48a + + + diff --git a/graph/incidents_graphml/a/a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/a/a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ae5d265314f3c50028932f30fad280f7aa3263c --- /dev/null +++ b/graph/incidents_graphml/a/a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.12 + 100.64.80.12 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.25 + HOST-13452 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.13 + 100.64.80.13 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686806981 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38 + + + INCIDENT_LINK + 1686806981 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38 + + + INCIDENT_LINK + 1686806981 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38 + + + INCIDENT_LINK + 1686806981 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38 + + + diff --git a/graph/incidents_graphml/a/a0d80320-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0d80320-7a44-11ee-a612-0577b4410533.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c38b9ba5b92e4c9de8473112a2baaebf304dc30 --- /dev/null +++ b/graph/incidents_graphml/a/a0d80320-7a44-11ee-a612-0577b4410533.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.105 + 100.64.8.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699014567 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a0d80320-7a44-11ee-a612-0577b4410533 + + + diff --git a/graph/incidents_graphml/a/a0ddb5e0-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a0ddb5e0-3ea3-11ee-a794-3d0dc768f48a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40deda45f264d1829f0c0970a764f8d94fb56179 --- /dev/null +++ b/graph/incidents_graphml/a/a0ddb5e0-3ea3-11ee-a794-3d0dc768f48a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.210 + 100.64.9.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692458299 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0ddb5e0-3ea3-11ee-a794-3d0dc768f48a + + + diff --git a/graph/incidents_graphml/a/a0e32ef0-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/a/a0e32ef0-300f-11ee-bf6d-f1637ddc586f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78c0b67da4c186f01c597515a4fcbfc76f33feae --- /dev/null +++ b/graph/incidents_graphml/a/a0e32ef0-300f-11ee-bf6d-f1637ddc586f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.116 + 100.64.73.116 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690855417 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0e32ef0-300f-11ee-bf6d-f1637ddc586f + + + diff --git a/graph/incidents_graphml/a/a0e3cc60-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/a/a0e3cc60-01c6-11ee-b478-9b612300fc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a59f2968a4a8be49f7cc9adb75900b9a79525910 --- /dev/null +++ b/graph/incidents_graphml/a/a0e3cc60-01c6-11ee-b478-9b612300fc52.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.125 + 100.64.80.125 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.1.173 + 100.64.1.173 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.1.34 + 100.64.1.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Stealthwatch"] + + + HOST + 100.64.74.5 + 100.64.74.5 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.32.175 + 100.64.32.175 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685766311 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0e3cc60-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0e3cc60-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0e3cc60-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0e3cc60-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0e3cc60-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0e3cc60-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0e3cc60-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0e3cc60-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0e3cc60-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0e3cc60-01c6-11ee-b478-9b612300fc52 + + + diff --git a/graph/incidents_graphml/a/a0e5f770-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a0e5f770-6071-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37d01c4e2d9c5964e93f69818b226b03186e0b93 --- /dev/null +++ b/graph/incidents_graphml/a/a0e5f770-6071-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.225 + 100.64.57.225 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.221 + 100.64.74.221 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1668027666 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0e5f770-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027666 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0e5f770-6071-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/a/a0e6a890-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/a/a0e6a890-182d-11ee-88ad-19cfc5af29bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abb860fba6d4a42bf1567acc3e8ce289cf1bb4d9 --- /dev/null +++ b/graph/incidents_graphml/a/a0e6a890-182d-11ee-88ad-19cfc5af29bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.187 + 100.64.77.187 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.118 + 100.64.72.118 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688229474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0e6a890-182d-11ee-88ad-19cfc5af29bb + + + diff --git a/graph/incidents_graphml/a/a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/a/a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd60ae4eb632b22bbc79343cd64febd249ec8a9c --- /dev/null +++ b/graph/incidents_graphml/a/a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.14 + 100.64.80.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.37 + 100.64.76.37 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686806981 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38 + + + INCIDENT_LINK + 1686806981 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38 + + + diff --git a/graph/incidents_graphml/a/a0e94130-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0e94130-7a44-11ee-a612-0577b4410533.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6f9eff2c4318745663a8e2d4735655f4406743e --- /dev/null +++ b/graph/incidents_graphml/a/a0e94130-7a44-11ee-a612-0577b4410533.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.105 + 100.64.8.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699014567 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a0e94130-7a44-11ee-a612-0577b4410533 + + + diff --git a/graph/incidents_graphml/a/a0f18040-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a0f18040-6327-11ee-84e8-6f3a76e74a81.graphml new file mode 100644 index 0000000000000000000000000000000000000000..183e318c03f5f6de2b39444476864cc6aa0926bd --- /dev/null +++ b/graph/incidents_graphml/a/a0f18040-6327-11ee-84e8-6f3a76e74a81.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.122 + 100.64.12.122 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696473235 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0f18040-6327-11ee-84e8-6f3a76e74a81 + + + diff --git a/graph/incidents_graphml/a/a0f18c00-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a0f18c00-3ea3-11ee-a794-3d0dc768f48a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f305b6cc4e34a4b489fdc20713328abf37ad45b --- /dev/null +++ b/graph/incidents_graphml/a/a0f18c00-3ea3-11ee-a794-3d0dc768f48a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.152 + 100.64.7.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692458299 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0f18c00-3ea3-11ee-a794-3d0dc768f48a + + + diff --git a/graph/incidents_graphml/a/a0f76860-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/a/a0f76860-16e3-11ee-8363-57b2dccea5f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ca8fbacde58acecb9ab0be6aecdf41c0144b943 --- /dev/null +++ b/graph/incidents_graphml/a/a0f76860-16e3-11ee-8363-57b2dccea5f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.9 + 100.64.34.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688087741 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a0f76860-16e3-11ee-8363-57b2dccea5f8 + + + diff --git a/graph/incidents_graphml/a/a103db80-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a103db80-3ea3-11ee-a794-3d0dc768f48a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c54a8d0dbff74f87ce361469498e58eee4132b87 --- /dev/null +++ b/graph/incidents_graphml/a/a103db80-3ea3-11ee-a794-3d0dc768f48a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.152 + 100.64.7.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692458299 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a103db80-3ea3-11ee-a794-3d0dc768f48a + + + diff --git a/graph/incidents_graphml/a/a1042510-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/a/a1042510-df82-11ee-8f11-296badf765d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0bc52138f1873e2a4877096036845f75a80513e7 --- /dev/null +++ b/graph/incidents_graphml/a/a1042510-df82-11ee-8f11-296badf765d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.74 + 100.64.14.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710146263 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1042510-df82-11ee-8f11-296badf765d8 + + + diff --git a/graph/incidents_graphml/a/a1070bd0-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/a/a1070bd0-01c6-11ee-b478-9b612300fc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54749c7926775422b07291cc0bd92b3cd3a1888d --- /dev/null +++ b/graph/incidents_graphml/a/a1070bd0-01c6-11ee-b478-9b612300fc52.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.120 + 100.64.46.120 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.74.20 + 100.64.74.20 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.80.22 + 100.64.80.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.73.58 + 100.64.73.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685766311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1070bd0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1070bd0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1070bd0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1070bd0-01c6-11ee-b478-9b612300fc52 + + + diff --git a/graph/incidents_graphml/a/a1105050-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/a/a1105050-9fd7-11ee-a827-c14dee966e17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b31e4f9079425f1f17930150089da257e9324db6 --- /dev/null +++ b/graph/incidents_graphml/a/a1105050-9fd7-11ee-a827-c14dee966e17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.240 + USER-0015-1481.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703145896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1105050-9fd7-11ee-a827-c14dee966e17 + + + diff --git a/graph/incidents_graphml/a/a113f810-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/a/a113f810-120d-11ef-818b-4176151696b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20b733ebb65fefe51eed4464a76cbf9e90d80a0e --- /dev/null +++ b/graph/incidents_graphml/a/a113f810-120d-11ef-818b-4176151696b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.137 + 100.64.10.137 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715703521 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a113f810-120d-11ef-818b-4176151696b3 + + + diff --git a/graph/incidents_graphml/a/a1190ca0-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/a/a1190ca0-df82-11ee-8f11-296badf765d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3737d31bd154efb67137452c4881aeee8bdc3d6c --- /dev/null +++ b/graph/incidents_graphml/a/a1190ca0-df82-11ee-8f11-296badf765d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.74 + 100.64.14.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710146263 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1190ca0-df82-11ee-8f11-296badf765d8 + + + diff --git a/graph/incidents_graphml/a/a11f6c60-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a11f6c60-7a44-11ee-a612-0577b4410533.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dae5882735c9192276f44f5b10ed0c47da282714 --- /dev/null +++ b/graph/incidents_graphml/a/a11f6c60-7a44-11ee-a612-0577b4410533.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.105 + 100.64.8.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699014567 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a11f6c60-7a44-11ee-a612-0577b4410533 + + + diff --git a/graph/incidents_graphml/a/a1202ed0-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/a/a1202ed0-9fd7-11ee-a827-c14dee966e17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..502ed49000d1cce32ec8b424484c0a44374821d8 --- /dev/null +++ b/graph/incidents_graphml/a/a1202ed0-9fd7-11ee-a827-c14dee966e17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.240 + USER-0015-1481.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703145896 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1202ed0-9fd7-11ee-a827-c14dee966e17 + + + diff --git a/graph/incidents_graphml/a/a13104f0-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a13104f0-9003-11ee-97ac-71b8150df801.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ecea5942422e49f43ca37181f5e847920e3707e3 --- /dev/null +++ b/graph/incidents_graphml/a/a13104f0-9003-11ee-97ac-71b8150df801.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.128 + 100.64.48.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701405575 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a13104f0-9003-11ee-97ac-71b8150df801 + + + diff --git a/graph/incidents_graphml/a/a131b240-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/a/a131b240-16e3-11ee-8363-57b2dccea5f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17bdeed745e35970651aa92817b39af1ec302d6d --- /dev/null +++ b/graph/incidents_graphml/a/a131b240-16e3-11ee-8363-57b2dccea5f8.graphml @@ -0,0 +1,409 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.9 + 100.64.34.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.36 + 100.64.30.36 + ["Exploiting Host","Exploiting Target"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.228 + 100.64.12.228 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.23 + 100.64.34.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.24 + 100.64.34.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.25 + 100.64.34.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.26 + 100.64.34.26 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.27 + 100.64.34.27 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.28 + USER-0015-1300.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + INCIDENT_LINK + 1688087741 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a131b240-16e3-11ee-8363-57b2dccea5f8 + + + diff --git a/graph/incidents_graphml/a/a132cab0-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/a/a132cab0-120d-11ef-818b-4176151696b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33b1599d056a915047a5c247e51c48b8e19ae431 --- /dev/null +++ b/graph/incidents_graphml/a/a132cab0-120d-11ef-818b-4176151696b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.139 + 100.64.10.139 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715703522 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a132cab0-120d-11ef-818b-4176151696b3 + + + diff --git a/graph/incidents_graphml/a/a13ec090-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a13ec090-9003-11ee-97ac-71b8150df801.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9bf20e5aa39af8e10e9b17ea55574ac13d203e33 --- /dev/null +++ b/graph/incidents_graphml/a/a13ec090-9003-11ee-97ac-71b8150df801.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.128 + 100.64.48.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701405576 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a13ec090-9003-11ee-97ac-71b8150df801 + + + diff --git a/graph/incidents_graphml/a/a142cfa0-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/a/a142cfa0-84c8-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80cce8d66c494adc764b85737991447da6a57f21 --- /dev/null +++ b/graph/incidents_graphml/a/a142cfa0-84c8-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,713 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.9 + 100.64.55.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.12 + 100.64.55.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.91 + 100.64.18.91 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.111 + 100.64.5.111 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.13 + 100.64.55.13 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.14 + 100.64.55.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.253 + 100.64.47.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.106 + 100.64.2.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.212 + 100.64.22.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.37 + 100.64.54.37 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.84 + 100.64.13.84 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.62 + 100.64.24.62 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.81 + 100.64.48.81 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.15 + 100.64.55.15 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.16 + 100.64.55.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.17 + 100.64.55.17 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.18 + 100.64.55.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.70 + 100.64.37.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.248 + 100.64.17.248 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.124 + USER-0015-1334.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700170772 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a142cfa0-84c8-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/a/a143e1b0-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/a/a143e1b0-120d-11ef-818b-4176151696b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16ef44c0b7f71404d0128c90758aedb03955c558 --- /dev/null +++ b/graph/incidents_graphml/a/a143e1b0-120d-11ef-818b-4176151696b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.139 + 100.64.10.139 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715703522 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a143e1b0-120d-11ef-818b-4176151696b3 + + + diff --git a/graph/incidents_graphml/a/a1471790-ed79-11ed-a662-a9c0e7c292a4.graphml b/graph/incidents_graphml/a/a1471790-ed79-11ed-a662-a9c0e7c292a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..538b43a0b520f032fb7912e80a71b61701107f03 --- /dev/null +++ b/graph/incidents_graphml/a/a1471790-ed79-11ed-a662-a9c0e7c292a4.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.189 + 100.64.68.189 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.190 + 100.64.68.190 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1683534217 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1471790-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534217 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1471790-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534217 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1471790-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534217 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1471790-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534217 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1471790-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534217 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1471790-ed79-11ed-a662-a9c0e7c292a4 + + + diff --git a/graph/incidents_graphml/a/a14748a0-ab79-11ee-a1cb-599f1b15ded5.graphml b/graph/incidents_graphml/a/a14748a0-ab79-11ee-a1cb-599f1b15ded5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a936245da4bac8e02154eaef932b18642c06917c --- /dev/null +++ b/graph/incidents_graphml/a/a14748a0-ab79-11ee-a1cb-599f1b15ded5.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.238 + 100.64.49.238 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.4 + 100.64.30.4 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.239 + 100.64.49.239 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.240 + 100.64.49.240 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.141 + 100.64.35.141 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.241 + 100.64.49.241 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424938 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14748a0-ab79-11ee-a1cb-599f1b15ded5 + + + diff --git a/graph/incidents_graphml/a/a14de270-47db-11ee-b496-6fe4711b3325.graphml b/graph/incidents_graphml/a/a14de270-47db-11ee-b496-6fe4711b3325.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99a892efa3cf0368037fb30b66d43897dede842b --- /dev/null +++ b/graph/incidents_graphml/a/a14de270-47db-11ee-b496-6fe4711b3325.graphml @@ -0,0 +1,753 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.21 + 100.64.39.21 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.247 + 100.64.51.247 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.22 + 100.64.18.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.2 + 100.64.31.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.97 + 100.64.38.97 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.248 + 100.64.51.248 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.249 + 100.64.51.249 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.227 + 100.64.40.227 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.250 + 100.64.51.250 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.76 + 100.64.37.76 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.181 + 100.64.31.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.14 + 100.64.5.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.251 + 100.64.51.251 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.252 + USER-0015-1394.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.32 + 100.64.27.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471912 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a14de270-47db-11ee-b496-6fe4711b3325 + + + diff --git a/graph/incidents_graphml/a/a152ee70-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/a/a152ee70-216e-11ee-9e0b-8dcc0a578b7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..731b3a30684ba677ef1b41730f1b2853eb8ed452 --- /dev/null +++ b/graph/incidents_graphml/a/a152ee70-216e-11ee-9e0b-8dcc0a578b7b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.191 + 100.64.77.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.4 + 100.64.72.4 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689246953 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a152ee70-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246953 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a152ee70-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246953 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a152ee70-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246953 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a152ee70-216e-11ee-9e0b-8dcc0a578b7b + + + diff --git a/graph/incidents_graphml/a/a1560980-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/a/a1560980-84c8-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa71e6fce5c56a072d5dc3966b9a81370b092d6a --- /dev/null +++ b/graph/incidents_graphml/a/a1560980-84c8-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.26 + 100.64.7.26 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700170773 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1560980-84c8-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/a/a15ac510-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/a/a15ac510-120d-11ef-818b-4176151696b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d44e7a7f61be3a5865f433958e6cc1ef5ea84140 --- /dev/null +++ b/graph/incidents_graphml/a/a15ac510-120d-11ef-818b-4176151696b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.141 + 100.64.10.141 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715703522 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a15ac510-120d-11ef-818b-4176151696b3 + + + diff --git a/graph/incidents_graphml/a/a15fd1f0-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/a/a15fd1f0-22d3-11ef-b7cc-27d8681b231b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8122da2c612a271612f56ad4d1eae45245b862ac --- /dev/null +++ b/graph/incidents_graphml/a/a15fd1f0-22d3-11ef-b7cc-27d8681b231b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.54.100 + 172.21.54.100 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 10.107.124.222 + 10.107.124.222 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.161.212.239 + 10.161.212.239 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717547781 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a15fd1f0-22d3-11ef-b7cc-27d8681b231b + + + INCIDENT_LINK + 1717547781 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a15fd1f0-22d3-11ef-b7cc-27d8681b231b + + + INCIDENT_LINK + 1717547781 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a15fd1f0-22d3-11ef-b7cc-27d8681b231b + + + INCIDENT_LINK + 1717547781 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a15fd1f0-22d3-11ef-b7cc-27d8681b231b + + + diff --git a/graph/incidents_graphml/a/a1619ee0-9827-11ee-bcb2-fb3968bcff94.graphml b/graph/incidents_graphml/a/a1619ee0-9827-11ee-bcb2-fb3968bcff94.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ccbfa6e9acaec0252d068be587ef6f54eeba17f --- /dev/null +++ b/graph/incidents_graphml/a/a1619ee0-9827-11ee-bcb2-fb3968bcff94.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.66 + 100.64.18.66 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702300647 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a1619ee0-9827-11ee-bcb2-fb3968bcff94 + + + INCIDENT_LINK + 1702300647 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a1619ee0-9827-11ee-bcb2-fb3968bcff94 + + + diff --git a/graph/incidents_graphml/a/a1735fd0-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1735fd0-2ff5-11ee-90c1-6310e920c946.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eeaa0599f3418562f532815be9e6ce0cbd62be50 --- /dev/null +++ b/graph/incidents_graphml/a/a1735fd0-2ff5-11ee-90c1-6310e920c946.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.20 + 100.64.75.20 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690844251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1735fd0-2ff5-11ee-90c1-6310e920c946 + + + diff --git a/graph/incidents_graphml/a/a17a7300-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a17a7300-65c6-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f52a0301b9a9cdbdcbe254e315883a494a430aa --- /dev/null +++ b/graph/incidents_graphml/a/a17a7300-65c6-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.148 + 100.64.81.148 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.250 + 100.64.70.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1668613930 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17a7300-65c6-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668613930 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17a7300-65c6-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/a/a17c20b0-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a17c20b0-65c6-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00ed31f58f6a56d1630b7fcb653dcd0eec2256a9 --- /dev/null +++ b/graph/incidents_graphml/a/a17c20b0-65c6-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.139 + 100.64.16.139 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.160 + 100.64.72.160 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1668613930 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a17c20b0-65c6-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668613930 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a17c20b0-65c6-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/a/a17fec60-0861-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/a/a17fec60-0861-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ed58c0e6433434008b903ce2c014a0e6aec5121 --- /dev/null +++ b/graph/incidents_graphml/a/a17fec60-0861-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.216 + 100.64.14.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.217 + 100.64.14.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.196 + 100.64.14.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.218 + 100.64.14.218 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.219 + 100.64.14.219 + ["Exploiting Target","Exploiting Host"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.220 + 100.64.14.220 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.221 + 100.64.14.221 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.222 + 100.64.14.222 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.223 + 100.64.14.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.77 + 100.64.3.77 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.224 + 100.64.14.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.225 + 100.64.14.225 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.226 + 100.64.14.226 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.227 + 100.64.14.227 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.228 + 100.64.14.228 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.229 + 100.64.14.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.230 + 100.64.14.230 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.252 + 100.64.9.252 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.231 + 100.64.14.231 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640088 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a17fec60-0861-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/a/a185af50-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a185af50-2ff5-11ee-90c1-6310e920c946.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5b0f6669da46e1409761d7645c976f73dfc09db --- /dev/null +++ b/graph/incidents_graphml/a/a185af50-2ff5-11ee-90c1-6310e920c946.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.20 + 100.64.75.20 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690844251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a185af50-2ff5-11ee-90c1-6310e920c946 + + + diff --git a/graph/incidents_graphml/a/a189e030-2c8a-11ed-be76-c750f0345c87.graphml b/graph/incidents_graphml/a/a189e030-2c8a-11ed-be76-c750f0345c87.graphml new file mode 100644 index 0000000000000000000000000000000000000000..392fbdf2c0d3950ec5dd350c095123ce7e54782b --- /dev/null +++ b/graph/incidents_graphml/a/a189e030-2c8a-11ed-be76-c750f0345c87.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.77 + 100.64.75.77 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662320944 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a189e030-2c8a-11ed-be76-c750f0345c87 + + + diff --git a/graph/incidents_graphml/a/a1906dd0-1ca6-11ee-8a30-871cf58c099a.graphml b/graph/incidents_graphml/a/a1906dd0-1ca6-11ee-8a30-871cf58c099a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6e60aa02053cfba3397abb443fcc5b8e412129c --- /dev/null +++ b/graph/incidents_graphml/a/a1906dd0-1ca6-11ee-8a30-871cf58c099a.graphml @@ -0,0 +1,689 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.132 + 100.64.54.132 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.208 + 100.64.11.208 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.133 + 100.64.54.133 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.152 + 100.64.28.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.255 + 100.64.20.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.134 + 100.64.54.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.212 + 100.64.30.212 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.135 + 100.64.54.135 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.136 + USER-0015-1405.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.137 + 100.64.54.137 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.138 + 100.64.54.138 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.217 + 100.64.5.217 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.146 + 100.64.8.146 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.163 + 100.64.7.163 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.139 + 100.64.54.139 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.140 + 100.64.54.140 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721249 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1906dd0-1ca6-11ee-8a30-871cf58c099a + + + diff --git a/graph/incidents_graphml/a/a19566c0-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a19566c0-2ff5-11ee-90c1-6310e920c946.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4aba3e4901ede14632b1377e129109709f384c29 --- /dev/null +++ b/graph/incidents_graphml/a/a19566c0-2ff5-11ee-90c1-6310e920c946.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.13 + 100.64.8.13 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690844252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a19566c0-2ff5-11ee-90c1-6310e920c946 + + + diff --git a/graph/incidents_graphml/a/a19c02c0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml b/graph/incidents_graphml/a/a19c02c0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbafa73f0ed69660cc0ad9b86354135658aca9a1 --- /dev/null +++ b/graph/incidents_graphml/a/a19c02c0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.218 + 100.64.81.218 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.181 + USER-0015-1903.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656543784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a19c02c0-f7ff-11ec-9c0d-cfd14a23bdb2 + + + INCIDENT_LINK + 1656543784 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a19c02c0-f7ff-11ec-9c0d-cfd14a23bdb2 + + + diff --git a/graph/incidents_graphml/a/a1a4ae50-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a1a4ae50-9003-11ee-97ac-71b8150df801.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df8879a6242ec40d653c6d7bb428e8be2928cb15 --- /dev/null +++ b/graph/incidents_graphml/a/a1a4ae50-9003-11ee-97ac-71b8150df801.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.139 + 100.64.45.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701405576 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1a4ae50-9003-11ee-97ac-71b8150df801 + + + diff --git a/graph/incidents_graphml/a/a1a60890-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1a60890-2ff5-11ee-90c1-6310e920c946.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af5f288147e2f76f46182da852d743a37759224d --- /dev/null +++ b/graph/incidents_graphml/a/a1a60890-2ff5-11ee-90c1-6310e920c946.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.8.13 + 100.64.8.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690844252 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1a60890-2ff5-11ee-90c1-6310e920c946 + + + diff --git a/graph/incidents_graphml/a/a1b59e40-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a1b59e40-9003-11ee-97ac-71b8150df801.graphml new file mode 100644 index 0000000000000000000000000000000000000000..618677b9e1eb8bced99fb120c5e5536b9a69f62f --- /dev/null +++ b/graph/incidents_graphml/a/a1b59e40-9003-11ee-97ac-71b8150df801.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.139 + 100.64.45.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701405576 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a1b59e40-9003-11ee-97ac-71b8150df801 + + + diff --git a/graph/incidents_graphml/a/a1b91b60-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1b91b60-2ff5-11ee-90c1-6310e920c946.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99a6857f4b32819155be8756ca736f62f9a8c3ca --- /dev/null +++ b/graph/incidents_graphml/a/a1b91b60-2ff5-11ee-90c1-6310e920c946.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.106 + 100.64.76.106 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690844252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1b91b60-2ff5-11ee-90c1-6310e920c946 + + + diff --git a/graph/incidents_graphml/a/a1be9bd0-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/a/a1be9bd0-1c7c-11ee-9c01-8b4657fad9e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61d5594e9f0f8b2b56179134ea3d2f5f2e03f79c --- /dev/null +++ b/graph/incidents_graphml/a/a1be9bd0-1c7c-11ee-9c01-8b4657fad9e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688703211 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1be9bd0-1c7c-11ee-9c01-8b4657fad9e1 + + + diff --git a/graph/incidents_graphml/a/a1bfeb90-35bb-11ee-95a2-5f9786093780.graphml b/graph/incidents_graphml/a/a1bfeb90-35bb-11ee-95a2-5f9786093780.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ccb8a8dbc7657ab94a1558dd2e69e92896170f0 --- /dev/null +++ b/graph/incidents_graphml/a/a1bfeb90-35bb-11ee-95a2-5f9786093780.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.64.255.24 + 10.64.255.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 10.133.95.85 + 10.133.95.85 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1691479048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1bfeb90-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1bfeb90-35bb-11ee-95a2-5f9786093780 + + + diff --git a/graph/incidents_graphml/a/a1c50790-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a1c50790-9003-11ee-97ac-71b8150df801.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a17990f5d94141d49f03fcf6359578a3a055021 --- /dev/null +++ b/graph/incidents_graphml/a/a1c50790-9003-11ee-97ac-71b8150df801.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.203 + 100.64.26.203 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701405576 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1c50790-9003-11ee-97ac-71b8150df801 + + + diff --git a/graph/incidents_graphml/a/a1c6e510-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a1c6e510-50c5-11ee-8e23-918003f7627a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9bb3e439c8d4c847d83e4efd0db84563bc4f8b68 --- /dev/null +++ b/graph/incidents_graphml/a/a1c6e510-50c5-11ee-8e23-918003f7627a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.135 + 100.64.23.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1c6e510-50c5-11ee-8e23-918003f7627a + + + diff --git a/graph/incidents_graphml/a/a1c7e870-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1c7e870-2ff5-11ee-90c1-6310e920c946.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bb7c688211db9591c988c82c9e851cb92660528 --- /dev/null +++ b/graph/incidents_graphml/a/a1c7e870-2ff5-11ee-90c1-6310e920c946.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.106 + 100.64.76.106 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690844252 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1c7e870-2ff5-11ee-90c1-6310e920c946 + + + diff --git a/graph/incidents_graphml/a/a1c86280-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a1c86280-7813-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8145477ca591f1cdeaf11f58ade59371d2161fbc --- /dev/null +++ b/graph/incidents_graphml/a/a1c86280-7813-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.146 + 100.64.35.146 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698773620 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1c86280-7813-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/a/a1c88df0-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/a/a1c88df0-2a11-11ee-ab73-f1f4f0adc079.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a59ea9fbb4a89622d9679ba80394e87db5104556 --- /dev/null +++ b/graph/incidents_graphml/a/a1c88df0-2a11-11ee-ab73-f1f4f0adc079.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.215 + 100.64.30.215 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.137 + 100.64.72.137 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.28.46 + 100.64.28.46 + ["Exploiting Host"] + 0.578125 + ["Meraki","Precinct"] + + + HOST + 100.64.82.125 + 100.64.82.125 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.55 + 100.64.82.55 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690196571 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1c88df0-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196571 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1c88df0-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196571 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1c88df0-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196571 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1c88df0-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196571 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1c88df0-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196571 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1c88df0-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196571 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1c88df0-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196571 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1c88df0-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196571 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1c88df0-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196571 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1c88df0-2a11-11ee-ab73-f1f4f0adc079 + + + diff --git a/graph/incidents_graphml/a/a1ce0950-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a1ce0950-3ea3-11ee-a794-3d0dc768f48a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..def7fb328bf7950bc2a0bdd1e452c59055cd3ee4 --- /dev/null +++ b/graph/incidents_graphml/a/a1ce0950-3ea3-11ee-a794-3d0dc768f48a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.212 + 100.64.9.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692458301 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1ce0950-3ea3-11ee-a794-3d0dc768f48a + + + diff --git a/graph/incidents_graphml/a/a1d42b80-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a1d42b80-50c5-11ee-8e23-918003f7627a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1fd328ec3f6289ebdbd6910730bed71c95525e9e --- /dev/null +++ b/graph/incidents_graphml/a/a1d42b80-50c5-11ee-8e23-918003f7627a.graphml @@ -0,0 +1,339 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.137 + 100.64.23.137 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.202 + 100.64.10.202 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.138 + 100.64.23.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.99 + 100.64.11.99 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.139 + 100.64.23.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.140 + 100.64.23.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.141 + 100.64.23.141 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452024 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d42b80-50c5-11ee-8e23-918003f7627a + + + diff --git a/graph/incidents_graphml/a/a1d61e20-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a1d61e20-7813-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0ba196e06c179ef5c9e8557bb0e184d04dee7f1 --- /dev/null +++ b/graph/incidents_graphml/a/a1d61e20-7813-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.85 + 100.64.38.85 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698773621 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1d61e20-7813-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/a/a1d690a0-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/a/a1d690a0-1c7c-11ee-9c01-8b4657fad9e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..662138a80233688721e7e92f2e2209ff896d0109 --- /dev/null +++ b/graph/incidents_graphml/a/a1d690a0-1c7c-11ee-9c01-8b4657fad9e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688703211 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1d690a0-1c7c-11ee-9c01-8b4657fad9e1 + + + diff --git a/graph/incidents_graphml/a/a1dd9350-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1dd9350-2ff5-11ee-90c1-6310e920c946.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c6b5e6cb5688e42236914c629d2066a98ed7954 --- /dev/null +++ b/graph/incidents_graphml/a/a1dd9350-2ff5-11ee-90c1-6310e920c946.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.241 + 100.64.77.241 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690844252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1dd9350-2ff5-11ee-90c1-6310e920c946 + + + diff --git a/graph/incidents_graphml/a/a1deafc0-212f-11ef-98de-f5bd3e11f54f.graphml b/graph/incidents_graphml/a/a1deafc0-212f-11ef-98de-f5bd3e11f54f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e2d9a5e6163c65011afbc19a3355c8898b53510 --- /dev/null +++ b/graph/incidents_graphml/a/a1deafc0-212f-11ef-98de-f5bd3e11f54f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.226 + 100.64.41.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717367393 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1deafc0-212f-11ef-98de-f5bd3e11f54f + + + diff --git a/graph/incidents_graphml/a/a1e56060-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a1e56060-7813-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0796de61998f4eb84dfc743170a19995c18586a --- /dev/null +++ b/graph/incidents_graphml/a/a1e56060-7813-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.85 + 100.64.38.85 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698773621 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1e56060-7813-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/a/a1e58e30-25bc-11ef-8084-11f20777a6f9.graphml b/graph/incidents_graphml/a/a1e58e30-25bc-11ef-8084-11f20777a6f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ed8b810e9deef733d86c863b3fa72f772e5f80f --- /dev/null +++ b/graph/incidents_graphml/a/a1e58e30-25bc-11ef-8084-11f20777a6f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.74 + 100.64.16.74 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717867757 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a1e58e30-25bc-11ef-8084-11f20777a6f9 + + + diff --git a/graph/incidents_graphml/a/a1e85b20-35bb-11ee-95a2-5f9786093780.graphml b/graph/incidents_graphml/a/a1e85b20-35bb-11ee-95a2-5f9786093780.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64a630067747abb5fa2943147eafcf471ec5bdae --- /dev/null +++ b/graph/incidents_graphml/a/a1e85b20-35bb-11ee-95a2-5f9786093780.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.146 + 100.64.80.146 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.237 + 100.64.71.237 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.6 + 100.64.77.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.34.250 + 100.64.34.250 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.128 + 100.64.71.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.234 + 100.64.71.234 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.147 + 100.64.80.147 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1e85b20-35bb-11ee-95a2-5f9786093780 + + + diff --git a/graph/incidents_graphml/a/a1eb7600-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1eb7600-2ff5-11ee-90c1-6310e920c946.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85787a491130e1e23b1c90ad2fca482b9ea4ebc4 --- /dev/null +++ b/graph/incidents_graphml/a/a1eb7600-2ff5-11ee-90c1-6310e920c946.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.241 + 100.64.77.241 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690844252 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1eb7600-2ff5-11ee-90c1-6310e920c946 + + + diff --git a/graph/incidents_graphml/a/a1ebb9e0-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/a/a1ebb9e0-5812-11ee-83e4-f12d78181e73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdf14e82d49a3b890f63ae1929b15ef7a375f8f5 --- /dev/null +++ b/graph/incidents_graphml/a/a1ebb9e0-5812-11ee-83e4-f12d78181e73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.70 + 100.64.13.70 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1695254754 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1ebb9e0-5812-11ee-83e4-f12d78181e73 + + + diff --git a/graph/incidents_graphml/a/a1ee5e60-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/a/a1ee5e60-1c7c-11ee-9c01-8b4657fad9e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26e7858b35aa36d0e90a56299acc0fad5f1cb5e5 --- /dev/null +++ b/graph/incidents_graphml/a/a1ee5e60-1c7c-11ee-9c01-8b4657fad9e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688703211 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a1ee5e60-1c7c-11ee-9c01-8b4657fad9e1 + + + diff --git a/graph/incidents_graphml/a/a1ee7900-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/a/a1ee7900-5812-11ee-83e4-f12d78181e73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79bffee3705d5806111758ab97cdcb12b6f2c733 --- /dev/null +++ b/graph/incidents_graphml/a/a1ee7900-5812-11ee-83e4-f12d78181e73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.13.70 + 100.64.13.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695254754 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1ee7900-5812-11ee-83e4-f12d78181e73 + + + diff --git a/graph/incidents_graphml/a/a1f03bf0-212f-11ef-98de-f5bd3e11f54f.graphml b/graph/incidents_graphml/a/a1f03bf0-212f-11ef-98de-f5bd3e11f54f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5daba54a5017fdf7ac991772c51bb62a1d65e315 --- /dev/null +++ b/graph/incidents_graphml/a/a1f03bf0-212f-11ef-98de-f5bd3e11f54f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.226 + 100.64.41.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717367393 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a1f03bf0-212f-11ef-98de-f5bd3e11f54f + + + diff --git a/graph/incidents_graphml/a/a1fab840-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1fab840-2ff5-11ee-90c1-6310e920c946.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1dd242889cb98613adaddb50c697ad45593a42a9 --- /dev/null +++ b/graph/incidents_graphml/a/a1fab840-2ff5-11ee-90c1-6310e920c946.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.159 + USER-0015-1787.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690844252 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a1fab840-2ff5-11ee-90c1-6310e920c946 + + + diff --git a/graph/incidents_graphml/a/a20ae930-1173-11ef-98dd-db867c05f09b.graphml b/graph/incidents_graphml/a/a20ae930-1173-11ef-98dd-db867c05f09b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4992f8648985606ac1433b7d594a4bdaacfbf17d --- /dev/null +++ b/graph/incidents_graphml/a/a20ae930-1173-11ef-98dd-db867c05f09b.graphml @@ -0,0 +1,177 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.244 + 100.64.86.244 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.46.208 + 172.16.46.208 + ["Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.53 + 100.64.97.53 + ["Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715637381 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a20ae930-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637381 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a20ae930-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637381 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a20ae930-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637381 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a20ae930-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637381 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a20ae930-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637381 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a20ae930-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637381 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a20ae930-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637381 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a20ae930-1173-11ef-98dd-db867c05f09b + + + diff --git a/graph/incidents_graphml/a/a20c6b80-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a20c6b80-2ff5-11ee-90c1-6310e920c946.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d8a91f4c68f8a9d908638a4efd3b9eb0b9fca4b --- /dev/null +++ b/graph/incidents_graphml/a/a20c6b80-2ff5-11ee-90c1-6310e920c946.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.159 + USER-0015-1787.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690844252 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a20c6b80-2ff5-11ee-90c1-6310e920c946 + + + diff --git a/graph/incidents_graphml/a/a20ce1e0-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/a/a20ce1e0-300f-11ee-bf6d-f1637ddc586f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09724dd83c1b7d4344dde2a869ff99e21e9ac2d8 --- /dev/null +++ b/graph/incidents_graphml/a/a20ce1e0-300f-11ee-bf6d-f1637ddc586f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.245 + 100.64.77.245 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690855419 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a20ce1e0-300f-11ee-bf6d-f1637ddc586f + + + diff --git a/graph/incidents_graphml/a/a21efdf0-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a21efdf0-5277-11ee-99e4-0dae236ad26e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2005e1c5e9faa80cc3cda049e68bb0621e180d7d --- /dev/null +++ b/graph/incidents_graphml/a/a21efdf0-5277-11ee-99e4-0dae236ad26e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.192 + 100.64.24.192 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694638427 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a21efdf0-5277-11ee-99e4-0dae236ad26e + + + diff --git a/graph/incidents_graphml/a/a23132c0-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/a/a23132c0-300f-11ee-bf6d-f1637ddc586f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af98bac0885ed4def3a6d8130e4b9c352b858dbf --- /dev/null +++ b/graph/incidents_graphml/a/a23132c0-300f-11ee-bf6d-f1637ddc586f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.245 + 100.64.77.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690855420 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a23132c0-300f-11ee-bf6d-f1637ddc586f + + + diff --git a/graph/incidents_graphml/a/a231d0a0-089f-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/a/a231d0a0-089f-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfdabe0e68a65c4d9ee35923ecfa564e9d95e3eb --- /dev/null +++ b/graph/incidents_graphml/a/a231d0a0-089f-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.67 + 100.64.27.67 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686519221 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a231d0a0-089f-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/a/a232c640-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a232c640-50c5-11ee-8e23-918003f7627a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed19e38ed6d1d868de9d64e8a4c3bc43b7c7bbe9 --- /dev/null +++ b/graph/incidents_graphml/a/a232c640-50c5-11ee-8e23-918003f7627a.graphml @@ -0,0 +1,173 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.147 + 100.64.23.147 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694452025 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a232c640-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452025 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a232c640-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452025 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a232c640-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452025 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a232c640-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452025 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a232c640-50c5-11ee-8e23-918003f7627a + + + INCIDENT_LINK + 1694452025 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a232c640-50c5-11ee-8e23-918003f7627a + + + diff --git a/graph/incidents_graphml/a/a2378f00-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a2378f00-5277-11ee-99e4-0dae236ad26e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae3ba1bc46dc22b59e9f3940063d16d3a6da0418 --- /dev/null +++ b/graph/incidents_graphml/a/a2378f00-5277-11ee-99e4-0dae236ad26e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.192 + 100.64.24.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694638427 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2378f00-5277-11ee-99e4-0dae236ad26e + + + diff --git a/graph/incidents_graphml/a/a23e1cc0-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/a/a23e1cc0-0fde-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a900a7ff70fb6c3e4160d562cb5386d81b8a55df --- /dev/null +++ b/graph/incidents_graphml/a/a23e1cc0-0fde-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.133 + 100.64.27.133 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687315937 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a23e1cc0-0fde-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/a/a2411de0-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a2411de0-dc8d-11ee-bb7b-7127cbf2c01f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66ace76f1f296b54b6d3f5d1f1a74c9d9e42768c --- /dev/null +++ b/graph/incidents_graphml/a/a2411de0-dc8d-11ee-bb7b-7127cbf2c01f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.247 + 100.64.23.247 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709821136 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2411de0-dc8d-11ee-bb7b-7127cbf2c01f + + + INCIDENT_LINK + 1709821136 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2411de0-dc8d-11ee-bb7b-7127cbf2c01f + + + diff --git a/graph/incidents_graphml/a/a24bc140-089f-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/a/a24bc140-089f-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd1ad5f740ef5543b160a6affa9413ecb9952947 --- /dev/null +++ b/graph/incidents_graphml/a/a24bc140-089f-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.69 + 100.64.27.69 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686519221 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a24bc140-089f-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/a/a24dc850-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a24dc850-50c5-11ee-8e23-918003f7627a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a327f0b8fff576716909b8edfcd6656def614b2 --- /dev/null +++ b/graph/incidents_graphml/a/a24dc850-50c5-11ee-8e23-918003f7627a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.149 + 100.64.23.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694452025 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a24dc850-50c5-11ee-8e23-918003f7627a + + + diff --git a/graph/incidents_graphml/a/a255a5b0-2bbd-11ef-b37a-07248b6407de.graphml b/graph/incidents_graphml/a/a255a5b0-2bbd-11ef-b37a-07248b6407de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c441144633630595481eca5ed7f59e637e614522 --- /dev/null +++ b/graph/incidents_graphml/a/a255a5b0-2bbd-11ef-b37a-07248b6407de.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.252 + 100.64.23.252 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.96 + 100.64.24.96 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.97 + 100.64.24.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718527894 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a255a5b0-2bbd-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527894 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a255a5b0-2bbd-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527894 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a255a5b0-2bbd-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527894 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a255a5b0-2bbd-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527894 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a255a5b0-2bbd-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527894 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a255a5b0-2bbd-11ef-b37a-07248b6407de + + + diff --git a/graph/incidents_graphml/a/a2570df0-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a2570df0-7813-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7886547f5ade7340f8446d637836096d64c3605b --- /dev/null +++ b/graph/incidents_graphml/a/a2570df0-7813-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.119 + 100.64.11.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698773621 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2570df0-7813-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/a/a2589640-a070-11ee-8eba-81c30328b488.graphml b/graph/incidents_graphml/a/a2589640-a070-11ee-8eba-81c30328b488.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c6bdcf09f5f2b6658aa1c8643ae4ebef2115b1ed --- /dev/null +++ b/graph/incidents_graphml/a/a2589640-a070-11ee-8eba-81c30328b488.graphml @@ -0,0 +1,243 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.245 + 100.64.5.245 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.226 + 100.64.48.226 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.143 + 100.64.53.143 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.144 + 100.64.53.144 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.145 + 100.64.53.145 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703211611 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2589640-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211611 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2589640-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211611 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2589640-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211611 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2589640-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211611 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2589640-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211611 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2589640-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211611 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2589640-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211611 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2589640-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211611 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2589640-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211611 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2589640-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211611 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2589640-a070-11ee-8eba-81c30328b488 + + + diff --git a/graph/incidents_graphml/a/a25b35d0-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a25b35d0-50c5-11ee-8e23-918003f7627a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdd72aee7ecda53ad4a3cdc8a22c77861c1ae385 --- /dev/null +++ b/graph/incidents_graphml/a/a25b35d0-50c5-11ee-8e23-918003f7627a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.149 + 100.64.23.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694452025 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a25b35d0-50c5-11ee-8e23-918003f7627a + + + diff --git a/graph/incidents_graphml/a/a2608af0-47db-11ee-b496-6fe4711b3325.graphml b/graph/incidents_graphml/a/a2608af0-47db-11ee-b496-6fe4711b3325.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ed986b7c7e653f59eadf14dbfe78861f727b5ba --- /dev/null +++ b/graph/incidents_graphml/a/a2608af0-47db-11ee-b496-6fe4711b3325.graphml @@ -0,0 +1,531 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.3 + 100.64.52.3 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.182 + 100.64.47.182 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.121 + 100.64.21.121 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.5 + 100.64.17.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.4 + USER-0015-1395.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.5 + 100.64.52.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.255 + 100.64.26.255 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.68 + 100.64.32.68 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.6 + 100.64.52.6 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.134 + 100.64.33.134 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.7 + 100.64.52.7 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.8 + 100.64.52.8 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.9 + 100.64.52.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471914 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2608af0-47db-11ee-b496-6fe4711b3325 + + + diff --git a/graph/incidents_graphml/a/a2666110-9ff0-11ee-b969-fd26b2eb008b.graphml b/graph/incidents_graphml/a/a2666110-9ff0-11ee-b969-fd26b2eb008b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec3a72ad840b111ea0d4afa2117cad2ec7b12b37 --- /dev/null +++ b/graph/incidents_graphml/a/a2666110-9ff0-11ee-b969-fd26b2eb008b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.102 + 100.64.16.102 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703156636 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2666110-9ff0-11ee-b969-fd26b2eb008b + + + diff --git a/graph/incidents_graphml/a/a2669e50-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a2669e50-7813-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99a5e56448b369656fe89ae8f01a51be44683cf1 --- /dev/null +++ b/graph/incidents_graphml/a/a2669e50-7813-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.119 + 100.64.11.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698773622 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2669e50-7813-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/a/a26b1450-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a26b1450-50c5-11ee-8e23-918003f7627a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d94d731b596dbcad115d9939447ea6c60d1d222c --- /dev/null +++ b/graph/incidents_graphml/a/a26b1450-50c5-11ee-8e23-918003f7627a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.151 + 100.64.23.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694452025 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a26b1450-50c5-11ee-8e23-918003f7627a + + + diff --git a/graph/incidents_graphml/a/a27430d0-089f-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/a/a27430d0-089f-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b0e458c21ddd9ba57ac9b41ef6ef26af4bd583c --- /dev/null +++ b/graph/incidents_graphml/a/a27430d0-089f-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.71 + USER-0015-1263.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686519221 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a27430d0-089f-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/a/a2791e10-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a2791e10-50c5-11ee-8e23-918003f7627a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2b42a8de186b1f8f617993757b16c82b6959ec6 --- /dev/null +++ b/graph/incidents_graphml/a/a2791e10-50c5-11ee-8e23-918003f7627a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.151 + 100.64.23.151 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694452026 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2791e10-50c5-11ee-8e23-918003f7627a + + + diff --git a/graph/incidents_graphml/a/a27e3af0-3a24-11ef-898a-03f77eec545d.graphml b/graph/incidents_graphml/a/a27e3af0-3a24-11ef-898a-03f77eec545d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f7e5734c4e24c8c0278545cff4c28d01e9701ce --- /dev/null +++ b/graph/incidents_graphml/a/a27e3af0-3a24-11ef-898a-03f77eec545d.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.99 + 100.64.47.99 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.100 + 100.64.47.100 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.101 + 100.64.47.101 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720111449 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a27e3af0-3a24-11ef-898a-03f77eec545d + + + INCIDENT_LINK + 1720111449 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a27e3af0-3a24-11ef-898a-03f77eec545d + + + INCIDENT_LINK + 1720111449 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a27e3af0-3a24-11ef-898a-03f77eec545d + + + INCIDENT_LINK + 1720111449 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a27e3af0-3a24-11ef-898a-03f77eec545d + + + INCIDENT_LINK + 1720111449 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a27e3af0-3a24-11ef-898a-03f77eec545d + + + INCIDENT_LINK + 1720111449 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a27e3af0-3a24-11ef-898a-03f77eec545d + + + diff --git a/graph/incidents_graphml/a/a2855310-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a2855310-50c5-11ee-8e23-918003f7627a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35954552b6d50499da29226c8a008f39755c4196 --- /dev/null +++ b/graph/incidents_graphml/a/a2855310-50c5-11ee-8e23-918003f7627a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.153 + 100.64.23.153 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694452026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a2855310-50c5-11ee-8e23-918003f7627a + + + diff --git a/graph/incidents_graphml/a/a286daa0-ea9b-11ec-95db-b7dc1d72d813.graphml b/graph/incidents_graphml/a/a286daa0-ea9b-11ec-95db-b7dc1d72d813.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93523e9707224a016bec0cbfd47d765559149405 --- /dev/null +++ b/graph/incidents_graphml/a/a286daa0-ea9b-11ec-95db-b7dc1d72d813.graphml @@ -0,0 +1,267 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.18 + USER-0015-1940.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.234 + 100.64.71.234 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.6 + 100.64.77.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.211 + 100.64.72.211 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.170 + USER-0015-1679.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.161 + 100.64.72.161 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.220 + 100.64.71.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.83.19 + 100.64.83.19 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.92 + USER-0015-1614.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.83.20 + USER-0015-1941.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655071470 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a286daa0-ea9b-11ec-95db-b7dc1d72d813 + + + INCIDENT_LINK + 1655071470 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a286daa0-ea9b-11ec-95db-b7dc1d72d813 + + + INCIDENT_LINK + 1655071470 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a286daa0-ea9b-11ec-95db-b7dc1d72d813 + + + INCIDENT_LINK + 1655071470 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a286daa0-ea9b-11ec-95db-b7dc1d72d813 + + + INCIDENT_LINK + 1655071470 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a286daa0-ea9b-11ec-95db-b7dc1d72d813 + + + INCIDENT_LINK + 1655071470 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a286daa0-ea9b-11ec-95db-b7dc1d72d813 + + + INCIDENT_LINK + 1655071470 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a286daa0-ea9b-11ec-95db-b7dc1d72d813 + + + INCIDENT_LINK + 1655071470 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a286daa0-ea9b-11ec-95db-b7dc1d72d813 + + + INCIDENT_LINK + 1655071470 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a286daa0-ea9b-11ec-95db-b7dc1d72d813 + + + INCIDENT_LINK + 1655071470 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a286daa0-ea9b-11ec-95db-b7dc1d72d813 + + + INCIDENT_LINK + 1655071470 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a286daa0-ea9b-11ec-95db-b7dc1d72d813 + + + diff --git a/graph/incidents_graphml/a/a2885790-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a2885790-9003-11ee-97ac-71b8150df801.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77fe05ea9700b2084022fed0c099e63fd659cac5 --- /dev/null +++ b/graph/incidents_graphml/a/a2885790-9003-11ee-97ac-71b8150df801.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.176 + 100.64.31.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701405578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a2885790-9003-11ee-97ac-71b8150df801 + + + diff --git a/graph/incidents_graphml/a/a28a50e0-089f-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/a/a28a50e0-089f-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3398ce270058d57606da76dbd66cf8104c939c17 --- /dev/null +++ b/graph/incidents_graphml/a/a28a50e0-089f-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.71 + USER-0015-1263.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686519221 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a28a50e0-089f-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/a/a29533a0-1ca6-11ee-8a30-871cf58c099a.graphml b/graph/incidents_graphml/a/a29533a0-1ca6-11ee-8a30-871cf58c099a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9993c6a87a04e5ad2217899a088b8d740657473 --- /dev/null +++ b/graph/incidents_graphml/a/a29533a0-1ca6-11ee-8a30-871cf58c099a.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.65 + 100.64.48.65 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.59 + 100.64.17.59 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.37 + 100.64.52.37 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.18 + USER-0015-1406.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688721251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a29533a0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a29533a0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a29533a0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a29533a0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a29533a0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a29533a0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a29533a0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721251 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a29533a0-1ca6-11ee-8a30-871cf58c099a + + + diff --git a/graph/incidents_graphml/a/a29a58f0-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a29a58f0-9003-11ee-97ac-71b8150df801.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b99b3167074e8a7ead8e8c8494fe448a4d679a9b --- /dev/null +++ b/graph/incidents_graphml/a/a29a58f0-9003-11ee-97ac-71b8150df801.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.176 + 100.64.31.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701405578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a29a58f0-9003-11ee-97ac-71b8150df801 + + + diff --git a/graph/incidents_graphml/a/a2aa3770-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a2aa3770-9003-11ee-97ac-71b8150df801.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3baa795233992597d5eade7b4551b9c742d3bc3e --- /dev/null +++ b/graph/incidents_graphml/a/a2aa3770-9003-11ee-97ac-71b8150df801.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.89 + 100.64.37.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701405578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2aa3770-9003-11ee-97ac-71b8150df801 + + + diff --git a/graph/incidents_graphml/a/a2b66c70-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a2b66c70-9003-11ee-97ac-71b8150df801.graphml new file mode 100644 index 0000000000000000000000000000000000000000..842c0dae07dc20fd8d2089b5b29e8256c635a6a9 --- /dev/null +++ b/graph/incidents_graphml/a/a2b66c70-9003-11ee-97ac-71b8150df801.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.177 + 100.64.16.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701405578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a2b66c70-9003-11ee-97ac-71b8150df801 + + + INCIDENT_LINK + 1701405578 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a2b66c70-9003-11ee-97ac-71b8150df801 + + + diff --git a/graph/incidents_graphml/a/a2c462a0-d4c1-11ee-bf59-a9ad7cebab5f.graphml b/graph/incidents_graphml/a/a2c462a0-d4c1-11ee-bf59-a9ad7cebab5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4be4a2db9f20a46de23214ef1316c34c4e7a51d8 --- /dev/null +++ b/graph/incidents_graphml/a/a2c462a0-d4c1-11ee-bf59-a9ad7cebab5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.216 + 100.64.58.216 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708963862 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c462a0-d4c1-11ee-bf59-a9ad7cebab5f + + + diff --git a/graph/incidents_graphml/a/a2c5e530-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a2c5e530-ed69-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcf78935ac25cf2658e62e8a4467f27095a24c3f --- /dev/null +++ b/graph/incidents_graphml/a/a2c5e530-ed69-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,441 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.132 + USER-0015-1713.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.78 + 100.64.75.78 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.79 + 100.64.75.79 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.80 + USER-0015-1714.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.81 + 100.64.75.81 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.82 + 100.64.75.82 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.83 + 100.64.75.83 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.84 + USER-0015-1715.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.85 + 100.64.75.85 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.86 + USER-0015-1716.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.87 + USER-0015-1717.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.88 + 100.64.75.88 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.89 + 100.64.75.89 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.90 + 100.64.75.90 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.91 + USER-0015-1718.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379849 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2c5e530-ed69-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/a/a2c6c410-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/a/a2c6c410-2a11-11ee-ab73-f1f4f0adc079.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c51e5f9fffe65924fee740111bcf8226a956b12 --- /dev/null +++ b/graph/incidents_graphml/a/a2c6c410-2a11-11ee-ab73-f1f4f0adc079.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.183 + 100.64.48.183 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.82 + 100.64.73.82 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.16.175 + 100.64.16.175 + ["Exploiting Host"] + 0.25 + ["Meraki","Precinct"] + + + HOST + 100.64.82.126 + 100.64.82.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.82.127 + 100.64.82.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.47.79 + 100.64.47.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.18.51 + 100.64.18.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.4.26 + 100.64.4.26 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.81 + 100.64.73.81 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2c6c410-2a11-11ee-ab73-f1f4f0adc079 + + + diff --git a/graph/incidents_graphml/a/a2ca9400-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a2ca9400-284e-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3654431c68f0f768fa6a9ae6270e186dbc9cb95 --- /dev/null +++ b/graph/incidents_graphml/a/a2ca9400-284e-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.180 + 100.64.35.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718150367 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a2ca9400-284e-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718150367 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a2ca9400-284e-11ef-a876-532faa7c8913 + + + INCIDENT_LINK + 1718150367 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a2ca9400-284e-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/a/a2cfa010-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/a/a2cfa010-bc68-11ed-b487-1b4dcbdf8241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..267480f2a8ed51120eb61ca8711ced15b2c79c8e --- /dev/null +++ b/graph/incidents_graphml/a/a2cfa010-bc68-11ed-b487-1b4dcbdf8241.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.218.122 + 172.26.218.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.88.204 + 100.64.88.204 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.20.96.237 + 172.20.96.237 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.88.205 + 100.64.88.205 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.206 + 100.64.88.206 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678139311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2cfa010-bc68-11ed-b487-1b4dcbdf8241 + + + INCIDENT_LINK + 1678139311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2cfa010-bc68-11ed-b487-1b4dcbdf8241 + + + INCIDENT_LINK + 1678139311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2cfa010-bc68-11ed-b487-1b4dcbdf8241 + + + INCIDENT_LINK + 1678139311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2cfa010-bc68-11ed-b487-1b4dcbdf8241 + + + INCIDENT_LINK + 1678139311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2cfa010-bc68-11ed-b487-1b4dcbdf8241 + + + INCIDENT_LINK + 1678139311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2cfa010-bc68-11ed-b487-1b4dcbdf8241 + + + INCIDENT_LINK + 1678139311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2cfa010-bc68-11ed-b487-1b4dcbdf8241 + + + INCIDENT_LINK + 1678139311 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a2cfa010-bc68-11ed-b487-1b4dcbdf8241 + + + diff --git a/graph/incidents_graphml/a/a2d9d280-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a2d9d280-7813-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0726f94889aebb637e8c69f5560012501addc60 --- /dev/null +++ b/graph/incidents_graphml/a/a2d9d280-7813-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.156 + 100.64.51.156 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698773622 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2d9d280-7813-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/a/a2e78b90-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/a/a2e78b90-0ebf-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf562f84d252e48b9afb52774a9d6cc5554c6fe7 --- /dev/null +++ b/graph/incidents_graphml/a/a2e78b90-0ebf-11ee-9392-932bfd273540.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.198 + 100.64.72.198 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687192673 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2e78b90-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192673 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2e78b90-0ebf-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/a/a2eb5eb0-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a2eb5eb0-7813-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e29cba1bd9ab3cda59216fc982cacd164c422e5 --- /dev/null +++ b/graph/incidents_graphml/a/a2eb5eb0-7813-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.156 + 100.64.51.156 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698773622 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2eb5eb0-7813-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/a/a2ef5a10-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a2ef5a10-284e-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc0f7b54bfa3dbb2166b9e6a735e43f83216a7ff --- /dev/null +++ b/graph/incidents_graphml/a/a2ef5a10-284e-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.182 + 100.64.35.182 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718150367 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2ef5a10-284e-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/a/a2f108e0-9daa-11ed-a07d-2388b6eb4361.graphml b/graph/incidents_graphml/a/a2f108e0-9daa-11ed-a07d-2388b6eb4361.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26bca13cdd4ac8d55bfabe5f42057b54daf1095a --- /dev/null +++ b/graph/incidents_graphml/a/a2f108e0-9daa-11ed-a07d-2388b6eb4361.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.86 + 100.64.90.86 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1674759172 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2f108e0-9daa-11ed-a07d-2388b6eb4361 + + + diff --git a/graph/incidents_graphml/a/a2f53440-d6a5-11ed-836d-79bb3a962e0f.graphml b/graph/incidents_graphml/a/a2f53440-d6a5-11ed-836d-79bb3a962e0f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f48ebd5988c60bc94644a18d1336602490f95235 --- /dev/null +++ b/graph/incidents_graphml/a/a2f53440-d6a5-11ed-836d-79bb3a962e0f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.201 + 100.64.23.201 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1681024241 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2f53440-d6a5-11ed-836d-79bb3a962e0f + + + diff --git a/graph/incidents_graphml/a/a2f847d0-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/a/a2f847d0-84c8-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcfb383de76030f8bf56875b10d0cf195c38ffee --- /dev/null +++ b/graph/incidents_graphml/a/a2f847d0-84c8-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.28 + 100.64.55.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700170775 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2f847d0-84c8-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/a/a2f92ea0-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a2f92ea0-2543-11ee-9e0c-a5eef0eff951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..118fcb010199d680afeafe1d47c26d8ad3b2c6b4 --- /dev/null +++ b/graph/incidents_graphml/a/a2f92ea0-2543-11ee-9e0c-a5eef0eff951.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.197 + 100.64.22.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689668292 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a2f92ea0-2543-11ee-9e0c-a5eef0eff951 + + + diff --git a/graph/incidents_graphml/a/a2fa1490-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a2fa1490-ed69-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64cdc9b6609e1df9c67653e37b05ad585eb9ae21 --- /dev/null +++ b/graph/incidents_graphml/a/a2fa1490-ed69-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.157 + 100.64.75.157 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.73 + USER-0015-1646.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655379850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a2fa1490-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a2fa1490-ed69-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/a/a2fcff80-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/a/a2fcff80-26aa-11ef-8ab8-f12e3827fb22.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7b746922a9a4696b8b212e222959c0a1b5c136e --- /dev/null +++ b/graph/incidents_graphml/a/a2fcff80-26aa-11ef-8ab8-f12e3827fb22.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.24 + 100.64.45.24 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717969979 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a2fcff80-26aa-11ef-8ab8-f12e3827fb22 + + + diff --git a/graph/incidents_graphml/a/a3014330-72da-11ee-8d2c-297df9484f05.graphml b/graph/incidents_graphml/a/a3014330-72da-11ee-8d2c-297df9484f05.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36008191332bb27e18f2d54c2168fa10bf16239d --- /dev/null +++ b/graph/incidents_graphml/a/a3014330-72da-11ee-8d2c-297df9484f05.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.21 + 100.64.16.21 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698199385 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3014330-72da-11ee-8d2c-297df9484f05 + + + diff --git a/graph/incidents_graphml/a/a307ff40-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/a/a307ff40-84c8-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..763b6a90dbe64bfdffada585ae2f2a9c0af48db4 --- /dev/null +++ b/graph/incidents_graphml/a/a307ff40-84c8-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.28 + 100.64.55.28 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700170775 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a307ff40-84c8-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/a/a30bf3a0-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/a/a30bf3a0-26aa-11ef-8ab8-f12e3827fb22.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eac92fef3a9ad1900ac9db0b3bb859e9a55f64ed --- /dev/null +++ b/graph/incidents_graphml/a/a30bf3a0-26aa-11ef-8ab8-f12e3827fb22.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.24 + 100.64.45.24 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717969979 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a30bf3a0-26aa-11ef-8ab8-f12e3827fb22 + + + diff --git a/graph/incidents_graphml/a/a30c3bd0-2d7b-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/a/a30c3bd0-2d7b-11ef-88d9-1fb9581a602f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e2f8e35dcb6611e7530b8f7d0aad914805aa89d --- /dev/null +++ b/graph/incidents_graphml/a/a30c3bd0-2d7b-11ef-88d9-1fb9581a602f.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.186.190 + 172.31.186.190 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.93.190 + 100.64.93.190 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.34 + 100.64.89.34 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.191 + 100.64.93.191 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718719451 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a30c3bd0-2d7b-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719451 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a30c3bd0-2d7b-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719451 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a30c3bd0-2d7b-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719451 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a30c3bd0-2d7b-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719451 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a30c3bd0-2d7b-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719451 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a30c3bd0-2d7b-11ef-88d9-1fb9581a602f + + + diff --git a/graph/incidents_graphml/a/a30f4a40-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a30f4a40-ed69-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d33fdd418be50cd6c604a9d731e2da970a676b9 --- /dev/null +++ b/graph/incidents_graphml/a/a30f4a40-ed69-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.158 + 100.64.75.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.190 + 100.64.72.190 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655379850 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a30f4a40-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379850 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a30f4a40-ed69-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/a/a3110670-2bbd-11ef-b37a-07248b6407de.graphml b/graph/incidents_graphml/a/a3110670-2bbd-11ef-b37a-07248b6407de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76a9e8e7432d6648de985c91998f7dc2e220e2f4 --- /dev/null +++ b/graph/incidents_graphml/a/a3110670-2bbd-11ef-b37a-07248b6407de.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.100 + 100.64.24.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718527895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3110670-2bbd-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3110670-2bbd-11ef-b37a-07248b6407de + + + diff --git a/graph/incidents_graphml/a/a3187300-9ff0-11ee-b969-fd26b2eb008b.graphml b/graph/incidents_graphml/a/a3187300-9ff0-11ee-b969-fd26b2eb008b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ab6841b7cd40f6e5dc42e7d5b327711264e52a2 --- /dev/null +++ b/graph/incidents_graphml/a/a3187300-9ff0-11ee-b969-fd26b2eb008b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.10 + 100.64.8.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703156637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3187300-9ff0-11ee-b969-fd26b2eb008b + + + diff --git a/graph/incidents_graphml/a/a31bd220-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/a/a31bd220-26aa-11ef-8ab8-f12e3827fb22.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8ac554399c1f221eed08a9f3b2d1e3cdf630669 --- /dev/null +++ b/graph/incidents_graphml/a/a31bd220-26aa-11ef-8ab8-f12e3827fb22.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.25 + 100.64.45.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717969979 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a31bd220-26aa-11ef-8ab8-f12e3827fb22 + + + diff --git a/graph/incidents_graphml/a/a321b4b0-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a321b4b0-284e-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2014d632bf739d3d18215a58201d31e585c994ca --- /dev/null +++ b/graph/incidents_graphml/a/a321b4b0-284e-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.184 + 100.64.35.184 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718150368 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a321b4b0-284e-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/a/a32571f0-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a32571f0-fe37-11ed-9c9c-8569f16cc2dc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbad1d7492dc31144cc349e17070e1fc3b059bc9 --- /dev/null +++ b/graph/incidents_graphml/a/a32571f0-fe37-11ed-9c9c-8569f16cc2dc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.110 + 100.64.14.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685375043 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a32571f0-fe37-11ed-9c9c-8569f16cc2dc + + + diff --git a/graph/incidents_graphml/a/a330f6f0-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a330f6f0-284e-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3548df15d83412686d0be2d7af0af296acaf529c --- /dev/null +++ b/graph/incidents_graphml/a/a330f6f0-284e-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.184 + 100.64.35.184 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718150368 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a330f6f0-284e-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/a/a3310f90-6d65-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/a3310f90-6d65-11ee-9911-f50eb88c1287.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a91b5246f355ccb9148ed5c988db65b9b9973ea --- /dev/null +++ b/graph/incidents_graphml/a/a3310f90-6d65-11ee-9911-f50eb88c1287.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.206 + 100.64.54.206 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697599379 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3310f90-6d65-11ee-9911-f50eb88c1287 + + + diff --git a/graph/incidents_graphml/a/a33430c0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/a/a33430c0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6361368eae904286215d6e6e68a1f53be220243 --- /dev/null +++ b/graph/incidents_graphml/a/a33430c0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.153 + 100.64.7.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695978458 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a33430c0-5ea7-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/a/a3355210-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a3355210-1d94-11ee-8e9e-f91508f5bdfe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6632a46f8e996de0531a2771e5d873457b23e752 --- /dev/null +++ b/graph/incidents_graphml/a/a3355210-1d94-11ee-8e9e-f91508f5bdfe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.111 + 100.64.10.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688823472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3355210-1d94-11ee-8e9e-f91508f5bdfe + + + diff --git a/graph/incidents_graphml/a/a33772d0-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a33772d0-5277-11ee-99e4-0dae236ad26e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d385a9b5f37159268b3fda5adaa8aca084f9dd2 --- /dev/null +++ b/graph/incidents_graphml/a/a33772d0-5277-11ee-99e4-0dae236ad26e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.194 + 100.64.24.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694638428 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a33772d0-5277-11ee-99e4-0dae236ad26e + + + diff --git a/graph/incidents_graphml/a/a339bd40-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a339bd40-fe37-11ed-9c9c-8569f16cc2dc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..414e7b142ebcb7af4c8611255a64ddfd2b9a0f11 --- /dev/null +++ b/graph/incidents_graphml/a/a339bd40-fe37-11ed-9c9c-8569f16cc2dc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.217 + 100.64.49.217 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685375043 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a339bd40-fe37-11ed-9c9c-8569f16cc2dc + + + diff --git a/graph/incidents_graphml/a/a33be2b0-ed79-11ed-a662-a9c0e7c292a4.graphml b/graph/incidents_graphml/a/a33be2b0-ed79-11ed-a662-a9c0e7c292a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b01a870217f6f57b53300fd470d0636e0c08a3d7 --- /dev/null +++ b/graph/incidents_graphml/a/a33be2b0-ed79-11ed-a662-a9c0e7c292a4.graphml @@ -0,0 +1,817 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.39.105 + 100.64.39.105 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.62.175 + 100.64.62.175 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.192 + 100.64.68.192 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.193 + 100.64.68.193 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.129 + 100.64.68.129 + ["Exploiting Host","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host","Ransomware Target","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.68.194 + 100.64.68.194 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.28.243 + 100.64.28.243 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.18.1 + 100.64.18.1 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.177 + 100.64.11.177 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.195 + 100.64.68.195 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683534220 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Target"] + complete-mission + Disrupted + a33be2b0-ed79-11ed-a662-a9c0e7c292a4 + + + diff --git a/graph/incidents_graphml/a/a33bf6a0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a33bf6a0-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c10ddaff35b693b63dad7527c75d2ef63de7b9c8 --- /dev/null +++ b/graph/incidents_graphml/a/a33bf6a0-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.170 + 100.64.38.170 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951539 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a33bf6a0-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/a/a34003b0-6d65-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/a34003b0-6d65-11ee-9911-f50eb88c1287.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2d51df3825ffde3915c898f676f9dc51bea9423 --- /dev/null +++ b/graph/incidents_graphml/a/a34003b0-6d65-11ee-9911-f50eb88c1287.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.206 + 100.64.54.206 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697599379 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a34003b0-6d65-11ee-9911-f50eb88c1287 + + + diff --git a/graph/incidents_graphml/a/a341c550-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/a/a341c550-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c624b714494848b2658ea5dcb668cee716b2b38 --- /dev/null +++ b/graph/incidents_graphml/a/a341c550-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.153 + 100.64.7.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695978458 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a341c550-5ea7-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/a/a353fc00-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a353fc00-fe37-11ed-9c9c-8569f16cc2dc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3222aab637fb49361e4f38178835f8ae3fef1ce5 --- /dev/null +++ b/graph/incidents_graphml/a/a353fc00-fe37-11ed-9c9c-8569f16cc2dc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.49.217 + 100.64.49.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685375043 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a353fc00-fe37-11ed-9c9c-8569f16cc2dc + + + diff --git a/graph/incidents_graphml/a/a3563300-0861-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/a/a3563300-0861-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9351961d46b874a0d6a4457c174d9dd1f148e534 --- /dev/null +++ b/graph/incidents_graphml/a/a3563300-0861-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.248 + 100.64.14.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.249 + 100.64.14.249 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.95 + 100.64.9.95 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.14.250 + 100.64.14.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.251 + 100.64.14.251 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.252 + 100.64.14.252 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.253 + 100.64.14.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.254 + 100.64.14.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.14.255 + 100.64.14.255 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.1 + 100.64.15.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.1 + 100.64.15.1 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.2 + 100.64.15.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.3 + 100.64.15.3 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.55 + 100.64.13.55 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.168 + 100.64.6.168 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.4 + 100.64.15.4 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.5 + 100.64.15.5 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.130 + 100.64.9.130 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714640091 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3563300-0861-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/a/a35c76f0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a35c76f0-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3a45d011505f1ee13dbc90fe6b14bad94a0b8ed --- /dev/null +++ b/graph/incidents_graphml/a/a35c76f0-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951539 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a35c76f0-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/a/a35e2170-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a35e2170-284e-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..693eb2c40d4774350d0dbd234a5b2d2400a0bb4c --- /dev/null +++ b/graph/incidents_graphml/a/a35e2170-284e-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.238 + 100.64.21.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718150368 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a35e2170-284e-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/a/a35f2f20-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a35f2f20-7813-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1063d86bd23095f7fe0358959f90b95c6c8da450 --- /dev/null +++ b/graph/incidents_graphml/a/a35f2f20-7813-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.158 + 100.64.51.158 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698773623 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a35f2f20-7813-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/a/a3686e60-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a3686e60-fe37-11ed-9c9c-8569f16cc2dc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e37a9ee34620c46b1c1916c56edf3d3711b45e2 --- /dev/null +++ b/graph/incidents_graphml/a/a3686e60-fe37-11ed-9c9c-8569f16cc2dc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.219 + 100.64.49.219 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685375043 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3686e60-fe37-11ed-9c9c-8569f16cc2dc + + + diff --git a/graph/incidents_graphml/a/a368e530-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a368e530-1d94-11ee-8e9e-f91508f5bdfe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ec944656b5109e26b50a9c297f9acff0247ed0c --- /dev/null +++ b/graph/incidents_graphml/a/a368e530-1d94-11ee-8e9e-f91508f5bdfe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.111 + 100.64.10.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688823473 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a368e530-1d94-11ee-8e9e-f91508f5bdfe + + + diff --git a/graph/incidents_graphml/a/a36c2e60-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a36c2e60-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f8884f367438f27544178d3239cce704567b2be --- /dev/null +++ b/graph/incidents_graphml/a/a36c2e60-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951539 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a36c2e60-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/a/a36ff800-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a36ff800-7813-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..821fad03ac96aac1b5d5235826f5848828cd38e8 --- /dev/null +++ b/graph/incidents_graphml/a/a36ff800-7813-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.158 + 100.64.51.158 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698773623 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a36ff800-7813-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/a/a3702800-fe09-11ec-9816-ad54cdda58f5.graphml b/graph/incidents_graphml/a/a3702800-fe09-11ec-9816-ad54cdda58f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9c2f6dc5a50f611ea36a9d1ebb13b020f9ebe34 --- /dev/null +++ b/graph/incidents_graphml/a/a3702800-fe09-11ec-9816-ad54cdda58f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.59 + 100.64.72.59 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.240 + USER-0015-1630.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657207789 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3702800-fe09-11ec-9816-ad54cdda58f5 + + + diff --git a/graph/incidents_graphml/a/a3735720-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a3735720-284e-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b8cf993e4cc65339431756907d6c19157597849 --- /dev/null +++ b/graph/incidents_graphml/a/a3735720-284e-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.238 + 100.64.21.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718150368 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3735720-284e-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/a/a377a010-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a377a010-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab308c125b874df23768226476d5c6d3457fd00c --- /dev/null +++ b/graph/incidents_graphml/a/a377a010-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.172 + 100.64.38.172 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951539 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a377a010-cb8c-11ee-9d8c-014a3c92d0a7 + + + INCIDENT_LINK + 1707951539 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a377a010-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/a/a3784470-9b49-11ee-8c6f-ef195d8f48bb.graphml b/graph/incidents_graphml/a/a3784470-9b49-11ee-8c6f-ef195d8f48bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4158013252020a687402a1fe70813a8bb51bc86e --- /dev/null +++ b/graph/incidents_graphml/a/a3784470-9b49-11ee-8c6f-ef195d8f48bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.1 + 100.64.17.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702645107 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3784470-9b49-11ee-8c6f-ef195d8f48bb + + + diff --git a/graph/incidents_graphml/a/a37c0cb0-25bc-11ef-8084-11f20777a6f9.graphml b/graph/incidents_graphml/a/a37c0cb0-25bc-11ef-8084-11f20777a6f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4932c54fe3b18eaec72eeec56a7e61e24b305f28 --- /dev/null +++ b/graph/incidents_graphml/a/a37c0cb0-25bc-11ef-8084-11f20777a6f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.76 + 100.64.16.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717867759 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a37c0cb0-25bc-11ef-8084-11f20777a6f9 + + + diff --git a/graph/incidents_graphml/a/a37ddab0-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a37ddab0-7813-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b21968f4d85f937d1469176b0c43185d67aaa6b8 --- /dev/null +++ b/graph/incidents_graphml/a/a37ddab0-7813-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.160 + 100.64.51.160 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698773623 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a37ddab0-7813-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/a/a381e430-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/a/a381e430-ed53-11ec-8964-796320a841f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46b03baf0245290ae8c8108b7bddfb65af840e99 --- /dev/null +++ b/graph/incidents_graphml/a/a381e430-ed53-11ec-8964-796320a841f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.174 + 100.64.79.174 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.77 + 100.64.72.77 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655370402 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a381e430-ed53-11ec-8964-796320a841f1 + + + INCIDENT_LINK + 1655370402 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a381e430-ed53-11ec-8964-796320a841f1 + + + diff --git a/graph/incidents_graphml/a/a3825520-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a3825520-f3b2-11ee-876f-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0260bdf2f36473a076d8f4876a14ede02f477a8e --- /dev/null +++ b/graph/incidents_graphml/a/a3825520-f3b2-11ee-876f-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.253 + 100.64.43.253 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712365906 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3825520-f3b2-11ee-876f-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/a/a3825f00-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a3825f00-fe37-11ed-9c9c-8569f16cc2dc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40974153bdbeb714518126f55d98935035011008 --- /dev/null +++ b/graph/incidents_graphml/a/a3825f00-fe37-11ed-9c9c-8569f16cc2dc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.49.219 + 100.64.49.219 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685375044 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3825f00-fe37-11ed-9c9c-8569f16cc2dc + + + diff --git a/graph/incidents_graphml/a/a383ae00-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a383ae00-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6c5fd78ae2032d1c390da696080d2ed4b6f8f40 --- /dev/null +++ b/graph/incidents_graphml/a/a383ae00-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.172 + 100.64.38.172 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951539 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a383ae00-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/a/a3842000-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a3842000-284e-11ef-a876-532faa7c8913.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e009781901508dcd723f6072f06b1e0e346860d --- /dev/null +++ b/graph/incidents_graphml/a/a3842000-284e-11ef-a876-532faa7c8913.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.161 + 100.64.14.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718150368 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3842000-284e-11ef-a876-532faa7c8913 + + + diff --git a/graph/incidents_graphml/a/a388e640-9b49-11ee-8c6f-ef195d8f48bb.graphml b/graph/incidents_graphml/a/a388e640-9b49-11ee-8c6f-ef195d8f48bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3eadca79870b168351a7f0455d565b668602da10 --- /dev/null +++ b/graph/incidents_graphml/a/a388e640-9b49-11ee-8c6f-ef195d8f48bb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.1 + 100.64.17.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702645107 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a388e640-9b49-11ee-8c6f-ef195d8f48bb + + + diff --git a/graph/incidents_graphml/a/a38d23b0-25bc-11ef-8084-11f20777a6f9.graphml b/graph/incidents_graphml/a/a38d23b0-25bc-11ef-8084-11f20777a6f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..556fc839bdbc2b949ad928292f754d8ecc2cec4c --- /dev/null +++ b/graph/incidents_graphml/a/a38d23b0-25bc-11ef-8084-11f20777a6f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.76 + 100.64.16.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717867760 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a38d23b0-25bc-11ef-8084-11f20777a6f9 + + + diff --git a/graph/incidents_graphml/a/a38e9bb0-a2d5-11ee-8541-6f03abc6c851.graphml b/graph/incidents_graphml/a/a38e9bb0-a2d5-11ee-8541-6f03abc6c851.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c119f723794ccf29b32ae7830956987b3b331ad --- /dev/null +++ b/graph/incidents_graphml/a/a38e9bb0-a2d5-11ee-8541-6f03abc6c851.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.150 + 100.64.29.150 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.177 + 100.64.25.177 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.4 + 100.64.8.4 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.214 + 100.64.13.214 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.151 + 100.64.29.151 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.152 + 100.64.29.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.153 + 100.64.29.153 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.2 + 100.64.8.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.154 + 100.64.29.154 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.9 + 100.64.22.9 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.186 + 100.64.8.186 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.155 + 100.64.29.155 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.156 + 100.64.29.156 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.7 + 100.64.25.7 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.157 + 100.64.29.157 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.158 + 100.64.29.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.159 + 100.64.29.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.160 + 100.64.29.160 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a38e9bb0-a2d5-11ee-8541-6f03abc6c851 + + + diff --git a/graph/incidents_graphml/a/a38f8000-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a38f8000-1d94-11ee-8e9e-f91508f5bdfe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49abfb517e7baa2b1f48ff054c7306e977081722 --- /dev/null +++ b/graph/incidents_graphml/a/a38f8000-1d94-11ee-8e9e-f91508f5bdfe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.178 + 100.64.35.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688823473 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a38f8000-1d94-11ee-8e9e-f91508f5bdfe + + + diff --git a/graph/incidents_graphml/a/a3984e20-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a3984e20-f3b2-11ee-876f-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e7c9d0580a22c3921db10b0a9367fceffc47de0 --- /dev/null +++ b/graph/incidents_graphml/a/a3984e20-f3b2-11ee-876f-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.253 + 100.64.43.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712365907 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3984e20-f3b2-11ee-876f-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/a/a39c0930-a2d5-11ee-8541-6f03abc6c851.graphml b/graph/incidents_graphml/a/a39c0930-a2d5-11ee-8541-6f03abc6c851.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e188ab9ce9715264a29e76f7df66933ab86f36b8 --- /dev/null +++ b/graph/incidents_graphml/a/a39c0930-a2d5-11ee-8541-6f03abc6c851.graphml @@ -0,0 +1,481 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.172 + 100.64.29.172 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.173 + 100.64.29.173 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.174 + USER-0015-1281.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.175 + 100.64.29.175 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.176 + 100.64.29.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.177 + 100.64.29.177 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.154 + 100.64.29.154 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.178 + 100.64.29.178 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.179 + 100.64.29.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.180 + 100.64.29.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.21 + 100.64.25.21 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.181 + 100.64.29.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a39c0930-a2d5-11ee-8541-6f03abc6c851 + + + diff --git a/graph/incidents_graphml/a/a39d7790-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a39d7790-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b2997691354d1ec07a08d30cf0213c506bf0a1b --- /dev/null +++ b/graph/incidents_graphml/a/a39d7790-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.150 + 100.64.10.150 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951539 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a39d7790-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/a/a3a4b410-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a3a4b410-fe37-11ed-9c9c-8569f16cc2dc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9513037ce7998a14fc0266569b1af5ace4e857ec --- /dev/null +++ b/graph/incidents_graphml/a/a3a4b410-fe37-11ed-9c9c-8569f16cc2dc.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.59 + 100.64.12.59 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685375044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a3a4b410-fe37-11ed-9c9c-8569f16cc2dc + + + INCIDENT_LINK + 1685375044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a3a4b410-fe37-11ed-9c9c-8569f16cc2dc + + + diff --git a/graph/incidents_graphml/a/a3a87ac0-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a3a87ac0-f3b2-11ee-876f-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f36be821cde4dfd540186e85f6d984a7710d132 --- /dev/null +++ b/graph/incidents_graphml/a/a3a87ac0-f3b2-11ee-876f-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.255 + 100.64.43.255 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712365907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3a87ac0-f3b2-11ee-876f-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/a/a3ae9780-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a3ae9780-ed69-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..882de0dc8f803df02b8c989b70f5bb914cac9680 --- /dev/null +++ b/graph/incidents_graphml/a/a3ae9780-ed69-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.149 + 100.64.71.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.20.44 + 100.64.20.44 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655379851 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3ae9780-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379851 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3ae9780-ed69-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/a/a3b3a2b0-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a3b3a2b0-85f3-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1b98dd3749d9f7840c245f2242235ec31a560ec --- /dev/null +++ b/graph/incidents_graphml/a/a3b3a2b0-85f3-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.54 + 100.64.9.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299196 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3b3a2b0-85f3-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a3b41f00-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a3b41f00-1d94-11ee-8e9e-f91508f5bdfe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aeadda8624f44fc7b8daded772cbbeec2347269a --- /dev/null +++ b/graph/incidents_graphml/a/a3b41f00-1d94-11ee-8e9e-f91508f5bdfe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.178 + 100.64.35.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688823473 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3b41f00-1d94-11ee-8e9e-f91508f5bdfe + + + diff --git a/graph/incidents_graphml/a/a3ba7c20-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a3ba7c20-f3b2-11ee-876f-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae4c3c4f97806b2d044699f1dbe9973aab527ed4 --- /dev/null +++ b/graph/incidents_graphml/a/a3ba7c20-f3b2-11ee-876f-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.255 + 100.64.43.255 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712365907 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3ba7c20-f3b2-11ee-876f-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/a/a3bc0500-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a3bc0500-ed69-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e87c151f119ff47809bb9afecd49519168c0b35b --- /dev/null +++ b/graph/incidents_graphml/a/a3bc0500-ed69-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.159 + 100.64.75.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.173 + 100.64.72.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655379851 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3bc0500-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379851 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3bc0500-ed69-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/a/a3bcc160-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a3bcc160-dc8d-11ee-bb7b-7127cbf2c01f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3618b9d78f5d9c3268e85aac5ef4c101404b9b4 --- /dev/null +++ b/graph/incidents_graphml/a/a3bcc160-dc8d-11ee-bb7b-7127cbf2c01f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.169 + 100.64.39.169 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709821139 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3bcc160-dc8d-11ee-bb7b-7127cbf2c01f + + + diff --git a/graph/incidents_graphml/a/a3bd82b0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a3bd82b0-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6875b568575af260ca53150480c50617c4b8bbd --- /dev/null +++ b/graph/incidents_graphml/a/a3bd82b0-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.174 + 100.64.38.174 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951539 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3bd82b0-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/a/a3be0540-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a3be0540-2543-11ee-9e0c-a5eef0eff951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a88fd01e10c407b832a140258e9f41f53b97b9a --- /dev/null +++ b/graph/incidents_graphml/a/a3be0540-2543-11ee-9e0c-a5eef0eff951.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.10 + 100.64.66.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689668293 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3be0540-2543-11ee-9e0c-a5eef0eff951 + + + INCIDENT_LINK + 1689668293 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3be0540-2543-11ee-9e0c-a5eef0eff951 + + + diff --git a/graph/incidents_graphml/a/a3c05260-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a3c05260-fe37-11ed-9c9c-8569f16cc2dc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4f0c91d281980b254529ada1ee998967a2a53e0 --- /dev/null +++ b/graph/incidents_graphml/a/a3c05260-fe37-11ed-9c9c-8569f16cc2dc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.12.59 + 100.64.12.59 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685375044 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3c05260-fe37-11ed-9c9c-8569f16cc2dc + + + diff --git a/graph/incidents_graphml/a/a3cc4fc0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a3cc4fc0-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..173cefae89eb19a550a01e1e66cc4d7e0823bec0 --- /dev/null +++ b/graph/incidents_graphml/a/a3cc4fc0-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.174 + 100.64.38.174 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951539 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3cc4fc0-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/a/a3d04960-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a3d04960-dc8d-11ee-bb7b-7127cbf2c01f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae2350242cea5c97bb1788952179ec28f2d7defa --- /dev/null +++ b/graph/incidents_graphml/a/a3d04960-dc8d-11ee-bb7b-7127cbf2c01f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.169 + 100.64.39.169 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709821139 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3d04960-dc8d-11ee-bb7b-7127cbf2c01f + + + diff --git a/graph/incidents_graphml/a/a3d89d00-a2d5-11ee-8541-6f03abc6c851.graphml b/graph/incidents_graphml/a/a3d89d00-a2d5-11ee-8541-6f03abc6c851.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2284c41a368b78d7d5e2881d5019d0d6cfb6bff3 --- /dev/null +++ b/graph/incidents_graphml/a/a3d89d00-a2d5-11ee-8541-6f03abc6c851.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.63 + 100.64.23.63 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.192 + 100.64.29.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.5 + 100.64.17.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.193 + 100.64.29.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.194 + 100.64.29.194 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.195 + 100.64.29.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.196 + USER-0015-1282.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.197 + USER-0015-1283.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474895 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3d89d00-a2d5-11ee-8541-6f03abc6c851 + + + diff --git a/graph/incidents_graphml/a/a3ddc240-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a3ddc240-2543-11ee-9e0c-a5eef0eff951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca6e7600e49cca17371095bb39cfa479fda7dcf8 --- /dev/null +++ b/graph/incidents_graphml/a/a3ddc240-2543-11ee-9e0c-a5eef0eff951.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.10 + 100.64.66.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689668293 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3ddc240-2543-11ee-9e0c-a5eef0eff951 + + + diff --git a/graph/incidents_graphml/a/a3ec33d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a3ec33d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ecf21a9d4496f98a32dfe6a166aa2e447af0ed28 --- /dev/null +++ b/graph/incidents_graphml/a/a3ec33d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.58 + 100.64.21.58 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3ec33d0-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/a/a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e5e69b6b0b68a2533d9826317eba502135f2faf --- /dev/null +++ b/graph/incidents_graphml/a/a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.233 + 100.64.73.233 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.51 + 100.64.73.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.39 + USER-0015-1719.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655379851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/a/a3f0d840-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a3f0d840-fe37-11ed-9c9c-8569f16cc2dc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8577b067171431192afa0738589920c2ffaed64 --- /dev/null +++ b/graph/incidents_graphml/a/a3f0d840-fe37-11ed-9c9c-8569f16cc2dc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.30.88 + 100.64.30.88 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685375044 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3f0d840-fe37-11ed-9c9c-8569f16cc2dc + + + diff --git a/graph/incidents_graphml/a/a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9.graphml b/graph/incidents_graphml/a/a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e5b2739e512aec6b161665ab4764198828fd07c --- /dev/null +++ b/graph/incidents_graphml/a/a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.161 + 100.64.82.161 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.162 + 100.64.82.162 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688783101 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783101 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783101 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783101 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9 + + + diff --git a/graph/incidents_graphml/a/a3f9c860-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a3f9c860-cb8c-11ee-9d8c-014a3c92d0a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b2619691b7d2b84b6de5ba6490a5984b1cc560f --- /dev/null +++ b/graph/incidents_graphml/a/a3f9c860-cb8c-11ee-9d8c-014a3c92d0a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.58 + 100.64.21.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1707951540 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3f9c860-cb8c-11ee-9d8c-014a3c92d0a7 + + + diff --git a/graph/incidents_graphml/a/a3ffc160-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a3ffc160-f063-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0bd52fec9205dfc87712dcef62931fc26c1bb444 --- /dev/null +++ b/graph/incidents_graphml/a/a3ffc160-f063-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.155 + 100.64.44.155 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712002123 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a3ffc160-f063-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/a/a406f520-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a406f520-2543-11ee-9e0c-a5eef0eff951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe4e0bcf7f727e8cad27bdb9a6808f988fcfc8cc --- /dev/null +++ b/graph/incidents_graphml/a/a406f520-2543-11ee-9e0c-a5eef0eff951.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.12 + USER-0015-1469.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689668294 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a406f520-2543-11ee-9e0c-a5eef0eff951 + + + diff --git a/graph/incidents_graphml/a/a41656a0-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a41656a0-f063-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc5efdb02595976a986b194d1e912f09bd53fd60 --- /dev/null +++ b/graph/incidents_graphml/a/a41656a0-f063-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.87 + 100.64.60.87 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712002124 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a41656a0-f063-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/a/a425c4f0-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/a/a425c4f0-6503-11ee-b447-a9f06618d419.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6175baff9eb3e4fd940e42317ace7bfc261c566 --- /dev/null +++ b/graph/incidents_graphml/a/a425c4f0-6503-11ee-b447-a9f06618d419.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.247 + 100.64.89.247 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696677680 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a425c4f0-6503-11ee-b447-a9f06618d419 + + + diff --git a/graph/incidents_graphml/a/a426fbd0-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a426fbd0-ed69-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5823aee8a18030b11b3b5ef221fe88f61accf6cb --- /dev/null +++ b/graph/incidents_graphml/a/a426fbd0-ed69-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.160 + 100.64.75.160 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655379852 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a426fbd0-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379852 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a426fbd0-ed69-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/a/a4271f80-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4271f80-f063-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69fc068997c97930377629f564a9a8b0a11c8fb7 --- /dev/null +++ b/graph/incidents_graphml/a/a4271f80-f063-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.89 + 100.64.60.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712002124 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a4271f80-f063-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/a/a42e5340-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a42e5340-2543-11ee-9e0c-a5eef0eff951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92fb5638ba5ba4e47abeb71f4296bee5503a92e9 --- /dev/null +++ b/graph/incidents_graphml/a/a42e5340-2543-11ee-9e0c-a5eef0eff951.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.12 + USER-0015-1469.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689668294 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a42e5340-2543-11ee-9e0c-a5eef0eff951 + + + diff --git a/graph/incidents_graphml/a/a42fc220-27c4-11ed-b92c-490402bdd5e6.graphml b/graph/incidents_graphml/a/a42fc220-27c4-11ed-b92c-490402bdd5e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34962cac761533069b67799d5c0680e3100c8783 --- /dev/null +++ b/graph/incidents_graphml/a/a42fc220-27c4-11ed-b92c-490402bdd5e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.185 + 100.64.80.185 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.4 + 100.64.72.4 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661796104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a42fc220-27c4-11ed-b92c-490402bdd5e6 + + + diff --git a/graph/incidents_graphml/a/a431d8e0-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a431d8e0-fe37-11ed-9c9c-8569f16cc2dc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfe8fce1ad0eef7907a6a5ff4d80903a3a155a92 --- /dev/null +++ b/graph/incidents_graphml/a/a431d8e0-fe37-11ed-9c9c-8569f16cc2dc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.221 + 100.64.49.221 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685375045 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a431d8e0-fe37-11ed-9c9c-8569f16cc2dc + + + diff --git a/graph/incidents_graphml/a/a433f0c0-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a433f0c0-f063-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db93dee89cd9d141b5cb1bbc67cb80c8f25d560b --- /dev/null +++ b/graph/incidents_graphml/a/a433f0c0-f063-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.93 + 100.64.60.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712002124 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a433f0c0-f063-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/a/a434de80-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a434de80-ed69-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ca08065fedb5a1d750cdbe944d2edea0708e234 --- /dev/null +++ b/graph/incidents_graphml/a/a434de80-ed69-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.102 + USER-0015-1720.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.40 + USER-0015-1612.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.161 + 100.64.75.161 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655379852 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a434de80-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379852 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a434de80-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379852 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a434de80-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379852 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a434de80-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379852 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a434de80-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379852 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a434de80-ed69-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/a/a438c2d0-27c4-11ed-b92c-490402bdd5e6.graphml b/graph/incidents_graphml/a/a438c2d0-27c4-11ed-b92c-490402bdd5e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..524e6630f3634e54e781b01bbe20a1bfb94cdb71 --- /dev/null +++ b/graph/incidents_graphml/a/a438c2d0-27c4-11ed-b92c-490402bdd5e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.186 + 100.64.80.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.214 + 100.64.72.214 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661796104 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a438c2d0-27c4-11ed-b92c-490402bdd5e6 + + + diff --git a/graph/incidents_graphml/a/a4435a10-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4435a10-f063-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72e39019b94bbf739daf7eb0102979faec36811d --- /dev/null +++ b/graph/incidents_graphml/a/a4435a10-f063-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.93 + 100.64.60.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712002124 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a4435a10-f063-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/a/a44946b0-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a44946b0-6071-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9d497a2f81e9208debf4a33d308d0fc4aa9836d --- /dev/null +++ b/graph/incidents_graphml/a/a44946b0-6071-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.79 + 100.64.77.79 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.226 + 100.64.1.226 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1668027672 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a44946b0-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027672 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a44946b0-6071-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/a/a44eac80-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a44eac80-2543-11ee-9e0c-a5eef0eff951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d292946e525b6790e22b0aeac209700cd350e057 --- /dev/null +++ b/graph/incidents_graphml/a/a44eac80-2543-11ee-9e0c-a5eef0eff951.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.14 + 100.64.66.14 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689668294 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a44eac80-2543-11ee-9e0c-a5eef0eff951 + + + diff --git a/graph/incidents_graphml/a/a45386b0-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a45386b0-f063-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00906eb2aa24a1e5528fa815bcfc6e952c20f722 --- /dev/null +++ b/graph/incidents_graphml/a/a45386b0-f063-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.189 + 100.64.27.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712002124 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a45386b0-f063-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/a/a45e9300-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/a/a45e9300-22d3-11ef-b7cc-27d8681b231b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a406b85b34c6716620f96334ff646fba1b432037 --- /dev/null +++ b/graph/incidents_graphml/a/a45e9300-22d3-11ef-b7cc-27d8681b231b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.89.241 + 100.64.89.241 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1717547786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a45e9300-22d3-11ef-b7cc-27d8681b231b + + + diff --git a/graph/incidents_graphml/a/a45f7c10-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a45f7c10-3235-11ed-88fd-4f3fdda20925.graphml new file mode 100644 index 0000000000000000000000000000000000000000..106564125c14fb3703c047001008ab5eda62c0ef --- /dev/null +++ b/graph/incidents_graphml/a/a45f7c10-3235-11ed-88fd-4f3fdda20925.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.90.233 + 100.64.90.233 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662944149 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a45f7c10-3235-11ed-88fd-4f3fdda20925 + + + diff --git a/graph/incidents_graphml/a/a4600fe0-72da-11ee-8d2c-297df9484f05.graphml b/graph/incidents_graphml/a/a4600fe0-72da-11ee-8d2c-297df9484f05.graphml new file mode 100644 index 0000000000000000000000000000000000000000..079a5808d8f4a086ff3c1fb10a2dba985341a356 --- /dev/null +++ b/graph/incidents_graphml/a/a4600fe0-72da-11ee-8d2c-297df9484f05.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.81 + 100.64.60.81 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698199388 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4600fe0-72da-11ee-8d2c-297df9484f05 + + + INCIDENT_LINK + 1698199388 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4600fe0-72da-11ee-8d2c-297df9484f05 + + + diff --git a/graph/incidents_graphml/a/a461ed10-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a461ed10-3235-11ed-88fd-4f3fdda20925.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d0e49d8de6dd2409a0479ac6a96d0396255f4cd --- /dev/null +++ b/graph/incidents_graphml/a/a461ed10-3235-11ed-88fd-4f3fdda20925.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.157 + 100.64.71.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1662944149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a461ed10-3235-11ed-88fd-4f3fdda20925 + + + INCIDENT_LINK + 1662944149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a461ed10-3235-11ed-88fd-4f3fdda20925 + + + INCIDENT_LINK + 1662944149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a461ed10-3235-11ed-88fd-4f3fdda20925 + + + diff --git a/graph/incidents_graphml/a/a46632d0-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a46632d0-3235-11ed-88fd-4f3fdda20925.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a9fb83f458bb05a3c84884146dd8963ecf42fd0 --- /dev/null +++ b/graph/incidents_graphml/a/a46632d0-3235-11ed-88fd-4f3fdda20925.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.71.157 + 100.64.71.157 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662944149 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a46632d0-3235-11ed-88fd-4f3fdda20925 + + + diff --git a/graph/incidents_graphml/a/a46764a0-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a46764a0-2543-11ee-9e0c-a5eef0eff951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdff38959eee8eb91a7a3426e936d22672bdeb44 --- /dev/null +++ b/graph/incidents_graphml/a/a46764a0-2543-11ee-9e0c-a5eef0eff951.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.14 + 100.64.66.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689668294 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a46764a0-2543-11ee-9e0c-a5eef0eff951 + + + diff --git a/graph/incidents_graphml/a/a4684730-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4684730-f063-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eda7d04640034dc09af4fc7b93254decf5e37a15 --- /dev/null +++ b/graph/incidents_graphml/a/a4684730-f063-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.189 + 100.64.27.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712002124 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a4684730-f063-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/a/a469dc50-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a469dc50-3235-11ed-88fd-4f3fdda20925.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f30f7445737e0145f0d521f189e9968424a2191 --- /dev/null +++ b/graph/incidents_graphml/a/a469dc50-3235-11ed-88fd-4f3fdda20925.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.248 + 100.64.90.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662944149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a469dc50-3235-11ed-88fd-4f3fdda20925 + + + diff --git a/graph/incidents_graphml/a/a46da1c0-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a46da1c0-ed69-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4799f9970abb45ab90df864bdc481d3fa794bb02 --- /dev/null +++ b/graph/incidents_graphml/a/a46da1c0-ed69-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.170 + USER-0015-1679.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.162 + 100.64.75.162 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.163 + 100.64.75.163 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655379852 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a46da1c0-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379852 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a46da1c0-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379852 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a46da1c0-ed69-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655379852 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a46da1c0-ed69-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/a/a46e2210-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a46e2210-3235-11ed-88fd-4f3fdda20925.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10b413ffeeff2b344c738d0738fdcf3baeb4eea9 --- /dev/null +++ b/graph/incidents_graphml/a/a46e2210-3235-11ed-88fd-4f3fdda20925.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.248 + 100.64.90.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662944149 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a46e2210-3235-11ed-88fd-4f3fdda20925 + + + diff --git a/graph/incidents_graphml/a/a473efc0-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/a/a473efc0-22d3-11ef-b7cc-27d8681b231b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8d6bab0a4ef07a96c1e2ef668e19d3339139c76 --- /dev/null +++ b/graph/incidents_graphml/a/a473efc0-22d3-11ef-b7cc-27d8681b231b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 10.207.79.45 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.241 + 100.64.89.241 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717547786 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a473efc0-22d3-11ef-b7cc-27d8681b231b + + + diff --git a/graph/incidents_graphml/a/a4748ab0-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a4748ab0-3235-11ed-88fd-4f3fdda20925.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70eef393fb3b9ba20028580fa063bb9da2c66efd --- /dev/null +++ b/graph/incidents_graphml/a/a4748ab0-3235-11ed-88fd-4f3fdda20925.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.196 + 100.64.19.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662944149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4748ab0-3235-11ed-88fd-4f3fdda20925 + + + INCIDENT_LINK + 1662944149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4748ab0-3235-11ed-88fd-4f3fdda20925 + + + diff --git a/graph/incidents_graphml/a/a475eb30-1172-11ef-98dd-db867c05f09b.graphml b/graph/incidents_graphml/a/a475eb30-1172-11ef-98dd-db867c05f09b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b45a5f90e7c995b0642280c6905ef24e2f1e7380 --- /dev/null +++ b/graph/incidents_graphml/a/a475eb30-1172-11ef-98dd-db867c05f09b.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.82 + 172.25.216.82 + ["Exploiting Host"] + 0.841796875 + ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"] + + + HOST + 100.64.90.120 + 100.64.90.120 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.13 + 100.64.87.13 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.90.118 + 100.64.90.118 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715636955 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a475eb30-1172-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715636955 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a475eb30-1172-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715636955 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a475eb30-1172-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715636955 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a475eb30-1172-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715636955 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a475eb30-1172-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715636955 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a475eb30-1172-11ef-98dd-db867c05f09b + + + diff --git a/graph/incidents_graphml/a/a478e020-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a478e020-3f76-11ee-a907-25e49d688e74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92cb2b2f482b7101d09f4cbe3b7f7679219df9df --- /dev/null +++ b/graph/incidents_graphml/a/a478e020-3f76-11ee-a907-25e49d688e74.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.156 + 100.64.35.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692548929 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a478e020-3f76-11ee-a907-25e49d688e74 + + + diff --git a/graph/incidents_graphml/a/a4791e90-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a4791e90-3235-11ed-88fd-4f3fdda20925.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b06e1d734f7b725e287fb82816398855d64cfd4 --- /dev/null +++ b/graph/incidents_graphml/a/a4791e90-3235-11ed-88fd-4f3fdda20925.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.19.196 + 100.64.19.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662944149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a4791e90-3235-11ed-88fd-4f3fdda20925 + + + diff --git a/graph/incidents_graphml/a/a4797f80-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/a/a4797f80-bc68-11ed-b487-1b4dcbdf8241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63a545a855873c95ae3c0924c6919c94cf2a37f0 --- /dev/null +++ b/graph/incidents_graphml/a/a4797f80-bc68-11ed-b487-1b4dcbdf8241.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.207 + 100.64.88.207 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678139314 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a4797f80-bc68-11ed-b487-1b4dcbdf8241 + + + INCIDENT_LINK + 1678139314 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a4797f80-bc68-11ed-b487-1b4dcbdf8241 + + + diff --git a/graph/incidents_graphml/a/a47a75b0-72da-11ee-8d2c-297df9484f05.graphml b/graph/incidents_graphml/a/a47a75b0-72da-11ee-8d2c-297df9484f05.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d456343a9790adf745ab1416772e48665a18ef50 --- /dev/null +++ b/graph/incidents_graphml/a/a47a75b0-72da-11ee-8d2c-297df9484f05.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.81 + 100.64.60.81 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698199388 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a47a75b0-72da-11ee-8d2c-297df9484f05 + + + diff --git a/graph/incidents_graphml/a/a47f1200-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a47f1200-3235-11ed-88fd-4f3fdda20925.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0b696cfd7656d6c2905f8bd6e92d05162166227 --- /dev/null +++ b/graph/incidents_graphml/a/a47f1200-3235-11ed-88fd-4f3fdda20925.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.19.196 + 100.64.19.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662944149 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a47f1200-3235-11ed-88fd-4f3fdda20925 + + + diff --git a/graph/incidents_graphml/a/a481aa10-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a481aa10-3235-11ed-88fd-4f3fdda20925.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8022ad807c33dbb7fd1ad7d3886f2f123a8f75c --- /dev/null +++ b/graph/incidents_graphml/a/a481aa10-3235-11ed-88fd-4f3fdda20925.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.59 + 100.64.5.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1662944149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a481aa10-3235-11ed-88fd-4f3fdda20925 + + + INCIDENT_LINK + 1662944149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a481aa10-3235-11ed-88fd-4f3fdda20925 + + + diff --git a/graph/incidents_graphml/a/a482a900-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/a/a482a900-19b7-11ee-af67-f75f54b1c1f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..369682fa3c3450578eebe49532a5b3fec44e719d --- /dev/null +++ b/graph/incidents_graphml/a/a482a900-19b7-11ee-af67-f75f54b1c1f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.248 + 100.64.52.248 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688398702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a482a900-19b7-11ee-af67-f75f54b1c1f9 + + + diff --git a/graph/incidents_graphml/a/a4863df0-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a4863df0-3235-11ed-88fd-4f3fdda20925.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e81e5820abeb5814da7b7253aadc65f7b1e3624 --- /dev/null +++ b/graph/incidents_graphml/a/a4863df0-3235-11ed-88fd-4f3fdda20925.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.5.59 + 100.64.5.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662944149 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a4863df0-3235-11ed-88fd-4f3fdda20925 + + + diff --git a/graph/incidents_graphml/a/a48b2fa0-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a48b2fa0-3f76-11ee-a907-25e49d688e74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1c347a359b3d7d219c10168bfcff47833430770 --- /dev/null +++ b/graph/incidents_graphml/a/a48b2fa0-3f76-11ee-a907-25e49d688e74.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.156 + 100.64.35.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692548929 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a48b2fa0-3f76-11ee-a907-25e49d688e74 + + + diff --git a/graph/incidents_graphml/a/a48f9f90-25bc-11ef-8084-11f20777a6f9.graphml b/graph/incidents_graphml/a/a48f9f90-25bc-11ef-8084-11f20777a6f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd0d45d8f33e33b02b4363662e0fe96e3601bfba --- /dev/null +++ b/graph/incidents_graphml/a/a48f9f90-25bc-11ef-8084-11f20777a6f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.78 + 100.64.16.78 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717867761 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a48f9f90-25bc-11ef-8084-11f20777a6f9 + + + diff --git a/graph/incidents_graphml/a/a491e090-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/a/a491e090-dc1d-11ee-a712-878bc23f81d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69f23419944f477da907acdcec40805a27cf3921 --- /dev/null +++ b/graph/incidents_graphml/a/a491e090-dc1d-11ee-a712-878bc23f81d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.246 + 100.64.12.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709773036 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a491e090-dc1d-11ee-a712-878bc23f81d5 + + + diff --git a/graph/incidents_graphml/a/a497df20-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a497df20-dc8d-11ee-bb7b-7127cbf2c01f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f7e611bbf6ef9dfb89258bcb92d993f9db06f83 --- /dev/null +++ b/graph/incidents_graphml/a/a497df20-dc8d-11ee-bb7b-7127cbf2c01f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.171 + 100.64.39.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709821140 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a497df20-dc8d-11ee-bb7b-7127cbf2c01f + + + diff --git a/graph/incidents_graphml/a/a4a217e0-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/a/a4a217e0-19b7-11ee-af67-f75f54b1c1f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..563438c94ec60793255d2a448abaef0b56945a88 --- /dev/null +++ b/graph/incidents_graphml/a/a4a217e0-19b7-11ee-af67-f75f54b1c1f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.248 + 100.64.52.248 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688398702 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a4a217e0-19b7-11ee-af67-f75f54b1c1f9 + + + diff --git a/graph/incidents_graphml/a/a4a67a00-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/a/a4a67a00-dc1d-11ee-a712-878bc23f81d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..23467d22ae278982d74b96fe5c7ac66eb3d8234d --- /dev/null +++ b/graph/incidents_graphml/a/a4a67a00-dc1d-11ee-a712-878bc23f81d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.246 + 100.64.12.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709773037 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a4a67a00-dc1d-11ee-a712-878bc23f81d5 + + + diff --git a/graph/incidents_graphml/a/a4a708b0-029b-11ed-9608-918c8d74993e.graphml b/graph/incidents_graphml/a/a4a708b0-029b-11ed-9608-918c8d74993e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f71cb9a366c8e42ea2add21d01f2b5bbd6e7292d --- /dev/null +++ b/graph/incidents_graphml/a/a4a708b0-029b-11ed-9608-918c8d74993e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.67 + 100.64.80.67 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.40 + USER-0015-1837.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657710302 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4a708b0-029b-11ed-9608-918c8d74993e + + + INCIDENT_LINK + 1657710302 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4a708b0-029b-11ed-9608-918c8d74993e + + + diff --git a/graph/incidents_graphml/a/a4ac0130-25bc-11ef-8084-11f20777a6f9.graphml b/graph/incidents_graphml/a/a4ac0130-25bc-11ef-8084-11f20777a6f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3467f1a2654d0e88dc4fff15f691c43dbebeb26c --- /dev/null +++ b/graph/incidents_graphml/a/a4ac0130-25bc-11ef-8084-11f20777a6f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.80 + 100.64.16.80 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717867761 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4ac0130-25bc-11ef-8084-11f20777a6f9 + + + diff --git a/graph/incidents_graphml/a/a4b0e8f0-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4b0e8f0-f063-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..644d35b7c859e705c71738f53da2e8b377bba029 --- /dev/null +++ b/graph/incidents_graphml/a/a4b0e8f0-f063-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.87 + 100.64.60.87 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712002125 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a4b0e8f0-f063-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/a/a4bea490-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4bea490-f063-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08d32dd422e2ec38df9da1393985a8623b84ae48 --- /dev/null +++ b/graph/incidents_graphml/a/a4bea490-f063-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.224 + 100.64.11.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712002125 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4bea490-f063-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/a/a4c7a660-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a4c7a660-f3b2-11ee-876f-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..542a1d0602bfd92235140fde49a49977f190afff --- /dev/null +++ b/graph/incidents_graphml/a/a4c7a660-f3b2-11ee-876f-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.1 + 100.64.44.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712365909 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4c7a660-f3b2-11ee-876f-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/a/a4c9b260-45d0-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/a/a4c9b260-45d0-11ee-95ea-81d84bb304b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9fca76242bb30f96e4a58861da4812e5e437bd04 --- /dev/null +++ b/graph/incidents_graphml/a/a4c9b260-45d0-11ee-95ea-81d84bb304b3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.161 + 100.64.69.161 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"] + + + INCIDENT_LINK + 1693247291 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4c9b260-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247291 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4c9b260-45d0-11ee-95ea-81d84bb304b3 + + + diff --git a/graph/incidents_graphml/a/a4cd5260-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a4cd5260-2543-11ee-9e0c-a5eef0eff951.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6d12d7deed7bad476c2e213ffc024f28c24221f --- /dev/null +++ b/graph/incidents_graphml/a/a4cd5260-2543-11ee-9e0c-a5eef0eff951.graphml @@ -0,0 +1,253 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.16 + USER-0015-1470.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.110 + 100.64.14.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.17 + 100.64.66.17 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.141 + 100.64.56.141 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.18 + 100.64.66.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.19 + 100.64.66.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689668295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4cd5260-2543-11ee-9e0c-a5eef0eff951 + + + INCIDENT_LINK + 1689668295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4cd5260-2543-11ee-9e0c-a5eef0eff951 + + + INCIDENT_LINK + 1689668295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4cd5260-2543-11ee-9e0c-a5eef0eff951 + + + INCIDENT_LINK + 1689668295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4cd5260-2543-11ee-9e0c-a5eef0eff951 + + + INCIDENT_LINK + 1689668295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4cd5260-2543-11ee-9e0c-a5eef0eff951 + + + INCIDENT_LINK + 1689668295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4cd5260-2543-11ee-9e0c-a5eef0eff951 + + + INCIDENT_LINK + 1689668295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4cd5260-2543-11ee-9e0c-a5eef0eff951 + + + INCIDENT_LINK + 1689668295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4cd5260-2543-11ee-9e0c-a5eef0eff951 + + + INCIDENT_LINK + 1689668295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4cd5260-2543-11ee-9e0c-a5eef0eff951 + + + INCIDENT_LINK + 1689668295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4cd5260-2543-11ee-9e0c-a5eef0eff951 + + + diff --git a/graph/incidents_graphml/a/a4cd71a0-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4cd71a0-f063-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d33bbb8154480bc15e63b8225de0ae3d9732a58e --- /dev/null +++ b/graph/incidents_graphml/a/a4cd71a0-f063-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.224 + 100.64.11.224 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712002125 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a4cd71a0-f063-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/a/a4cecb70-1e10-11ee-9177-87bbc2825325.graphml b/graph/incidents_graphml/a/a4cecb70-1e10-11ee-9177-87bbc2825325.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a38cafcbb653ee238c500cb64094c1b15acf3c22 --- /dev/null +++ b/graph/incidents_graphml/a/a4cecb70-1e10-11ee-9177-87bbc2825325.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.81 + 100.64.73.81 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.69.182 + 100.64.69.182 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688876733 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a4cecb70-1e10-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688876733 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a4cecb70-1e10-11ee-9177-87bbc2825325 + + + diff --git a/graph/incidents_graphml/a/a4d8d450-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/a/a4d8d450-01c6-11ee-b478-9b612300fc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d86035bc1359022b5367d914c33d4b131f29ac8e --- /dev/null +++ b/graph/incidents_graphml/a/a4d8d450-01c6-11ee-b478-9b612300fc52.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.198 + 100.64.38.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.173 + 100.64.72.173 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.80.126 + 100.64.80.126 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.80.127 + 100.64.80.127 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.33.183 + 100.64.33.183 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685766317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a4d8d450-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a4d8d450-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a4d8d450-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a4d8d450-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a4d8d450-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a4d8d450-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a4d8d450-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a4d8d450-01c6-11ee-b478-9b612300fc52 + + + diff --git a/graph/incidents_graphml/a/a4dd9f60-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a4dd9f60-f3b2-11ee-876f-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29207d6a14d29c991a9e06d1546af65a7819feea --- /dev/null +++ b/graph/incidents_graphml/a/a4dd9f60-f3b2-11ee-876f-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.1 + 100.64.44.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712365909 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a4dd9f60-f3b2-11ee-876f-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/a/a4e90040-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a4e90040-44ca-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b631914ca8844b67215557fc7354395d18a66abd --- /dev/null +++ b/graph/incidents_graphml/a/a4e90040-44ca-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.151 + 100.64.39.151 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693134763 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a4e90040-44ca-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/a/a4ed56d0-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a4ed56d0-f3b2-11ee-876f-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0ada175055298c9161800efbba6f7579eed2abd --- /dev/null +++ b/graph/incidents_graphml/a/a4ed56d0-f3b2-11ee-876f-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.83 + USER-0015-1218.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712365909 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4ed56d0-f3b2-11ee-876f-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/a/a4ee1e80-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a4ee1e80-85f3-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0492bece57d81fdb6cdf5c71e0aef7e5b2fe001 --- /dev/null +++ b/graph/incidents_graphml/a/a4ee1e80-85f3-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.121 + USER-0015-1433.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299198 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a4ee1e80-85f3-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a4fd12a0-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a4fd12a0-85f3-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a19a5199c09e9053b370bbf644e963172aa90563 --- /dev/null +++ b/graph/incidents_graphml/a/a4fd12a0-85f3-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.121 + USER-0015-1433.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299198 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a4fd12a0-85f3-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a4fee300-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a4fee300-f3b2-11ee-876f-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b2c69f3b3630b700acce76f9512112528b1bc6c --- /dev/null +++ b/graph/incidents_graphml/a/a4fee300-f3b2-11ee-876f-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.83 + USER-0015-1218.example.internal + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712365909 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a4fee300-f3b2-11ee-876f-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/a/a50e29a0-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a50e29a0-85f3-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbbd07b1c479bfc1ac86ea6640eb2f7b9d023a86 --- /dev/null +++ b/graph/incidents_graphml/a/a50e29a0-85f3-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.42 + 100.64.43.42 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299198 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a50e29a0-85f3-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a50ee890-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a50ee890-f3b2-11ee-876f-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a81e42bc085dff74747aa4c139cac97505bd24eb --- /dev/null +++ b/graph/incidents_graphml/a/a50ee890-f3b2-11ee-876f-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.7 + 100.64.10.7 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712365909 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a50ee890-f3b2-11ee-876f-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/a/a51f67b0-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a51f67b0-85f3-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9dbaafa5383b08370cd3c2a2c735cea8900b8570 --- /dev/null +++ b/graph/incidents_graphml/a/a51f67b0-85f3-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.123 + 100.64.59.123 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299198 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a51f67b0-85f3-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a521d450-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a521d450-f3b2-11ee-876f-9d44f1915d3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76479178a030a4cf866b5aee78de6e86c36aba07 --- /dev/null +++ b/graph/incidents_graphml/a/a521d450-f3b2-11ee-876f-9d44f1915d3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.7 + 100.64.10.7 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712365909 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a521d450-f3b2-11ee-876f-9d44f1915d3d + + + diff --git a/graph/incidents_graphml/a/a5285a00-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a5285a00-3f76-11ee-a907-25e49d688e74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76635bff7030d56a06d187cf2c64df9316513936 --- /dev/null +++ b/graph/incidents_graphml/a/a5285a00-3f76-11ee-a907-25e49d688e74.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.158 + 100.64.35.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692548930 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5285a00-3f76-11ee-a907-25e49d688e74 + + + diff --git a/graph/incidents_graphml/a/a53b45c0-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a53b45c0-3f76-11ee-a907-25e49d688e74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b4c62700381df270ae739d8359e11e28aba5357 --- /dev/null +++ b/graph/incidents_graphml/a/a53b45c0-3f76-11ee-a907-25e49d688e74.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.158 + 100.64.35.158 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692548930 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a53b45c0-3f76-11ee-a907-25e49d688e74 + + + diff --git a/graph/incidents_graphml/a/a53dadf0-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a53dadf0-167d-11ee-b43f-0d674d180bfa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..359c3d8e033f3d505b13cd5020d996c9c9978013 --- /dev/null +++ b/graph/incidents_graphml/a/a53dadf0-167d-11ee-b43f-0d674d180bfa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.182 + 100.64.88.182 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688043939 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a53dadf0-167d-11ee-b43f-0d674d180bfa + + + diff --git a/graph/incidents_graphml/a/a54cd740-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a54cd740-dc8d-11ee-bb7b-7127cbf2c01f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..246a5f7bd42613525558dd869ba82d6da2db2aa7 --- /dev/null +++ b/graph/incidents_graphml/a/a54cd740-dc8d-11ee-bb7b-7127cbf2c01f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.173 + 100.64.39.173 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709821141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a54cd740-dc8d-11ee-bb7b-7127cbf2c01f + + + diff --git a/graph/incidents_graphml/a/a54dee70-2d7b-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/a/a54dee70-2d7b-11ef-88d9-1fb9581a602f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3da51d0aa3f1b94a9a75327b6e1212d51f1c1ed0 --- /dev/null +++ b/graph/incidents_graphml/a/a54dee70-2d7b-11ef-88d9-1fb9581a602f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.112.252 + USER-0015-2105.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 10.181.72.179 + 10.181.72.179 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718719455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a54dee70-2d7b-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a54dee70-2d7b-11ef-88d9-1fb9581a602f + + + diff --git a/graph/incidents_graphml/a/a56197c0-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a56197c0-dc8d-11ee-bb7b-7127cbf2c01f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66d834fd715c7b7798db8ac12e471b247a4df4db --- /dev/null +++ b/graph/incidents_graphml/a/a56197c0-dc8d-11ee-bb7b-7127cbf2c01f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.173 + 100.64.39.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709821141 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a56197c0-dc8d-11ee-bb7b-7127cbf2c01f + + + diff --git a/graph/incidents_graphml/a/a56d19a0-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a56d19a0-1d94-11ee-8e9e-f91508f5bdfe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bce92f817b460c6d55c4ac007abaca362131f899 --- /dev/null +++ b/graph/incidents_graphml/a/a56d19a0-1d94-11ee-8e9e-f91508f5bdfe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688823476 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56d19a0-1d94-11ee-8e9e-f91508f5bdfe + + + diff --git a/graph/incidents_graphml/a/a56fc550-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a56fc550-6071-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a0181523b011fa336b143c05f351bc6fb98c18d --- /dev/null +++ b/graph/incidents_graphml/a/a56fc550-6071-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,725 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.80 + 100.64.77.80 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.220 + 100.64.71.220 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.3.166 + 100.64.3.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.173 + 100.64.1.173 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.77.81 + 100.64.77.81 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.129 + 100.64.71.129 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.77.82 + 100.64.77.82 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.102 + 100.64.1.102 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.77.83 + 100.64.77.83 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.84 + 100.64.77.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.85 + 100.64.77.85 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.32 + 100.64.73.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.77.86 + 100.64.77.86 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.87 + 100.64.77.87 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.212 + 100.64.72.212 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.77.88 + 100.64.77.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.77.89 + 100.64.77.89 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.90 + 100.64.77.90 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.91 + 100.64.77.91 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a56fc550-6071-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/a/a571c120-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a571c120-6071-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d891e1b9bb401bb33d5cc963ad0aacbd52d20f1c --- /dev/null +++ b/graph/incidents_graphml/a/a571c120-6071-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.165.183 + 192.168.165.183 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 10.148.128.32 + 10.148.128.32 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1668027674 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a571c120-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027674 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a571c120-6071-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/a/a57b2c20-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a57b2c20-167d-11ee-b43f-0d674d180bfa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..546d90ef91b255d94aecf89b96dffa7f8d10287e --- /dev/null +++ b/graph/incidents_graphml/a/a57b2c20-167d-11ee-b43f-0d674d180bfa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.182 + 100.64.88.182 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688043940 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a57b2c20-167d-11ee-b43f-0d674d180bfa + + + diff --git a/graph/incidents_graphml/a/a57b6ee0-adb1-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/a/a57b6ee0-adb1-11ed-a9cd-bdbbd3b810c7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c5cb3577a5e5c5797ea658865633f4fc119d7c2 --- /dev/null +++ b/graph/incidents_graphml/a/a57b6ee0-adb1-11ed-a9cd-bdbbd3b810c7.graphml @@ -0,0 +1,62 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + CRED + CRED-0011 + ["Suspicious User"] + 0.625 + ["Windows Active Directory","AWS Instance Backup"] + + + HOST + 100.64.83.129 + HOST-16719 + ["Exploiting Host"] + 0.71875 + ["Precinct","AWS Instance Backup"] + + + INCIDENT_LINK + 1676521401 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Host"] + complete-mission + Unprocessed + a57b6ee0-adb1-11ed-a9cd-bdbbd3b810c7 + + + diff --git a/graph/incidents_graphml/a/a58304c0-1ca6-11ee-8a30-871cf58c099a.graphml b/graph/incidents_graphml/a/a58304c0-1ca6-11ee-8a30-871cf58c099a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45b48f413eacb5ce7a8a98dcd2d991f2382aa157 --- /dev/null +++ b/graph/incidents_graphml/a/a58304c0-1ca6-11ee-8a30-871cf58c099a.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.149 + 100.64.54.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.150 + 100.64.54.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688721256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a58304c0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a58304c0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a58304c0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a58304c0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a58304c0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a58304c0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a58304c0-1ca6-11ee-8a30-871cf58c099a + + + INCIDENT_LINK + 1688721256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a58304c0-1ca6-11ee-8a30-871cf58c099a + + + diff --git a/graph/incidents_graphml/a/a5852c30-3ca6-11ee-874c-c948d9dda210.graphml b/graph/incidents_graphml/a/a5852c30-3ca6-11ee-874c-c948d9dda210.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cbab04b939f503568732fe3e0d6ce3b502d5e28 --- /dev/null +++ b/graph/incidents_graphml/a/a5852c30-3ca6-11ee-874c-c948d9dda210.graphml @@ -0,0 +1,437 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.208 + 100.64.47.208 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.209 + 100.64.47.209 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.188 + 100.64.5.188 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.162 + 100.64.7.162 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.210 + 100.64.47.210 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.211 + 100.64.47.211 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.15 + 100.64.25.15 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.166 + 100.64.36.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.212 + 100.64.47.212 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.43 + 100.64.35.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.213 + 100.64.47.213 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5852c30-3ca6-11ee-874c-c948d9dda210 + + + diff --git a/graph/incidents_graphml/a/a58a56f0-aa17-11ed-b13a-3357fb14248f.graphml b/graph/incidents_graphml/a/a58a56f0-aa17-11ed-b13a-3357fb14248f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a8b013e13d771ebcd0b07a74233a80ed6e22be6 --- /dev/null +++ b/graph/incidents_graphml/a/a58a56f0-aa17-11ed-b13a-3357fb14248f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.30 + 100.64.86.30 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676125405 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a58a56f0-aa17-11ed-b13a-3357fb14248f + + + diff --git a/graph/incidents_graphml/a/a58d3d20-aa17-11ed-b13a-3357fb14248f.graphml b/graph/incidents_graphml/a/a58d3d20-aa17-11ed-b13a-3357fb14248f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc8b7375c17bac9746e683dce9661a3acaae6248 --- /dev/null +++ b/graph/incidents_graphml/a/a58d3d20-aa17-11ed-b13a-3357fb14248f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1676125405 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a58d3d20-aa17-11ed-b13a-3357fb14248f + + + diff --git a/graph/incidents_graphml/a/a590eae0-2d7b-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/a/a590eae0-2d7b-11ef-88d9-1fb9581a602f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9f136322380aeb83249e1db9feb612272daa0cb --- /dev/null +++ b/graph/incidents_graphml/a/a590eae0-2d7b-11ef-88d9-1fb9581a602f.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.149.108.24 + 10.149.108.24 + ["Exploiting Host"] + 0.4375 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.3.33 + 100.64.3.33 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718719455 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a590eae0-2d7b-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719455 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a590eae0-2d7b-11ef-88d9-1fb9581a602f + + + diff --git a/graph/incidents_graphml/a/a591a9f0-aa17-11ed-b13a-3357fb14248f.graphml b/graph/incidents_graphml/a/a591a9f0-aa17-11ed-b13a-3357fb14248f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8c83652ca0f743504c766edd20f9d9ea584c2fc --- /dev/null +++ b/graph/incidents_graphml/a/a591a9f0-aa17-11ed-b13a-3357fb14248f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676125405 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a591a9f0-aa17-11ed-b13a-3357fb14248f + + + diff --git a/graph/incidents_graphml/a/a5970120-aa17-11ed-b13a-3357fb14248f.graphml b/graph/incidents_graphml/a/a5970120-aa17-11ed-b13a-3357fb14248f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5b2d9fd62810d6f7175ed95a541bddf7a043302 --- /dev/null +++ b/graph/incidents_graphml/a/a5970120-aa17-11ed-b13a-3357fb14248f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.31 + 100.64.86.31 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676125405 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a5970120-aa17-11ed-b13a-3357fb14248f + + + diff --git a/graph/incidents_graphml/a/a59b2530-3ca6-11ee-874c-c948d9dda210.graphml b/graph/incidents_graphml/a/a59b2530-3ca6-11ee-874c-c948d9dda210.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d20954491143794a907c63c6eadf73c2f64a05c1 --- /dev/null +++ b/graph/incidents_graphml/a/a59b2530-3ca6-11ee-874c-c948d9dda210.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.68 + 100.64.25.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.105 + 100.64.40.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.222 + 100.64.47.222 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.139 + 100.64.35.139 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.223 + 100.64.47.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.224 + 100.64.47.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.225 + 100.64.47.225 + ["Exploiting Host"] + 0.7525 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + INCIDENT_LINK + 1692239693 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a59b2530-3ca6-11ee-874c-c948d9dda210 + + + diff --git a/graph/incidents_graphml/a/a59e6440-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a59e6440-ebe2-11ec-a061-5b442ef1448c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edb8f898219dbbacb5b05db43142550147757c6c --- /dev/null +++ b/graph/incidents_graphml/a/a59e6440-ebe2-11ec-a061-5b442ef1448c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.9 + USER-0015-1637.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655211921 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a59e6440-ebe2-11ec-a061-5b442ef1448c + + + diff --git a/graph/incidents_graphml/a/a5b9b300-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a5b9b300-1d94-11ee-8e9e-f91508f5bdfe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1faa00a02fe38ffba695d361442d2b3032ee1dd --- /dev/null +++ b/graph/incidents_graphml/a/a5b9b300-1d94-11ee-8e9e-f91508f5bdfe.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.204 + 100.64.46.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688823476 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5b9b300-1d94-11ee-8e9e-f91508f5bdfe + + + INCIDENT_LINK + 1688823476 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5b9b300-1d94-11ee-8e9e-f91508f5bdfe + + + diff --git a/graph/incidents_graphml/a/a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/a/a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce8b8550d2b2a8c20d8d1b7b882d6f08bc5817aa --- /dev/null +++ b/graph/incidents_graphml/a/a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.107 + 100.64.72.107 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.255 + 100.64.70.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.108 + 100.64.72.108 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690711115 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711115 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711115 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3 + + + INCIDENT_LINK + 1690711115 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3 + + + diff --git a/graph/incidents_graphml/a/a5bed2f0-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a5bed2f0-dc8d-11ee-bb7b-7127cbf2c01f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa45f8f5d77bf60a101b1922f1f24193f4d1f9d9 --- /dev/null +++ b/graph/incidents_graphml/a/a5bed2f0-dc8d-11ee-bb7b-7127cbf2c01f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709821142 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5bed2f0-dc8d-11ee-bb7b-7127cbf2c01f + + + diff --git a/graph/incidents_graphml/a/a5bfe050-9daa-11ed-a07d-2388b6eb4361.graphml b/graph/incidents_graphml/a/a5bfe050-9daa-11ed-a07d-2388b6eb4361.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b6b3d040f90884cec4f5d25e01d7aa653653d11 --- /dev/null +++ b/graph/incidents_graphml/a/a5bfe050-9daa-11ed-a07d-2388b6eb4361.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.59 + 100.64.12.59 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1674759176 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a5bfe050-9daa-11ed-a07d-2388b6eb4361 + + + diff --git a/graph/incidents_graphml/a/a5c69710-9daa-11ed-a07d-2388b6eb4361.graphml b/graph/incidents_graphml/a/a5c69710-9daa-11ed-a07d-2388b6eb4361.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8236109e06dc6cfa3fa1e245074cfeb7a8d969e1 --- /dev/null +++ b/graph/incidents_graphml/a/a5c69710-9daa-11ed-a07d-2388b6eb4361.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.12.59 + 100.64.12.59 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1674759176 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a5c69710-9daa-11ed-a07d-2388b6eb4361 + + + diff --git a/graph/incidents_graphml/a/a5c981d0-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a5c981d0-65c6-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f41ee5588f56069a1f70d8cedcde2cd5a1ef783 --- /dev/null +++ b/graph/incidents_graphml/a/a5c981d0-65c6-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.149 + 100.64.81.149 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.195 + 100.64.73.195 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1668613937 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5c981d0-65c6-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668613937 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5c981d0-65c6-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/a/a5cb9fa0-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/a/a5cb9fa0-2a11-11ee-ab73-f1f4f0adc079.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb08d7898c7ecaff96a5aa03ef0e410884067614 --- /dev/null +++ b/graph/incidents_graphml/a/a5cb9fa0-2a11-11ee-ab73-f1f4f0adc079.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.130.247.61 + 10.130.247.61 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.82.128 + 100.64.82.128 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690196578 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5cb9fa0-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196578 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5cb9fa0-2a11-11ee-ab73-f1f4f0adc079 + + + diff --git a/graph/incidents_graphml/a/a5cc6800-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a5cc6800-65c6-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcffd06d9d7d03912cc9aebed815947565b002cf --- /dev/null +++ b/graph/incidents_graphml/a/a5cc6800-65c6-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.150 + 100.64.81.150 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.90 + 100.64.71.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1668613937 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5cc6800-65c6-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668613937 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5cc6800-65c6-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/a/a5d2d020-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a5d2d020-dc8d-11ee-bb7b-7127cbf2c01f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45601ae3702c33ff5c33ef2748a0f355741d9bbb --- /dev/null +++ b/graph/incidents_graphml/a/a5d2d020-dc8d-11ee-bb7b-7127cbf2c01f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709821142 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a5d2d020-dc8d-11ee-bb7b-7127cbf2c01f + + + diff --git a/graph/incidents_graphml/a/a5dbb9f0-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a5dbb9f0-1d94-11ee-8e9e-f91508f5bdfe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b11ca39b20fac2ac0028352d10fecaecfc39fb2 --- /dev/null +++ b/graph/incidents_graphml/a/a5dbb9f0-1d94-11ee-8e9e-f91508f5bdfe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.204 + 100.64.46.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688823477 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a5dbb9f0-1d94-11ee-8e9e-f91508f5bdfe + + + diff --git a/graph/incidents_graphml/a/a5e67d00-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/a/a5e67d00-bc68-11ed-b487-1b4dcbdf8241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..581d1a374122e9d23cc0a8c0ff6f00e4c2f2af9f --- /dev/null +++ b/graph/incidents_graphml/a/a5e67d00-bc68-11ed-b487-1b4dcbdf8241.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.200 + 100.64.88.200 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678139316 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e67d00-bc68-11ed-b487-1b4dcbdf8241 + + + diff --git a/graph/incidents_graphml/a/a5e70600-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a5e70600-ebe2-11ec-a061-5b442ef1448c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7a741ee20d0bf9c55a1085b83ae037a01a75eaa --- /dev/null +++ b/graph/incidents_graphml/a/a5e70600-ebe2-11ec-a061-5b442ef1448c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.9 + USER-0015-1637.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655211922 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a5e70600-ebe2-11ec-a061-5b442ef1448c + + + diff --git a/graph/incidents_graphml/a/a5e96390-47db-11ee-b496-6fe4711b3325.graphml b/graph/incidents_graphml/a/a5e96390-47db-11ee-b496-6fe4711b3325.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dede123ff21ef90ee9b3ca27a0daa077550b19cb --- /dev/null +++ b/graph/incidents_graphml/a/a5e96390-47db-11ee-b496-6fe4711b3325.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.196 + 100.64.38.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.106 + 100.64.17.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.157 + 100.64.9.157 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.16 + 100.64.52.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.17 + 100.64.52.17 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.228 + 100.64.37.228 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.18 + 100.64.52.18 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.19 + 100.64.52.19 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.20 + 100.64.52.20 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.191 + 100.64.9.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.21 + 100.64.52.21 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.22 + 100.64.52.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471920 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5e96390-47db-11ee-b496-6fe4711b3325 + + + diff --git a/graph/incidents_graphml/a/a5ea2d60-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/a/a5ea2d60-09ab-11ef-a326-59a1bcca7fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa98dc25770c542132ea0cd7438cd4cfea37b10d --- /dev/null +++ b/graph/incidents_graphml/a/a5ea2d60-09ab-11ef-a326-59a1bcca7fdf.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.12 + 100.64.2.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.111 + 100.64.34.111 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.49 + 100.64.49.49 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714781830 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5ea2d60-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781830 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5ea2d60-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781830 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5ea2d60-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781830 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5ea2d60-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781830 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5ea2d60-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781830 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a5ea2d60-09ab-11ef-a326-59a1bcca7fdf + + + diff --git a/graph/incidents_graphml/a/a5ed5ad0-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/a/a5ed5ad0-bc68-11ed-b487-1b4dcbdf8241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cada68fd8cf3dafa13107fa49b3b29fd00c7dd59 --- /dev/null +++ b/graph/incidents_graphml/a/a5ed5ad0-bc68-11ed-b487-1b4dcbdf8241.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.88.212 + 100.64.88.212 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678139316 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a5ed5ad0-bc68-11ed-b487-1b4dcbdf8241 + + + diff --git a/graph/incidents_graphml/a/a5ef4cc0-15a3-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a5ef4cc0-15a3-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef72e703d6937f305bf74302bdd55a42f5cdad23 --- /dev/null +++ b/graph/incidents_graphml/a/a5ef4cc0-15a3-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.251 + 100.64.66.251 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.233 + 100.64.73.233 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687950310 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a5ef4cc0-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950310 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a5ef4cc0-15a3-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/a/a5f4a3e0-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a5f4a3e0-44ca-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63c200691aff4e12ec3d4e281d02f99c5883350d --- /dev/null +++ b/graph/incidents_graphml/a/a5f4a3e0-44ca-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.133 + 100.64.13.133 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693134765 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5f4a3e0-44ca-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/a/a5fb5370-d4fd-11ee-b65b-9d9885766d0d.graphml b/graph/incidents_graphml/a/a5fb5370-d4fd-11ee-b65b-9d9885766d0d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b722e6e9d4f06abf8acdc211ac9a245a12f1402 --- /dev/null +++ b/graph/incidents_graphml/a/a5fb5370-d4fd-11ee-b65b-9d9885766d0d.graphml @@ -0,0 +1,895 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.157 + 100.64.27.157 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.158 + 100.64.27.158 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.100 + 100.64.22.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.159 + 100.64.27.159 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.160 + 100.64.27.160 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.161 + 100.64.27.161 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.181 + 100.64.8.181 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.162 + 100.64.27.162 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.27 + 100.64.21.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.163 + 100.64.27.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.118 + 100.64.8.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.164 + 100.64.27.164 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.11 + 100.64.25.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.165 + 100.64.27.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.166 + USER-0015-1265.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.10 + 100.64.8.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989637 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a5fb5370-d4fd-11ee-b65b-9d9885766d0d + + + diff --git a/graph/incidents_graphml/a/a5ff4780-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a5ff4780-1d94-11ee-8e9e-f91508f5bdfe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..219b2e6a02e05d17651b7c2534b73d9f1f3d440d --- /dev/null +++ b/graph/incidents_graphml/a/a5ff4780-1d94-11ee-8e9e-f91508f5bdfe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.204 + 100.64.46.204 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688823477 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a5ff4780-1d94-11ee-8e9e-f91508f5bdfe + + + diff --git a/graph/incidents_graphml/a/a6014e20-15a3-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a6014e20-15a3-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2593b0b42a6214a141fb636719ea22342280d972 --- /dev/null +++ b/graph/incidents_graphml/a/a6014e20-15a3-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.91 + 100.64.40.91 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.220 + 100.64.71.220 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.234 + 100.64.73.234 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.235 + 100.64.73.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687950310 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6014e20-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950310 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6014e20-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950310 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6014e20-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950310 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6014e20-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950310 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6014e20-15a3-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687950310 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6014e20-15a3-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/a/a6022c30-39b8-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/a/a6022c30-39b8-11ee-84c9-adc60bfa2a04.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6ac70ac6379ce1beae53cc034aa2335af1f0b9c --- /dev/null +++ b/graph/incidents_graphml/a/a6022c30-39b8-11ee-84c9-adc60bfa2a04.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.7.183 + 172.18.7.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.35 + USER-0015-2058.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691917571 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6022c30-39b8-11ee-84c9-adc60bfa2a04 + + + INCIDENT_LINK + 1691917571 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6022c30-39b8-11ee-84c9-adc60bfa2a04 + + + diff --git a/graph/incidents_graphml/a/a6074180-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a6074180-44ca-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..014b4b2ae763b539f8589c15290e38828b94ae7a --- /dev/null +++ b/graph/incidents_graphml/a/a6074180-44ca-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.133 + 100.64.13.133 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693134765 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6074180-44ca-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/a/a610c7e0-2c8a-11ed-be76-c750f0345c87.graphml b/graph/incidents_graphml/a/a610c7e0-2c8a-11ed-be76-c750f0345c87.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37fa7fae7baa67037b243d51a7583890e041bc73 --- /dev/null +++ b/graph/incidents_graphml/a/a610c7e0-2c8a-11ed-be76-c750f0345c87.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.226 + 100.64.71.226 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.72 + 100.64.73.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.250 + 100.64.70.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662320952 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a610c7e0-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320952 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a610c7e0-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320952 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a610c7e0-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320952 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a610c7e0-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320952 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a610c7e0-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320952 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a610c7e0-2c8a-11ed-be76-c750f0345c87 + + + diff --git a/graph/incidents_graphml/a/a61635a0-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a61635a0-44ca-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d39a6cb05416b089213e919d90dae20e139aefc0 --- /dev/null +++ b/graph/incidents_graphml/a/a61635a0-44ca-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.123 + 100.64.8.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693134765 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a61635a0-44ca-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/a/a62595a0-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a62595a0-ebe2-11ec-a061-5b442ef1448c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f28ecf14b6a9961c26096e3a15476cb664c5b0a1 --- /dev/null +++ b/graph/incidents_graphml/a/a62595a0-ebe2-11ec-a061-5b442ef1448c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.28 + 100.64.1.28 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.181 + 100.64.72.181 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655211922 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a62595a0-ebe2-11ec-a061-5b442ef1448c + + + diff --git a/graph/incidents_graphml/a/a636de70-555c-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/a/a636de70-555c-11ee-8e2f-e12aa4f0d6f4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..318421f1c7c936795058154598b88467d38a0852 --- /dev/null +++ b/graph/incidents_graphml/a/a636de70-555c-11ee-8e2f-e12aa4f0d6f4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.28 + USER-0015-1345.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694956691 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a636de70-555c-11ee-8e2f-e12aa4f0d6f4 + + + diff --git a/graph/incidents_graphml/a/a647ff60-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/a/a647ff60-274f-11ee-9ae4-f7600c9ae4b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c063a84308f4c7498b4076d642931f0b6631950 --- /dev/null +++ b/graph/incidents_graphml/a/a647ff60-274f-11ee-9ae4-f7600c9ae4b6.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.51 + 100.64.63.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.81 + 100.64.47.81 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.52 + 100.64.63.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.22 + 100.64.28.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.3 + 100.64.34.3 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.53 + 100.64.63.53 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.54 + 100.64.63.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.55 + 100.64.63.55 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.227 + 100.64.34.227 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a647ff60-274f-11ee-9ae4-f7600c9ae4b6 + + + diff --git a/graph/incidents_graphml/a/a65944e0-9947-11ee-986d-1bbc30865dce.graphml b/graph/incidents_graphml/a/a65944e0-9947-11ee-986d-1bbc30865dce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..601c90c635efb789c68c47a5cb3b147dc8ddf6cb --- /dev/null +++ b/graph/incidents_graphml/a/a65944e0-9947-11ee-986d-1bbc30865dce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.251 + 100.64.43.251 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702424350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a65944e0-9947-11ee-986d-1bbc30865dce + + + diff --git a/graph/incidents_graphml/a/a65e13c0-0dad-11ed-ab9d-bfbb3b98ef66.graphml b/graph/incidents_graphml/a/a65e13c0-0dad-11ed-ab9d-bfbb3b98ef66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05778394bdf1e89dbbbc38009cc6c172ca210ed6 --- /dev/null +++ b/graph/incidents_graphml/a/a65e13c0-0dad-11ed-ab9d-bfbb3b98ef66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.94 + 100.64.71.94 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1658927499 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a65e13c0-0dad-11ed-ab9d-bfbb3b98ef66 + + + diff --git a/graph/incidents_graphml/a/a6606960-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/a/a6606960-274f-11ee-9ae4-f7600c9ae4b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92d2e65b0ba7799b03ea7d0bda22fefa06c45b22 --- /dev/null +++ b/graph/incidents_graphml/a/a6606960-274f-11ee-9ae4-f7600c9ae4b6.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.90 + 100.64.12.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.61 + 100.64.63.61 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.62 + 100.64.63.62 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.63 + 100.64.63.63 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.64 + 100.64.63.64 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.221 + USER-0015-1424.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893354 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6606960-274f-11ee-9ae4-f7600c9ae4b6 + + + diff --git a/graph/incidents_graphml/a/a666a660-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a666a660-3f76-11ee-a907-25e49d688e74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c593a282ef81264686eba40d3d7667e9b0fc10d3 --- /dev/null +++ b/graph/incidents_graphml/a/a666a660-3f76-11ee-a907-25e49d688e74.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.153 + 100.64.35.153 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692548932 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a666a660-3f76-11ee-a907-25e49d688e74 + + + diff --git a/graph/incidents_graphml/a/a6677810-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a6677810-85f3-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0b0168c31fab309e26cad5f3e791bf301d55aad --- /dev/null +++ b/graph/incidents_graphml/a/a6677810-85f3-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.38 + 100.64.6.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299201 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a6677810-85f3-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a66b17d0-4166-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/a/a66b17d0-4166-11ee-89c1-af7b5492d246.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40729743965fc45fed25a7d71d604eef7a9850e9 --- /dev/null +++ b/graph/incidents_graphml/a/a66b17d0-4166-11ee-89c1-af7b5492d246.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.18.177 + 100.64.18.177 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692761963 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a66b17d0-4166-11ee-89c1-af7b5492d246 + + + diff --git a/graph/incidents_graphml/a/a6736780-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a6736780-ebe2-11ec-a061-5b442ef1448c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b567bced95300db8341ad38e8c907be29a99c56 --- /dev/null +++ b/graph/incidents_graphml/a/a6736780-ebe2-11ec-a061-5b442ef1448c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.179 + 100.64.72.179 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655211922 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a6736780-ebe2-11ec-a061-5b442ef1448c + + + diff --git a/graph/incidents_graphml/a/a6748c90-47db-11ee-b496-6fe4711b3325.graphml b/graph/incidents_graphml/a/a6748c90-47db-11ee-b496-6fe4711b3325.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb3f32d73a6eb25e1c1c1ae70bea979cf1221c33 --- /dev/null +++ b/graph/incidents_graphml/a/a6748c90-47db-11ee-b496-6fe4711b3325.graphml @@ -0,0 +1,799 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.136 + 100.64.18.136 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.46 + 100.64.36.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.30 + 100.64.52.30 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.31 + 100.64.52.31 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.32 + 100.64.52.32 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.177 + 100.64.23.177 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.33 + 100.64.52.33 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.22 + 100.64.18.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.106 + 100.64.49.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.179 + 100.64.15.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.179 + 100.64.26.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.252 + 100.64.36.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.153 + 100.64.8.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.34 + 100.64.52.34 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.35 + 100.64.52.35 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.36 + 100.64.52.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.37 + 100.64.52.37 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.38 + 100.64.52.38 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.39 + 100.64.52.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + INCIDENT_LINK + 1693471921 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6748c90-47db-11ee-b496-6fe4711b3325 + + + diff --git a/graph/incidents_graphml/a/a6770870-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a6770870-85f3-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..655589c116b7d4fa88657ec36b54c508a0ae94f1 --- /dev/null +++ b/graph/incidents_graphml/a/a6770870-85f3-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.38 + 100.64.6.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299201 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a6770870-85f3-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4.graphml b/graph/incidents_graphml/a/a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9107b8fcc86cad88f2ee72428410c84e0effcc26 --- /dev/null +++ b/graph/incidents_graphml/a/a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.187 + 100.64.10.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.121 + 100.64.71.121 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.167 + 100.64.80.167 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.41.147 + USER-0015-1844.example.internal + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.80.168 + 100.64.80.168 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688490188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490188 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4 + + + diff --git a/graph/incidents_graphml/a/a686afc0-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a686afc0-7985-11ee-ade7-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67f0e04aa4b714c5ebd355d98fda04dd285d2430 --- /dev/null +++ b/graph/incidents_graphml/a/a686afc0-7985-11ee-ade7-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.1 + 100.64.66.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698932542 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a686afc0-7985-11ee-ade7-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a68a7410-d4fd-11ee-b65b-9d9885766d0d.graphml b/graph/incidents_graphml/a/a68a7410-d4fd-11ee-b65b-9d9885766d0d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..769b7e4cc3982a09956da592c48f774f388e9c03 --- /dev/null +++ b/graph/incidents_graphml/a/a68a7410-d4fd-11ee-b65b-9d9885766d0d.graphml @@ -0,0 +1,845 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.177 + 100.64.27.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.11 + 100.64.25.11 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.151 + 100.64.8.151 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.178 + 100.64.27.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.179 + 100.64.27.179 + ["Exploiting Host"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.83 + 100.64.23.83 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.62 + 100.64.22.62 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.180 + 100.64.27.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.198 + 100.64.14.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.181 + 100.64.27.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.234 + 100.64.25.234 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.182 + 100.64.27.182 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989638 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a68a7410-d4fd-11ee-b65b-9d9885766d0d + + + diff --git a/graph/incidents_graphml/a/a694b980-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a694b980-7985-11ee-ade7-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..150c28a051833e30bef72e161975e6bc9d23fa38 --- /dev/null +++ b/graph/incidents_graphml/a/a694b980-7985-11ee-ade7-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.2 + 100.64.66.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698932542 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a694b980-7985-11ee-ade7-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a6a138d0-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a6a138d0-15bd-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18e2febd410debd23ce222e7de795a04beaacb49 --- /dev/null +++ b/graph/incidents_graphml/a/a6a138d0-15bd-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.112 + 100.64.43.112 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.161 + 100.64.72.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687961478 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6a138d0-15bd-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687961478 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6a138d0-15bd-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687961478 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6a138d0-15bd-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687961478 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6a138d0-15bd-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/a/a6a50d30-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a6a50d30-7985-11ee-ade7-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6a10408934288ee9a7257aeed1fd012983a5699 --- /dev/null +++ b/graph/incidents_graphml/a/a6a50d30-7985-11ee-ade7-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.2 + 100.64.66.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698932542 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a6a50d30-7985-11ee-ade7-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a6ae2690-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a6ae2690-ebe2-11ec-a061-5b442ef1448c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7dde6fdcf98091e14d3bd5ee57f277905515ee6 --- /dev/null +++ b/graph/incidents_graphml/a/a6ae2690-ebe2-11ec-a061-5b442ef1448c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.179 + 100.64.72.179 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655211923 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6ae2690-ebe2-11ec-a061-5b442ef1448c + + + diff --git a/graph/incidents_graphml/a/a6b9c7c0-482f-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/a/a6b9c7c0-482f-11ee-a737-6b545b426b37.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20f3b1ab59bfb4624772e4eabc15bb49201e30df --- /dev/null +++ b/graph/incidents_graphml/a/a6b9c7c0-482f-11ee-a737-6b545b426b37.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.220 + 100.64.52.220 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.130 + 100.64.56.130 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.136 + 100.64.54.136 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.131 + 100.64.56.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.90 + 100.64.41.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.132 + 100.64.56.132 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.94 + 100.64.37.94 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.133 + 100.64.56.133 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.100 + 100.64.21.100 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.239 + 100.64.13.239 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.134 + 100.64.56.134 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.135 + 100.64.56.135 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.179 + 100.64.52.179 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.154 + 100.64.33.154 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.221 + 100.64.13.221 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693507999 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6b9c7c0-482f-11ee-a737-6b545b426b37 + + + diff --git a/graph/incidents_graphml/a/a6c0e340-72da-11ee-8d2c-297df9484f05.graphml b/graph/incidents_graphml/a/a6c0e340-72da-11ee-8d2c-297df9484f05.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3be6c5d2054d7ff1c2e991645d6da152c3d323c2 --- /dev/null +++ b/graph/incidents_graphml/a/a6c0e340-72da-11ee-8d2c-297df9484f05.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.83 + 100.64.60.83 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698199392 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a6c0e340-72da-11ee-8d2c-297df9484f05 + + + diff --git a/graph/incidents_graphml/a/a6cb8740-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/a/a6cb8740-274f-11ee-9ae4-f7600c9ae4b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b6d57f9a2f26040e69cfefed33dc46892ffcfab --- /dev/null +++ b/graph/incidents_graphml/a/a6cb8740-274f-11ee-9ae4-f7600c9ae4b6.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.69 + 100.64.63.69 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.25 + 100.64.12.25 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.70 + USER-0015-1451.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689893355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6cb8740-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6cb8740-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6cb8740-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6cb8740-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6cb8740-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893355 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6cb8740-274f-11ee-9ae4-f7600c9ae4b6 + + + diff --git a/graph/incidents_graphml/a/a6d27600-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a6d27600-1d94-11ee-8e9e-f91508f5bdfe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba088ae5b92d2c593eec508b326400c56b327883 --- /dev/null +++ b/graph/incidents_graphml/a/a6d27600-1d94-11ee-8e9e-f91508f5bdfe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.107 + 100.64.7.107 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688823478 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6d27600-1d94-11ee-8e9e-f91508f5bdfe + + + diff --git a/graph/incidents_graphml/a/a6d8d860-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/a/a6d8d860-14b1-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ca523ef74742edb27b51be76f2075c4551236b7 --- /dev/null +++ b/graph/incidents_graphml/a/a6d8d860-14b1-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.187 + 100.64.10.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.22.102 + 100.64.22.102 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.91 + 100.64.72.91 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.30.68 + 100.64.30.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.135 + 100.64.79.135 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6d8d860-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6d8d860-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6d8d860-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6d8d860-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6d8d860-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6d8d860-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6d8d860-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6d8d860-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6d8d860-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6d8d860-14b1-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/a/a6eb27e0-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/a/a6eb27e0-14b1-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ca3a5fa8fb374c4fc57a80cecea9c0efc333dd1 --- /dev/null +++ b/graph/incidents_graphml/a/a6eb27e0-14b1-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.136 + 100.64.79.136 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.74.76 + 100.64.74.76 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.137 + 100.64.79.137 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.79.138 + 100.64.79.138 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6eb27e0-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6eb27e0-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6eb27e0-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6eb27e0-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6eb27e0-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846373 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6eb27e0-14b1-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/a/a6ebf2e0-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a6ebf2e0-ebe2-11ec-a061-5b442ef1448c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38cd5430da4b4cf71c18c3c42dc922ad2e2dd621 --- /dev/null +++ b/graph/incidents_graphml/a/a6ebf2e0-ebe2-11ec-a061-5b442ef1448c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.180 + USER-0015-1638.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655211923 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a6ebf2e0-ebe2-11ec-a061-5b442ef1448c + + + diff --git a/graph/incidents_graphml/a/a6f02700-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a6f02700-dc8d-11ee-bb7b-7127cbf2c01f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..499076bfa79d728df0e3532478d5c6d5aca93f0d --- /dev/null +++ b/graph/incidents_graphml/a/a6f02700-dc8d-11ee-bb7b-7127cbf2c01f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.197 + USER-0015-1283.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709821144 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a6f02700-dc8d-11ee-bb7b-7127cbf2c01f + + + diff --git a/graph/incidents_graphml/a/a6f67a30-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a6f67a30-21f1-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1831cf55b5d9bde258bbc2e5acfad3715900b381 --- /dev/null +++ b/graph/incidents_graphml/a/a6f67a30-21f1-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.216 + 100.64.68.216 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1689303226 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6f67a30-21f1-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/a/a6ff30b0-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a6ff30b0-2289-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49611eebae1e72b7309c5a09c3f01ffd6a610b29 --- /dev/null +++ b/graph/incidents_graphml/a/a6ff30b0-2289-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.107 + 100.64.57.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689368510 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a6ff30b0-2289-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/a/a7004550-00b8-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/a/a7004550-00b8-11ef-8b56-b9c5ad676a8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..762c5e908c7328cf6d29bbcd0c8886be2e0a5f5a --- /dev/null +++ b/graph/incidents_graphml/a/a7004550-00b8-11ef-8b56-b9c5ad676a8a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.103 + 100.64.18.103 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect"] + + + INCIDENT_LINK + 1713797854 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7004550-00b8-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797854 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7004550-00b8-11ef-8b56-b9c5ad676a8a + + + diff --git a/graph/incidents_graphml/a/a708b810-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a708b810-dc8d-11ee-bb7b-7127cbf2c01f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec3cf1a13801127e97df5ebbeaab4bcf83cc2c9f --- /dev/null +++ b/graph/incidents_graphml/a/a708b810-dc8d-11ee-bb7b-7127cbf2c01f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.197 + USER-0015-1283.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709821144 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a708b810-dc8d-11ee-bb7b-7127cbf2c01f + + + diff --git a/graph/incidents_graphml/a/a70d9320-9c9c-11ee-b60c-751684393f5d.graphml b/graph/incidents_graphml/a/a70d9320-9c9c-11ee-b60c-751684393f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0633458b8bc9aff12325461bac9c26b84351f2da --- /dev/null +++ b/graph/incidents_graphml/a/a70d9320-9c9c-11ee-b60c-751684393f5d.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.121 + 100.64.68.121 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"] + + + HOST + 100.64.8.78 + 100.64.8.78 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.122 + 100.64.68.122 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.22.250 + 100.64.22.250 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1702790712 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a70d9320-9c9c-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702790712 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a70d9320-9c9c-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702790712 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a70d9320-9c9c-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702790712 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a70d9320-9c9c-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702790712 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a70d9320-9c9c-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702790712 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a70d9320-9c9c-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702790712 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a70d9320-9c9c-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702790712 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a70d9320-9c9c-11ee-b60c-751684393f5d + + + diff --git a/graph/incidents_graphml/a/a714bae0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/a/a714bae0-dc1d-11ee-a712-878bc23f81d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..665d9cd69331e6e76a792f8f887530970416c9ff --- /dev/null +++ b/graph/incidents_graphml/a/a714bae0-dc1d-11ee-a712-878bc23f81d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.214 + 100.64.58.214 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709773041 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a714bae0-dc1d-11ee-a712-878bc23f81d5 + + + diff --git a/graph/incidents_graphml/a/a714de20-7ac6-11ee-a3e7-4d4a8f436180.graphml b/graph/incidents_graphml/a/a714de20-7ac6-11ee-a3e7-4d4a8f436180.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2597a2f75952cb25e8ed9fa01840b8eb13904a9c --- /dev/null +++ b/graph/incidents_graphml/a/a714de20-7ac6-11ee-a3e7-4d4a8f436180.graphml @@ -0,0 +1,169 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.137 + 100.64.36.137 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB","Azure Security"] + + + HOST + 100.64.70.118 + 100.64.70.118 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.42.223 + 100.64.42.223 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.325 + ["Precinct"] + + + INCIDENT_LINK + 1699070412 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + a714de20-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070412 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + a714de20-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070412 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + a714de20-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070412 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + a714de20-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070412 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + a714de20-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070412 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + a714de20-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070412 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + a714de20-7ac6-11ee-a3e7-4d4a8f436180 + + + diff --git a/graph/incidents_graphml/a/a71c51b0-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a71c51b0-21f1-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4973a4eabba2dc42b7590bd082c35dbf8cf72745 --- /dev/null +++ b/graph/incidents_graphml/a/a71c51b0-21f1-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.68.216 + 100.64.68.216 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689303227 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a71c51b0-21f1-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/a/a720c270-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a720c270-2289-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8e519a8c0bced6fcbae639a96a32ef728c67b4d --- /dev/null +++ b/graph/incidents_graphml/a/a720c270-2289-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.107 + 100.64.57.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689368510 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a720c270-2289-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/a/a724e3b0-7ac6-11ee-a3e7-4d4a8f436180.graphml b/graph/incidents_graphml/a/a724e3b0-7ac6-11ee-a3e7-4d4a8f436180.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a1d77fe4d4518e372c1a6e179b78863a5510aca --- /dev/null +++ b/graph/incidents_graphml/a/a724e3b0-7ac6-11ee-a3e7-4d4a8f436180.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.45.135 + 100.64.45.135 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1699070412 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a724e3b0-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070412 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a724e3b0-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070412 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a724e3b0-7ac6-11ee-a3e7-4d4a8f436180 + + + INCIDENT_LINK + 1699070412 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a724e3b0-7ac6-11ee-a3e7-4d4a8f436180 + + + diff --git a/graph/incidents_graphml/a/a726e050-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a726e050-167d-11ee-b43f-0d674d180bfa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5b46df9d53abb439d08238660f96c2e012db121 --- /dev/null +++ b/graph/incidents_graphml/a/a726e050-167d-11ee-b43f-0d674d180bfa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.83.50 + 100.64.83.50 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688043942 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a726e050-167d-11ee-b43f-0d674d180bfa + + + diff --git a/graph/incidents_graphml/a/a7281fe0-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a7281fe0-7985-11ee-ade7-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08d6f99dfbb58888bba2ea2e94c8a54a850814d0 --- /dev/null +++ b/graph/incidents_graphml/a/a7281fe0-7985-11ee-ade7-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.4 + 100.64.66.4 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698932543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7281fe0-7985-11ee-ade7-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a72fd9b0-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a72fd9b0-ebe2-11ec-a061-5b442ef1448c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45f01125eceb6513f59b040278453e41e0bd98fc --- /dev/null +++ b/graph/incidents_graphml/a/a72fd9b0-ebe2-11ec-a061-5b442ef1448c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.180 + USER-0015-1638.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655211924 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a72fd9b0-ebe2-11ec-a061-5b442ef1448c + + + diff --git a/graph/incidents_graphml/a/a7364b60-27c4-11ed-b92c-490402bdd5e6.graphml b/graph/incidents_graphml/a/a7364b60-27c4-11ed-b92c-490402bdd5e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff9bd8968aac95b10c589281afeb8cb80c861ae7 --- /dev/null +++ b/graph/incidents_graphml/a/a7364b60-27c4-11ed-b92c-490402bdd5e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.139 + 100.64.36.139 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.179 + 100.64.71.179 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661796109 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7364b60-27c4-11ed-b92c-490402bdd5e6 + + + diff --git a/graph/incidents_graphml/a/a7369ed0-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a7369ed0-7985-11ee-ade7-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21d24628435726e140c59741498c0c011e5ddb4f --- /dev/null +++ b/graph/incidents_graphml/a/a7369ed0-7985-11ee-ade7-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.4 + 100.64.66.4 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698932543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a7369ed0-7985-11ee-ade7-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a73c65e0-27c4-11ed-b92c-490402bdd5e6.graphml b/graph/incidents_graphml/a/a73c65e0-27c4-11ed-b92c-490402bdd5e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8988f8d5666c2ddf52039394da0f210be3a0568 --- /dev/null +++ b/graph/incidents_graphml/a/a73c65e0-27c4-11ed-b92c-490402bdd5e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.179 + 100.64.71.179 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.36.139 + 100.64.36.139 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661796109 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a73c65e0-27c4-11ed-b92c-490402bdd5e6 + + + diff --git a/graph/incidents_graphml/a/a7440bb0-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a7440bb0-4424-11ee-8c3f-91b7cde7d3e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a56d33d8086dd478273ce9609edfdee25da7d0da --- /dev/null +++ b/graph/incidents_graphml/a/a7440bb0-4424-11ee-8c3f-91b7cde7d3e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.155 + 100.64.23.155 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693063471 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7440bb0-4424-11ee-8c3f-91b7cde7d3e6 + + + diff --git a/graph/incidents_graphml/a/a7448180-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a7448180-7985-11ee-ade7-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e9cf5acaeafbf3d87d7775a3448fea6565e827e --- /dev/null +++ b/graph/incidents_graphml/a/a7448180-7985-11ee-ade7-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.5 + 100.64.66.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698932543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7448180-7985-11ee-ade7-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a746ab50-1d36-11ee-9ab6-a3b5d64e58f9.graphml b/graph/incidents_graphml/a/a746ab50-1d36-11ee-9ab6-a3b5d64e58f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3efff17ec9eec8f0bd3e8a700ca9c3715ba508a --- /dev/null +++ b/graph/incidents_graphml/a/a746ab50-1d36-11ee-9ab6-a3b5d64e58f9.graphml @@ -0,0 +1,509 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.45.149 + 100.64.45.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.11.114 + 100.64.11.114 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.163 + 100.64.82.163 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.89 + 100.64.73.89 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.63.90 + 100.64.63.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.104 + USER-0015-1635.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Umbrella","Meraki"] + + + HOST + 100.64.10.103 + 100.64.10.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.38.10 + 100.64.38.10 + ["Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.220 + 100.64.72.220 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.164 + 100.64.82.164 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.165 + 100.64.82.165 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.166 + 100.64.82.166 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783106 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a746ab50-1d36-11ee-9ab6-a3b5d64e58f9 + + + diff --git a/graph/incidents_graphml/a/a74c1d90-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a74c1d90-44ca-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cca9b5c384ebb89c6b0fb79c9dadcd9f68d9e52f --- /dev/null +++ b/graph/incidents_graphml/a/a74c1d90-44ca-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.53 + 100.64.54.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693134767 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a74c1d90-44ca-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/a/a74cb470-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a74cb470-2289-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..544d3201c195ca6c06f1fd0f8617ff30f1ddfdfc --- /dev/null +++ b/graph/incidents_graphml/a/a74cb470-2289-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.105 + 100.64.11.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689368510 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a74cb470-2289-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/a/a74cd400-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a74cd400-5277-11ee-99e4-0dae236ad26e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..03f42325f6f8b921d660a4730f460f4750ffd2cc --- /dev/null +++ b/graph/incidents_graphml/a/a74cd400-5277-11ee-99e4-0dae236ad26e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.196 + 100.64.24.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694638435 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a74cd400-5277-11ee-99e4-0dae236ad26e + + + diff --git a/graph/incidents_graphml/a/a752d960-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a752d960-7985-11ee-ade7-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfd423e67693c742146cd9f2482046ba98a15d98 --- /dev/null +++ b/graph/incidents_graphml/a/a752d960-7985-11ee-ade7-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.5 + 100.64.66.5 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698932544 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a752d960-7985-11ee-ade7-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a7534030-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a7534030-21f1-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9dfda7fd889b38cafe2a744423f3e22a3ce06f2 --- /dev/null +++ b/graph/incidents_graphml/a/a7534030-21f1-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.198 + 172.25.216.198 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.3 + 100.64.96.3 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1689303227 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7534030-21f1-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/a/a754d490-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a754d490-4424-11ee-8c3f-91b7cde7d3e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0cfe008ea10a2cef9171ced66b7040536bd010e1 --- /dev/null +++ b/graph/incidents_graphml/a/a754d490-4424-11ee-8c3f-91b7cde7d3e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.155 + 100.64.23.155 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693063471 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a754d490-4424-11ee-8c3f-91b7cde7d3e6 + + + diff --git a/graph/incidents_graphml/a/a754f020-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a754f020-6327-11ee-84e8-6f3a76e74a81.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9c42edc9ef1dbc8cffa1835e3eeab4d36d1c692 --- /dev/null +++ b/graph/incidents_graphml/a/a754f020-6327-11ee-84e8-6f3a76e74a81.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.60 + 100.64.39.60 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696473245 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a754f020-6327-11ee-84e8-6f3a76e74a81 + + + diff --git a/graph/incidents_graphml/a/a75c2320-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a75c2320-44ca-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a396f43b9f02fdab326c2583158701c1ffa78ed --- /dev/null +++ b/graph/incidents_graphml/a/a75c2320-44ca-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.53 + 100.64.54.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693134767 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a75c2320-44ca-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/a/a7621ba0-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a7621ba0-7985-11ee-ade7-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f9afc1ee3b4d115bbe7ddaad488bf954e9481e8 --- /dev/null +++ b/graph/incidents_graphml/a/a7621ba0-7985-11ee-ade7-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.50 + 100.64.10.50 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698932544 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a7621ba0-7985-11ee-ade7-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a7694280-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a7694280-44ca-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39f323793e29c4b667eeb5c9ef600ec924b95787 --- /dev/null +++ b/graph/incidents_graphml/a/a7694280-44ca-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.110 + 100.64.8.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693134767 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7694280-44ca-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/a/a7696430-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a7696430-2289-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c64f8479ca3a35166fe4722d49e28ccf492cf10 --- /dev/null +++ b/graph/incidents_graphml/a/a7696430-2289-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.105 + 100.64.11.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689368511 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7696430-2289-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/a/a76a95f0-46d6-11ee-88e7-8bd8925a1b5c.graphml b/graph/incidents_graphml/a/a76a95f0-46d6-11ee-88e7-8bd8925a1b5c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61598d51760b69ca947b35e22a799ad8d48508ca --- /dev/null +++ b/graph/incidents_graphml/a/a76a95f0-46d6-11ee-88e7-8bd8925a1b5c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.209 + 100.64.49.209 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693359824 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a76a95f0-46d6-11ee-88e7-8bd8925a1b5c + + + diff --git a/graph/incidents_graphml/a/a76c21a0-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a76c21a0-6327-11ee-84e8-6f3a76e74a81.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7287b88f158c09b67623450b4f80e0e949d3ad68 --- /dev/null +++ b/graph/incidents_graphml/a/a76c21a0-6327-11ee-84e8-6f3a76e74a81.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.164 + 100.64.40.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696473245 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a76c21a0-6327-11ee-84e8-6f3a76e74a81 + + + diff --git a/graph/incidents_graphml/a/a775a2d0-921f-11ee-be22-3fd83eb9bc8a.graphml b/graph/incidents_graphml/a/a775a2d0-921f-11ee-be22-3fd83eb9bc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..510d385ddc942e3f93cb6b42d8f79bbda434e4a4 --- /dev/null +++ b/graph/incidents_graphml/a/a775a2d0-921f-11ee-be22-3fd83eb9bc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.29 + 100.64.25.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701637514 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a775a2d0-921f-11ee-be22-3fd83eb9bc8a + + + diff --git a/graph/incidents_graphml/a/a77884c0-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a77884c0-44ca-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f76631b79495a01f1a97b96a6e6967c898e5b1fe --- /dev/null +++ b/graph/incidents_graphml/a/a77884c0-44ca-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.110 + 100.64.8.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693134767 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a77884c0-44ca-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/a/a77e9830-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a77e9830-6327-11ee-84e8-6f3a76e74a81.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1838edd67640bcc726f019836956b217b23d57fd --- /dev/null +++ b/graph/incidents_graphml/a/a77e9830-6327-11ee-84e8-6f3a76e74a81.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.164 + 100.64.40.164 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696473246 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a77e9830-6327-11ee-84e8-6f3a76e74a81 + + + diff --git a/graph/incidents_graphml/a/a7815900-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a7815900-2289-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e45ed700e8d22abccf79e4c8d1ccdd64e020441 --- /dev/null +++ b/graph/incidents_graphml/a/a7815900-2289-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.109 + 100.64.57.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689368511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7815900-2289-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/a/a785cb30-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a785cb30-44ca-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e198646ddd04a07c9109424a69a7251912272c89 --- /dev/null +++ b/graph/incidents_graphml/a/a785cb30-44ca-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.231 + 100.64.10.231 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693134768 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a785cb30-44ca-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/a/a78c1100-921f-11ee-be22-3fd83eb9bc8a.graphml b/graph/incidents_graphml/a/a78c1100-921f-11ee-be22-3fd83eb9bc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a8b81f31c44c6c230d43e6653a7d5b5dd888e44 --- /dev/null +++ b/graph/incidents_graphml/a/a78c1100-921f-11ee-be22-3fd83eb9bc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.29 + 100.64.25.29 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701637514 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a78c1100-921f-11ee-be22-3fd83eb9bc8a + + + diff --git a/graph/incidents_graphml/a/a78f4620-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a78f4620-7985-11ee-ade7-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d43375907bd2dd08cd33e1fa50b0b3d2b3aca651 --- /dev/null +++ b/graph/incidents_graphml/a/a78f4620-7985-11ee-ade7-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.8 + 100.64.66.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698932544 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a78f4620-7985-11ee-ade7-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/a/a79ad470-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a79ad470-2289-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32863164290d371a8de2e3ab8d4c2838e94d6eae --- /dev/null +++ b/graph/incidents_graphml/a/a79ad470-2289-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.109 + 100.64.57.109 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689368511 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a79ad470-2289-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/a/a79b5340-921f-11ee-be22-3fd83eb9bc8a.graphml b/graph/incidents_graphml/a/a79b5340-921f-11ee-be22-3fd83eb9bc8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35f60d5755c7efa9f65d6d9bcccc7c1b4b80a5df --- /dev/null +++ b/graph/incidents_graphml/a/a79b5340-921f-11ee-be22-3fd83eb9bc8a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.118 + 100.64.8.118 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701637514 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a79b5340-921f-11ee-be22-3fd83eb9bc8a + + + diff --git a/graph/incidents_graphml/a/a7a13920-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a7a13920-ebe2-11ec-a061-5b442ef1448c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68bf903951aa29dcdf0f9a97c53630bbe116f96a --- /dev/null +++ b/graph/incidents_graphml/a/a7a13920-ebe2-11ec-a061-5b442ef1448c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.182 + USER-0015-1639.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655211924 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7a13920-ebe2-11ec-a061-5b442ef1448c + + + diff --git a/graph/incidents_graphml/a/a7a21920-0040-11ef-92fd-9575c6891dd5.graphml b/graph/incidents_graphml/a/a7a21920-0040-11ef-92fd-9575c6891dd5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8a0ebff6f4593f5e2241ec513e06b36b5a54286 --- /dev/null +++ b/graph/incidents_graphml/a/a7a21920-0040-11ef-92fd-9575c6891dd5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.177 + 100.64.67.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713746316 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7a21920-0040-11ef-92fd-9575c6891dd5 + + + diff --git a/graph/incidents_graphml/a/a7a2df80-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/a/a7a2df80-2883-11ee-92b9-d3cce1c86342.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e4561ec1af3e183987438620c719cb4e0323870 --- /dev/null +++ b/graph/incidents_graphml/a/a7a2df80-2883-11ee-92b9-d3cce1c86342.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.240 + 100.64.12.240 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690025641 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7a2df80-2883-11ee-92b9-d3cce1c86342 + + + diff --git a/graph/incidents_graphml/a/a7b293e0-0040-11ef-92fd-9575c6891dd5.graphml b/graph/incidents_graphml/a/a7b293e0-0040-11ef-92fd-9575c6891dd5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ae3a5ddac9a51d1273017b2ab7cf7b08433edc0 --- /dev/null +++ b/graph/incidents_graphml/a/a7b293e0-0040-11ef-92fd-9575c6891dd5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.177 + 100.64.67.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713746316 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7b293e0-0040-11ef-92fd-9575c6891dd5 + + + diff --git a/graph/incidents_graphml/a/a7b3dab0-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a7b3dab0-2289-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1353bbd8d66f4d9ab79cca6a7e7598851227c978 --- /dev/null +++ b/graph/incidents_graphml/a/a7b3dab0-2289-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.188 + 100.64.19.188 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689368511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7b3dab0-2289-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/a/a7b469f0-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a7b469f0-89a2-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0825909239fc5ed1aff0ab91980dd61513184c8 --- /dev/null +++ b/graph/incidents_graphml/a/a7b469f0-89a2-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.101 + 100.64.34.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700704218 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a7b469f0-89a2-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/a/a7b9c2e0-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/a/a7b9c2e0-2883-11ee-92b9-d3cce1c86342.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4631fb799415794f9abaa4c7e7be06b61f7e6fa4 --- /dev/null +++ b/graph/incidents_graphml/a/a7b9c2e0-2883-11ee-92b9-d3cce1c86342.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.240 + 100.64.12.240 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690025641 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a7b9c2e0-2883-11ee-92b9-d3cce1c86342 + + + diff --git a/graph/incidents_graphml/a/a7bf7720-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/a/a7bf7720-2ff5-11ee-b00f-c1ca007fb916.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b41d2b66c980cec58a93e8ae933f662e6f4d3c0 --- /dev/null +++ b/graph/incidents_graphml/a/a7bf7720-2ff5-11ee-b00f-c1ca007fb916.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.173 + 100.64.69.173 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1690844262 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7bf7720-2ff5-11ee-b00f-c1ca007fb916 + + + INCIDENT_LINK + 1690844262 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7bf7720-2ff5-11ee-b00f-c1ca007fb916 + + + diff --git a/graph/incidents_graphml/a/a7c2e8e0-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a7c2e8e0-89a2-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0bb96da5615154a228daa85545011a09fcd017cd --- /dev/null +++ b/graph/incidents_graphml/a/a7c2e8e0-89a2-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.229 + 100.64.4.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700704218 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7c2e8e0-89a2-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/a/a7c40330-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a7c40330-725d-11ee-88c1-133d8406c021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19a72f86309b7dea7defdaf9f8542cec708e0b2b --- /dev/null +++ b/graph/incidents_graphml/a/a7c40330-725d-11ee-88c1-133d8406c021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.87 + 100.64.47.87 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698145706 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a7c40330-725d-11ee-88c1-133d8406c021 + + + diff --git a/graph/incidents_graphml/a/a7c84d10-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a7c84d10-2289-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8f81f9ebba53a6abda27d1d603bceb8d4c42763 --- /dev/null +++ b/graph/incidents_graphml/a/a7c84d10-2289-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.188 + 100.64.19.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689368511 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a7c84d10-2289-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/a/a7ca3da0-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/a/a7ca3da0-2883-11ee-92b9-d3cce1c86342.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6d61124a1e9148168d95224ff95077bce29e14e --- /dev/null +++ b/graph/incidents_graphml/a/a7ca3da0-2883-11ee-92b9-d3cce1c86342.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.2 + 100.64.8.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690025641 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7ca3da0-2883-11ee-92b9-d3cce1c86342 + + + diff --git a/graph/incidents_graphml/a/a7d25230-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a7d25230-89a2-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f327ce1a046f88195e36ec5f74f7dcfc7c384a18 --- /dev/null +++ b/graph/incidents_graphml/a/a7d25230-89a2-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.229 + 100.64.4.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700704218 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a7d25230-89a2-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/a/a7d78b30-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a7d78b30-725d-11ee-88c1-133d8406c021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d59a1990909f2ebb222b3669789a6837ffa8faed --- /dev/null +++ b/graph/incidents_graphml/a/a7d78b30-725d-11ee-88c1-133d8406c021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.87 + 100.64.47.87 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698145706 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7d78b30-725d-11ee-88c1-133d8406c021 + + + diff --git a/graph/incidents_graphml/a/a7d7e300-ab79-11ee-a1cb-599f1b15ded5.graphml b/graph/incidents_graphml/a/a7d7e300-ab79-11ee-a1cb-599f1b15ded5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9fc1424873cf59d3eee8993bc36e86d38a8c377f --- /dev/null +++ b/graph/incidents_graphml/a/a7d7e300-ab79-11ee-a1cb-599f1b15ded5.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.246 + 100.64.49.246 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.87 + 100.64.23.87 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.247 + 100.64.49.247 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.248 + 100.64.49.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.74 + 100.64.20.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.249 + 100.64.49.249 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + INCIDENT_LINK + 1704424949 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a7d7e300-ab79-11ee-a1cb-599f1b15ded5 + + + diff --git a/graph/incidents_graphml/a/a7da4330-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/a/a7da4330-2883-11ee-92b9-d3cce1c86342.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b9b659aeb92fd0608d90e3840a5de8a11ca9327 --- /dev/null +++ b/graph/incidents_graphml/a/a7da4330-2883-11ee-92b9-d3cce1c86342.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.2 + 100.64.8.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690025641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a7da4330-2883-11ee-92b9-d3cce1c86342 + + + diff --git a/graph/incidents_graphml/a/a7e1bb80-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a7e1bb80-89a2-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc4c9437c59fe7e3bb099579d0f68d2cdd636d2e --- /dev/null +++ b/graph/incidents_graphml/a/a7e1bb80-89a2-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.189 + 100.64.58.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700704219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a7e1bb80-89a2-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/a/a7e7dee0-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a7e7dee0-725d-11ee-88c1-133d8406c021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f488c44f464ae580662f960de2c90b781a1a4c12 --- /dev/null +++ b/graph/incidents_graphml/a/a7e7dee0-725d-11ee-88c1-133d8406c021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.87 + 100.64.47.87 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698145707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a7e7dee0-725d-11ee-88c1-133d8406c021 + + + diff --git a/graph/incidents_graphml/a/a7ec24d0-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a7ec24d0-ebe2-11ec-a061-5b442ef1448c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12dae4fa4d1f3a524f56b2ea4e04272f421736a3 --- /dev/null +++ b/graph/incidents_graphml/a/a7ec24d0-ebe2-11ec-a061-5b442ef1448c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.182 + USER-0015-1639.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655211925 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a7ec24d0-ebe2-11ec-a061-5b442ef1448c + + + diff --git a/graph/incidents_graphml/a/a7ec9df0-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a7ec9df0-2289-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ade2d4d0927cc2201dc1b20be310046066751c46 --- /dev/null +++ b/graph/incidents_graphml/a/a7ec9df0-2289-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.99 + 100.64.10.99 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689368511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a7ec9df0-2289-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/a/a7eef940-1d36-11ee-9ab6-a3b5d64e58f9.graphml b/graph/incidents_graphml/a/a7eef940-1d36-11ee-9ab6-a3b5d64e58f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87d3b075a837e2f1b07c84152bf4148c3f617f4f --- /dev/null +++ b/graph/incidents_graphml/a/a7eef940-1d36-11ee-9ab6-a3b5d64e58f9.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.167 + 100.64.82.167 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.126 + 100.64.71.126 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.168 + 100.64.82.168 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.82.169 + 100.64.82.169 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688783108 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7eef940-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783108 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7eef940-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783108 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7eef940-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783108 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7eef940-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783108 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7eef940-1d36-11ee-9ab6-a3b5d64e58f9 + + + INCIDENT_LINK + 1688783108 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7eef940-1d36-11ee-9ab6-a3b5d64e58f9 + + + diff --git a/graph/incidents_graphml/a/a7f124d0-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a7f124d0-89a2-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c61b4a125bb843a5e96dfc071a0a042935b6266 --- /dev/null +++ b/graph/incidents_graphml/a/a7f124d0-89a2-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.240 + 100.64.42.240 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700704219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a7f124d0-89a2-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/a/a7fa0750-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a7fa0750-725d-11ee-88c1-133d8406c021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa6d2d123c30e406f86b0ed34220d16c9fa24c21 --- /dev/null +++ b/graph/incidents_graphml/a/a7fa0750-725d-11ee-88c1-133d8406c021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.87 + 100.64.47.87 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698145707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a7fa0750-725d-11ee-88c1-133d8406c021 + + + diff --git a/graph/incidents_graphml/a/a7ff4560-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a7ff4560-4424-11ee-8c3f-91b7cde7d3e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f68f9b877c851bd504129cb1a714e0e091b4af9 --- /dev/null +++ b/graph/incidents_graphml/a/a7ff4560-4424-11ee-8c3f-91b7cde7d3e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.157 + 100.64.23.157 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693063472 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a7ff4560-4424-11ee-8c3f-91b7cde7d3e6 + + + diff --git a/graph/incidents_graphml/a/a8006710-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a8006710-89a2-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78b1c4b48921b93b0651326b4360a0d13b335c2f --- /dev/null +++ b/graph/incidents_graphml/a/a8006710-89a2-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.240 + 100.64.42.240 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700704219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a8006710-89a2-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/a/a80ca4f0-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a80ca4f0-725d-11ee-88c1-133d8406c021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b344aff946168d9db49ee72a585f283906aef40 --- /dev/null +++ b/graph/incidents_graphml/a/a80ca4f0-725d-11ee-88c1-133d8406c021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.87 + 100.64.47.87 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698145707 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a80ca4f0-725d-11ee-88c1-133d8406c021 + + + diff --git a/graph/incidents_graphml/a/a80d5f60-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a80d5f60-89a2-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb5d021f79406590b8168870aab50f7066e31080 --- /dev/null +++ b/graph/incidents_graphml/a/a80d5f60-89a2-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.191 + 100.64.58.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700704219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a80d5f60-89a2-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/a/a80e87a0-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a80e87a0-4424-11ee-8c3f-91b7cde7d3e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ead4838f7a8a64f0bb6b3dc0be3cc932df9e73b5 --- /dev/null +++ b/graph/incidents_graphml/a/a80e87a0-4424-11ee-8c3f-91b7cde7d3e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693063472 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a80e87a0-4424-11ee-8c3f-91b7cde7d3e6 + + + diff --git a/graph/incidents_graphml/a/a812a910-311a-11ee-87a2-613e036775fd.graphml b/graph/incidents_graphml/a/a812a910-311a-11ee-87a2-613e036775fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a725f532a35d8170237d7d9fafffa28e86a43ce --- /dev/null +++ b/graph/incidents_graphml/a/a812a910-311a-11ee-87a2-613e036775fd.graphml @@ -0,0 +1,763 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.213 + 100.64.5.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.55 + 100.64.13.55 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.218 + 100.64.57.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.219 + 100.64.57.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.236 + 100.64.15.236 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.220 + 100.64.57.220 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.221 + USER-0015-1424.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.222 + 100.64.57.222 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.217 + 100.64.31.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.223 + 100.64.57.223 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.224 + 100.64.57.224 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.225 + 100.64.57.225 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.226 + 100.64.57.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.227 + USER-0015-1425.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.24 + 100.64.46.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.228 + 100.64.57.228 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + INCIDENT_LINK + 1690970105 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a812a910-311a-11ee-87a2-613e036775fd + + + diff --git a/graph/incidents_graphml/a/a81bde50-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a81bde50-89a2-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f2e3ebe2c65eccda5e09080eadd5db1e1760e476 --- /dev/null +++ b/graph/incidents_graphml/a/a81bde50-89a2-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.191 + 100.64.58.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700704219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a81bde50-89a2-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/a/a81ecd60-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a81ecd60-725d-11ee-88c1-133d8406c021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..adbb2f2d5c238de2606a5f8479ff7a55b2ae826d --- /dev/null +++ b/graph/incidents_graphml/a/a81ecd60-725d-11ee-88c1-133d8406c021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.87 + 100.64.47.87 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698145707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a81ecd60-725d-11ee-88c1-133d8406c021 + + + diff --git a/graph/incidents_graphml/a/a81f7790-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a81f7790-4424-11ee-8c3f-91b7cde7d3e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae91b12163538db531974234a85f48b7dfbdbfef --- /dev/null +++ b/graph/incidents_graphml/a/a81f7790-4424-11ee-8c3f-91b7cde7d3e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693063472 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a81f7790-4424-11ee-8c3f-91b7cde7d3e6 + + + diff --git a/graph/incidents_graphml/a/a83050b0-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a83050b0-89a2-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d93da8529b31375554eb790beeadbdeeca56c84b --- /dev/null +++ b/graph/incidents_graphml/a/a83050b0-89a2-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.193 + 100.64.58.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700704219 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a83050b0-89a2-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/a/a8311ce0-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a8311ce0-725d-11ee-88c1-133d8406c021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4a16bc431edb7e721e0bb5a3b4143bfc8c0af13 --- /dev/null +++ b/graph/incidents_graphml/a/a8311ce0-725d-11ee-88c1-133d8406c021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.87 + 100.64.47.87 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698145707 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a8311ce0-725d-11ee-88c1-133d8406c021 + + + diff --git a/graph/incidents_graphml/a/a8420cd0-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a8420cd0-725d-11ee-88c1-133d8406c021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99e5d301d0b691096c533fb775bb5052fb70d4e5 --- /dev/null +++ b/graph/incidents_graphml/a/a8420cd0-725d-11ee-88c1-133d8406c021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.87 + 100.64.47.87 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698145707 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a8420cd0-725d-11ee-88c1-133d8406c021 + + + diff --git a/graph/incidents_graphml/a/a8471280-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a8471280-5277-11ee-99e4-0dae236ad26e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51e2b63f8af08cb4af7e1ae762d96618b91a0374 --- /dev/null +++ b/graph/incidents_graphml/a/a8471280-5277-11ee-99e4-0dae236ad26e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.198 + 100.64.24.198 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694638437 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a8471280-5277-11ee-99e4-0dae236ad26e + + + diff --git a/graph/incidents_graphml/a/a8534ae0-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a8534ae0-725d-11ee-88c1-133d8406c021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a25b255e01defba9e9403d7f4f8b76ca9bebcf2 --- /dev/null +++ b/graph/incidents_graphml/a/a8534ae0-725d-11ee-88c1-133d8406c021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.87 + 100.64.47.87 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698145707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a8534ae0-725d-11ee-88c1-133d8406c021 + + + diff --git a/graph/incidents_graphml/a/a85c28a0-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a85c28a0-2289-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a543ed72f61ec16dd7f4f94bc0d664d8cdbcb9bf --- /dev/null +++ b/graph/incidents_graphml/a/a85c28a0-2289-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.34 + 100.64.2.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689368512 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a85c28a0-2289-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/a/a86213c0-614d-11ee-82b9-21d9d71c2fa4.graphml b/graph/incidents_graphml/a/a86213c0-614d-11ee-82b9-21d9d71c2fa4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..295d37e0051a07921364369592e1bdff6175fee3 --- /dev/null +++ b/graph/incidents_graphml/a/a86213c0-614d-11ee-82b9-21d9d71c2fa4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.32 + 100.64.69.32 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1696269666 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a86213c0-614d-11ee-82b9-21d9d71c2fa4 + + + diff --git a/graph/incidents_graphml/a/a864b000-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a864b000-725d-11ee-88c1-133d8406c021.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5ac645b37694bcce8ee01ddc92d199eb62b2f98 --- /dev/null +++ b/graph/incidents_graphml/a/a864b000-725d-11ee-88c1-133d8406c021.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.87 + 100.64.47.87 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698145707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a864b000-725d-11ee-88c1-133d8406c021 + + + diff --git a/graph/incidents_graphml/a/a8660fc0-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a8660fc0-21f1-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a69b1710a56c21ca7fdd6eb897318561c63415a0 --- /dev/null +++ b/graph/incidents_graphml/a/a8660fc0-21f1-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.5 + 100.64.96.5 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689303229 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a8660fc0-21f1-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/a/a868c260-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a868c260-fa32-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c8a678abba52a020dcedcf6980c407df53a0bf4 --- /dev/null +++ b/graph/incidents_graphml/a/a868c260-fa32-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.7.197 + 100.64.7.197 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684933100 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a868c260-fa32-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/a/a872ca10-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a872ca10-3f76-11ee-a907-25e49d688e74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6538a48cdb1aefca5a9dcc7e84ded662c55de703 --- /dev/null +++ b/graph/incidents_graphml/a/a872ca10-3f76-11ee-a907-25e49d688e74.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.160 + 100.64.35.160 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692548936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a872ca10-3f76-11ee-a907-25e49d688e74 + + + diff --git a/graph/incidents_graphml/a/a8730ac0-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/a/a8730ac0-f477-11ec-a9fa-937f4b53edcd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eba92d7bc968d3868f6bb52266db51184921df83 --- /dev/null +++ b/graph/incidents_graphml/a/a8730ac0-f477-11ec-a9fa-937f4b53edcd.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.107 + 100.64.73.107 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.1.240 + USER-0015-1630.example.internal + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.112 + 100.64.71.112 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.108 + 100.64.73.108 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656155530 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8730ac0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155530 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8730ac0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155530 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8730ac0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155530 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8730ac0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155530 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8730ac0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155530 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8730ac0-f477-11ec-a9fa-937f4b53edcd + + + diff --git a/graph/incidents_graphml/a/a8814900-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a8814900-3f76-11ee-a907-25e49d688e74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..533b63cfc1a67938322f21d01ebb1bc0f64c7628 --- /dev/null +++ b/graph/incidents_graphml/a/a8814900-3f76-11ee-a907-25e49d688e74.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.160 + 100.64.35.160 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692548936 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a8814900-3f76-11ee-a907-25e49d688e74 + + + diff --git a/graph/incidents_graphml/a/a8840070-482f-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/a/a8840070-482f-11ee-a737-6b545b426b37.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44bb1f7061f4e12217c4bfae2e7f5c2b19de9d32 --- /dev/null +++ b/graph/incidents_graphml/a/a8840070-482f-11ee-a737-6b545b426b37.graphml @@ -0,0 +1,301 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.216 + 100.64.20.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.149 + 100.64.10.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.141 + 100.64.56.141 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.179 + 100.64.31.179 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.207 + 100.64.8.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.99 + 100.64.39.99 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.192 + 100.64.9.192 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + INCIDENT_LINK + 1693508002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8840070-482f-11ee-a737-6b545b426b37 + + + diff --git a/graph/incidents_graphml/a/a8923d80-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/a/a8923d80-274f-11ee-9ae4-f7600c9ae4b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e461f570c88c958494e5990ed1ffc73583561e4f --- /dev/null +++ b/graph/incidents_graphml/a/a8923d80-274f-11ee-9ae4-f7600c9ae4b6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.73 + 100.64.63.73 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689893358 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8923d80-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893358 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8923d80-274f-11ee-9ae4-f7600c9ae4b6 + + + diff --git a/graph/incidents_graphml/a/a89ba600-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a89ba600-167d-11ee-b43f-0d674d180bfa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9920ab820d36c14ce608a80a391f921dfd9f45cf --- /dev/null +++ b/graph/incidents_graphml/a/a89ba600-167d-11ee-b43f-0d674d180bfa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.95 + 100.64.96.95 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.84.231 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688043945 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a89ba600-167d-11ee-b43f-0d674d180bfa + + + diff --git a/graph/incidents_graphml/a/a8a88d30-00af-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/a/a8a88d30-00af-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9255b0b1c5de1b0ef8d257e26f0ab3ac23bb9c9e --- /dev/null +++ b/graph/incidents_graphml/a/a8a88d30-00af-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,345 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.165 + 100.64.18.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.170 + USER-0015-1378.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.39 + 100.64.19.39 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.171 + 100.64.48.171 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.131 + 100.64.7.131 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.172 + 100.64.48.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.60 + 100.64.26.60 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.173 + 100.64.48.173 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a88d30-00af-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/a/a8a8c7e0-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/a/a8a8c7e0-1c7c-11ee-9c01-8b4657fad9e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c8b64294eb81acb9699ed0652508cfee6374019 --- /dev/null +++ b/graph/incidents_graphml/a/a8a8c7e0-1c7c-11ee-9c01-8b4657fad9e1.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.250 + 100.64.17.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688703222 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a8c7e0-1c7c-11ee-9c01-8b4657fad9e1 + + + INCIDENT_LINK + 1688703222 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8a8c7e0-1c7c-11ee-9c01-8b4657fad9e1 + + + diff --git a/graph/incidents_graphml/a/a8af8b60-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/a/a8af8b60-216e-11ee-9e0b-8dcc0a578b7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98d9162040a84faedabf6d7435b466579117b9ee --- /dev/null +++ b/graph/incidents_graphml/a/a8af8b60-216e-11ee-9e0b-8dcc0a578b7b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.32 + 100.64.82.32 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.77 + 100.64.72.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689246965 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8af8b60-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246965 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8af8b60-216e-11ee-9e0b-8dcc0a578b7b + + + diff --git a/graph/incidents_graphml/a/a8bd26a0-00af-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/a/a8bd26a0-00af-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f689f5f09319ddc6cf43436f28899800dc8cfb45 --- /dev/null +++ b/graph/incidents_graphml/a/a8bd26a0-00af-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.160 + 100.64.42.160 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.178 + 100.64.48.178 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.179 + 100.64.48.179 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.114 + 100.64.11.114 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.180 + 100.64.48.180 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.181 + 100.64.48.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.182 + 100.64.48.182 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.225 + 100.64.35.225 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.183 + 100.64.48.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.70 + 100.64.13.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.187 + 100.64.34.187 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.13.82 + 100.64.13.82 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.146 + 100.64.4.146 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.127 + 100.64.17.127 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.184 + 100.64.48.184 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.185 + 100.64.48.185 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.186 + 100.64.48.186 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793992 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a8bd26a0-00af-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/a/a8c25780-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a8c25780-89a2-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e1e2c5e69234998a3538d33bf3275a95a09feaa --- /dev/null +++ b/graph/incidents_graphml/a/a8c25780-89a2-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.20 + 100.64.19.20 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700704220 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a8c25780-89a2-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/a/a8c5d680-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a8c5d680-fa32-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..705b7fc1b8b1d125422f623851624320e8dd9703 --- /dev/null +++ b/graph/incidents_graphml/a/a8c5d680-fa32-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.241 + 100.64.11.241 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684933100 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8c5d680-fa32-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/a/a8ce75d0-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a8ce75d0-167d-11ee-b43f-0d674d180bfa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83dfd0bc19ba9b143d115b6971f04f85a2c70dd3 --- /dev/null +++ b/graph/incidents_graphml/a/a8ce75d0-167d-11ee-b43f-0d674d180bfa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.84.231 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.95 + 100.64.96.95 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688043945 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a8ce75d0-167d-11ee-b43f-0d674d180bfa + + + diff --git a/graph/incidents_graphml/a/a8dfe160-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a8dfe160-4424-11ee-8c3f-91b7cde7d3e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4936e5d465dc350143405fd89b04003132cd66d --- /dev/null +++ b/graph/incidents_graphml/a/a8dfe160-4424-11ee-8c3f-91b7cde7d3e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.161 + 100.64.23.161 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693063473 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a8dfe160-4424-11ee-8c3f-91b7cde7d3e6 + + + diff --git a/graph/incidents_graphml/a/a8e2dd50-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a8e2dd50-5277-11ee-99e4-0dae236ad26e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f97618a1d1147eb436517cd099eb65dac0bc1ea --- /dev/null +++ b/graph/incidents_graphml/a/a8e2dd50-5277-11ee-99e4-0dae236ad26e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.199 + 100.64.24.199 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694638438 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8e2dd50-5277-11ee-99e4-0dae236ad26e + + + diff --git a/graph/incidents_graphml/a/a8e852a0-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a8e852a0-fa32-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32f818ad0b0ef10a19795fe50e1f5d052cf8ee7e --- /dev/null +++ b/graph/incidents_graphml/a/a8e852a0-fa32-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.11.241 + 100.64.11.241 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684933100 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a8e852a0-fa32-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/a/a8f230e0-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a8f230e0-4424-11ee-8c3f-91b7cde7d3e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a908c786e32f2fe429b129f06d899e142bcea409 --- /dev/null +++ b/graph/incidents_graphml/a/a8f230e0-4424-11ee-8c3f-91b7cde7d3e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.163 + 100.64.23.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693063473 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a8f230e0-4424-11ee-8c3f-91b7cde7d3e6 + + + diff --git a/graph/incidents_graphml/a/a900afd0-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a900afd0-4424-11ee-8c3f-91b7cde7d3e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b3d4d77ec6d78db94c6b28b492f3ea935e6ffbe --- /dev/null +++ b/graph/incidents_graphml/a/a900afd0-4424-11ee-8c3f-91b7cde7d3e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.163 + 100.64.23.163 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693063474 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a900afd0-4424-11ee-8c3f-91b7cde7d3e6 + + + diff --git a/graph/incidents_graphml/a/a904b440-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a904b440-fa32-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e733ca6e4314863ca50aad8ec944bc9150c47e87 --- /dev/null +++ b/graph/incidents_graphml/a/a904b440-fa32-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.39.25 + 100.64.39.25 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684933101 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a904b440-fa32-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/a/a908c690-a070-11ee-8eba-81c30328b488.graphml b/graph/incidents_graphml/a/a908c690-a070-11ee-8eba-81c30328b488.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fdbb07456a1a369e9059c1c14bc493c8b5e5f336 --- /dev/null +++ b/graph/incidents_graphml/a/a908c690-a070-11ee-8eba-81c30328b488.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.149 + 100.64.53.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.150 + 100.64.53.150 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.151 + 100.64.53.151 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.171 + 100.64.19.171 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.152 + 100.64.53.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703211622 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a908c690-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211622 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a908c690-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211622 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a908c690-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211622 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a908c690-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211622 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a908c690-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211622 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a908c690-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211622 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a908c690-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211622 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a908c690-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211622 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a908c690-a070-11ee-8eba-81c30328b488 + + + INCIDENT_LINK + 1703211622 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a908c690-a070-11ee-8eba-81c30328b488 + + + diff --git a/graph/incidents_graphml/a/a9123f40-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/a/a9123f40-0b3d-11ee-b3b4-cb00aeb7cc38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1dc0155b02d331e9b0e6a59ff28b4988c4694a5e --- /dev/null +++ b/graph/incidents_graphml/a/a9123f40-0b3d-11ee-b3b4-cb00aeb7cc38.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.115 + 100.64.72.115 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686806995 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9123f40-0b3d-11ee-b3b4-cb00aeb7cc38 + + + INCIDENT_LINK + 1686806995 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9123f40-0b3d-11ee-b3b4-cb00aeb7cc38 + + + diff --git a/graph/incidents_graphml/a/a919aa90-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a919aa90-6327-11ee-84e8-6f3a76e74a81.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa76a5398560cad1bb70fd23ba53d75d67dc2b1f --- /dev/null +++ b/graph/incidents_graphml/a/a919aa90-6327-11ee-84e8-6f3a76e74a81.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.166 + 100.64.40.166 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696473248 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a919aa90-6327-11ee-84e8-6f3a76e74a81 + + + diff --git a/graph/incidents_graphml/a/a924f510-d4fd-11ee-b65b-9d9885766d0d.graphml b/graph/incidents_graphml/a/a924f510-d4fd-11ee-b65b-9d9885766d0d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6676cee0ecfae2917e06de78153024f37308900d --- /dev/null +++ b/graph/incidents_graphml/a/a924f510-d4fd-11ee-b65b-9d9885766d0d.graphml @@ -0,0 +1,633 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.189 + 100.64.27.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.190 + 100.64.27.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.191 + 100.64.27.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.192 + USER-0015-1266.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.193 + USER-0015-1267.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.254 + 100.64.8.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.77 + 100.64.4.77 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.194 + 100.64.27.194 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.195 + 100.64.27.195 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.36 + 100.64.14.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.196 + 100.64.27.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.197 + 100.64.27.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.198 + 100.64.27.198 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.11 + 100.64.25.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.199 + 100.64.27.199 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + INCIDENT_LINK + 1708989642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a924f510-d4fd-11ee-b65b-9d9885766d0d + + + diff --git a/graph/incidents_graphml/a/a925b3a0-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/a/a925b3a0-5812-11ee-83e4-f12d78181e73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..322108c2a1cb515a40d5b3c45d9c14a339cea3f3 --- /dev/null +++ b/graph/incidents_graphml/a/a925b3a0-5812-11ee-83e4-f12d78181e73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.184 + 100.64.21.184 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1695254766 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a925b3a0-5812-11ee-83e4-f12d78181e73 + + + diff --git a/graph/incidents_graphml/a/a9260460-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a9260460-21f1-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72a89d3cea74168de9387afa06c96408c3a2c691 --- /dev/null +++ b/graph/incidents_graphml/a/a9260460-21f1-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.7 + 100.64.96.7 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1689303230 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9260460-21f1-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/a/a9298430-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/a/a9298430-5812-11ee-83e4-f12d78181e73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b45968e0578f9cde6ea1ca0393ac4162767e84a --- /dev/null +++ b/graph/incidents_graphml/a/a9298430-5812-11ee-83e4-f12d78181e73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.21.184 + 100.64.21.184 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695254766 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a9298430-5812-11ee-83e4-f12d78181e73 + + + diff --git a/graph/incidents_graphml/a/a92e4400-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a92e4400-6327-11ee-84e8-6f3a76e74a81.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b13d6fe6b0a4ca35ab5723f84b486cb81eaa685 --- /dev/null +++ b/graph/incidents_graphml/a/a92e4400-6327-11ee-84e8-6f3a76e74a81.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.166 + 100.64.40.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696473248 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a92e4400-6327-11ee-84e8-6f3a76e74a81 + + + diff --git a/graph/incidents_graphml/a/a92f4e80-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a92f4e80-121f-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1334bff917c0976f78f5c4b0ecdc48fd5652359d --- /dev/null +++ b/graph/incidents_graphml/a/a92f4e80-121f-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.173 + USER-0015-1792.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.38 + 100.64.73.38 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687563768 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a92f4e80-121f-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/a/a92f96f0-0040-11ef-92fd-9575c6891dd5.graphml b/graph/incidents_graphml/a/a92f96f0-0040-11ef-92fd-9575c6891dd5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46fc2c4c2c7d68a17f535cb8699ebaffa97dd6a7 --- /dev/null +++ b/graph/incidents_graphml/a/a92f96f0-0040-11ef-92fd-9575c6891dd5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.242 + 100.64.48.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713746318 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a92f96f0-0040-11ef-92fd-9575c6891dd5 + + + diff --git a/graph/incidents_graphml/a/a9448430-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9448430-121f-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6dd095a02f7fce56abcc1776cbc60f40e31a01a8 --- /dev/null +++ b/graph/incidents_graphml/a/a9448430-121f-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.38 + 100.64.73.38 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.173 + USER-0015-1792.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687563768 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9448430-121f-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/a/a949b900-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a949b900-21f1-11ee-9fd4-59af0d5e8a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c7f0cbfa6816e43998fe05a2d6097fd17fc0881 --- /dev/null +++ b/graph/incidents_graphml/a/a949b900-21f1-11ee-9fd4-59af0d5e8a32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + USER-0015-1974.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.96.7 + 100.64.96.7 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689303230 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a949b900-21f1-11ee-9fd4-59af0d5e8a32 + + + diff --git a/graph/incidents_graphml/a/a94c82d0-fb72-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/a/a94c82d0-fb72-11ec-a1a2-6b18c9b1ede9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3bd3ed68712ab586710ab6f9790e6f365c261baf --- /dev/null +++ b/graph/incidents_graphml/a/a94c82d0-fb72-11ec-a1a2-6b18c9b1ede9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.46 + 100.64.74.46 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656923042 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a94c82d0-fb72-11ec-a1a2-6b18c9b1ede9 + + + diff --git a/graph/incidents_graphml/a/a94eb840-00af-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/a/a94eb840-00af-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1af0412964cc9ed8c58a940a51fbd99a0ce16c7e --- /dev/null +++ b/graph/incidents_graphml/a/a94eb840-00af-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.139 + 100.64.20.139 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.195 + 100.64.48.195 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.196 + 100.64.48.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.251 + 100.64.12.251 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.197 + 100.64.48.197 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.198 + 100.64.48.198 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.44 + 100.64.10.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.199 + 100.64.48.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.255 + 100.64.8.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.236 + 100.64.17.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.200 + 100.64.48.200 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.10.167 + 100.64.10.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.192 + 100.64.5.192 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.144 + 100.64.5.144 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.201 + 100.64.48.201 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.202 + 100.64.48.202 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713793993 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a94eb840-00af-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/a/a95097e0-1eb1-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/a/a95097e0-1eb1-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9de1881206564d472c46eedee5e37dd97d83f4c4 --- /dev/null +++ b/graph/incidents_graphml/a/a95097e0-1eb1-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,301 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.59 + 100.64.5.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.188 + 100.64.34.188 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.171 + 100.64.12.171 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.233 + 100.64.63.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.149 + USER-0015-1235.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.234 + 100.64.63.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + INCIDENT_LINK + 1688945889 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a95097e0-1eb1-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/a/a95c9840-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a95c9840-fa32-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dad6137fea62dca4d14a58499f21afd0f5c79c75 --- /dev/null +++ b/graph/incidents_graphml/a/a95c9840-fa32-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684933101 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a95c9840-fa32-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1684933101 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a95c9840-fa32-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1684933101 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a95c9840-fa32-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/a/a9670c50-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a9670c50-167d-11ee-b43f-0d674d180bfa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..126ea360dd6c05acd7ce2bb2fd2dd6727ef26a40 --- /dev/null +++ b/graph/incidents_graphml/a/a9670c50-167d-11ee-b43f-0d674d180bfa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.97 + 100.64.96.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1688043946 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9670c50-167d-11ee-b43f-0d674d180bfa + + + diff --git a/graph/incidents_graphml/a/a96b6a80-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/a/a96b6a80-2883-11ee-92b9-d3cce1c86342.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfb0b326d5bc8a90122d754172d6fe01fadbd876 --- /dev/null +++ b/graph/incidents_graphml/a/a96b6a80-2883-11ee-92b9-d3cce1c86342.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.242 + 100.64.12.242 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690025644 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a96b6a80-2883-11ee-92b9-d3cce1c86342 + + + diff --git a/graph/incidents_graphml/a/a9824d60-9a0f-11ee-ac12-3d0889e17739.graphml b/graph/incidents_graphml/a/a9824d60-9a0f-11ee-ac12-3d0889e17739.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d5223305eac8c60eb759114df3ceefa27c8fdd0 --- /dev/null +++ b/graph/incidents_graphml/a/a9824d60-9a0f-11ee-ac12-3d0889e17739.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702510255 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a9824d60-9a0f-11ee-ac12-3d0889e17739 + + + diff --git a/graph/incidents_graphml/a/a98555f0-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a98555f0-fa32-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8ed194e2798ae3b5ba6c143ce92c6ac89820a8f --- /dev/null +++ b/graph/incidents_graphml/a/a98555f0-fa32-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684933101 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a98555f0-fa32-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/a/a985e560-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a985e560-4424-11ee-8c3f-91b7cde7d3e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4efdc0a1771cc6a7a25c55111626a3dea7c673f --- /dev/null +++ b/graph/incidents_graphml/a/a985e560-4424-11ee-8c3f-91b7cde7d3e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.184 + 100.64.15.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693063474 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a985e560-4424-11ee-8c3f-91b7cde7d3e6 + + + diff --git a/graph/incidents_graphml/a/a9971100-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9971100-121f-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b99f6d57e9aecd0c157bfc854008fbbd60492b9d --- /dev/null +++ b/graph/incidents_graphml/a/a9971100-121f-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.175 + 100.64.78.175 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687563769 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9971100-121f-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/a/a99befe0-9a0f-11ee-ac12-3d0889e17739.graphml b/graph/incidents_graphml/a/a99befe0-9a0f-11ee-ac12-3d0889e17739.graphml new file mode 100644 index 0000000000000000000000000000000000000000..648a49764be28d817fec3c80afdaf5936bce5da9 --- /dev/null +++ b/graph/incidents_graphml/a/a99befe0-9a0f-11ee-ac12-3d0889e17739.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.69 + 100.64.23.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702510255 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a99befe0-9a0f-11ee-ac12-3d0889e17739 + + + diff --git a/graph/incidents_graphml/a/a9a82030-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a9a82030-fa32-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b47e213e755515b11e22bef2a6361db461dfe729 --- /dev/null +++ b/graph/incidents_graphml/a/a9a82030-fa32-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684933102 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9a82030-fa32-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/a/a9aa98e0-3ff2-11ef-ad45-01c099738c24.graphml b/graph/incidents_graphml/a/a9aa98e0-3ff2-11ef-ad45-01c099738c24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad149d1ca6dcba5d0c79ef23b94e622f114ad0be --- /dev/null +++ b/graph/incidents_graphml/a/a9aa98e0-3ff2-11ef-ad45-01c099738c24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.157 + 100.64.62.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720749693 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9aa98e0-3ff2-11ef-ad45-01c099738c24 + + + diff --git a/graph/incidents_graphml/a/a9b82d90-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9b82d90-121f-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a56a8af13be72b3d9dc5398dacdecacd5ba922c --- /dev/null +++ b/graph/incidents_graphml/a/a9b82d90-121f-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.176 + HOST-14983 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687563769 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9b82d90-121f-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/a/a9bd69b0-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a9bd69b0-167d-11ee-b43f-0d674d180bfa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c06ce8f612cdec970b5ea863bbf62317cd7e677a --- /dev/null +++ b/graph/incidents_graphml/a/a9bd69b0-167d-11ee-b43f-0d674d180bfa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.97 + 100.64.96.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688043947 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bd69b0-167d-11ee-b43f-0d674d180bfa + + + diff --git a/graph/incidents_graphml/a/a9bdc3d0-a33a-11ed-a505-7f4e35fde98f.graphml b/graph/incidents_graphml/a/a9bdc3d0-a33a-11ed-a505-7f4e35fde98f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb0e6ba8412df8343f12afa46072ca5638cff47d --- /dev/null +++ b/graph/incidents_graphml/a/a9bdc3d0-a33a-11ed-a505-7f4e35fde98f.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.31 + 100.64.75.31 + ["Exploiting Target","Exploiting Host"] + 0.88134765625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.116 + 100.64.72.116 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.76.246 + 100.64.76.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.16.179 + 100.64.16.179 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.75 + 100.64.73.75 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.181 + 100.64.78.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.4.229 + 100.64.4.229 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.177 + 100.64.75.177 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.182 + 100.64.78.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9bdc3d0-a33a-11ed-a505-7f4e35fde98f + + + diff --git a/graph/incidents_graphml/a/a9bf0840-9a0f-11ee-ac12-3d0889e17739.graphml b/graph/incidents_graphml/a/a9bf0840-9a0f-11ee-ac12-3d0889e17739.graphml new file mode 100644 index 0000000000000000000000000000000000000000..161186eebfa854e64e7a7f932f94adfba2c793a4 --- /dev/null +++ b/graph/incidents_graphml/a/a9bf0840-9a0f-11ee-ac12-3d0889e17739.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.140 + 100.64.26.140 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702510255 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a9bf0840-9a0f-11ee-ac12-3d0889e17739 + + + diff --git a/graph/incidents_graphml/a/a9c0d110-a33a-11ed-a505-7f4e35fde98f.graphml b/graph/incidents_graphml/a/a9c0d110-a33a-11ed-a505-7f4e35fde98f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15f97eaba3d97764a869648e011e11aa9d38b826 --- /dev/null +++ b/graph/incidents_graphml/a/a9c0d110-a33a-11ed-a505-7f4e35fde98f.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.78.183 + 100.64.78.183 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.147 + 100.64.72.147 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1675370786 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9c0d110-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9c0d110-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9c0d110-a33a-11ed-a505-7f4e35fde98f + + + INCIDENT_LINK + 1675370786 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9c0d110-a33a-11ed-a505-7f4e35fde98f + + + diff --git a/graph/incidents_graphml/a/a9c6a4b0-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a9c6a4b0-fa32-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..294d962c0017f7ea21c10216888fa3f49a00369c --- /dev/null +++ b/graph/incidents_graphml/a/a9c6a4b0-fa32-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.27 + 100.64.39.27 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684933102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9c6a4b0-fa32-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/a/a9c71eb0-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/a/a9c71eb0-14b1-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..759c426ea5cfd0e2a2dd6b98c64fa1829a509e37 --- /dev/null +++ b/graph/incidents_graphml/a/a9c71eb0-14b1-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.125 + 100.64.42.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.176 + 100.64.72.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687846378 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9c71eb0-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846378 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9c71eb0-14b1-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/a/a9c81b30-089f-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/a/a9c81b30-089f-11ee-93d6-d5b5411f7922.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c8a61a37eeafc2206bf2f3cc8a5a4281364d3ab --- /dev/null +++ b/graph/incidents_graphml/a/a9c81b30-089f-11ee-93d6-d5b5411f7922.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.73 + 100.64.27.73 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686519233 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9c81b30-089f-11ee-93d6-d5b5411f7922 + + + diff --git a/graph/incidents_graphml/a/a9cee9e0-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9cee9e0-121f-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e504979b525aba85d174ad12c2076191a002de2 --- /dev/null +++ b/graph/incidents_graphml/a/a9cee9e0-121f-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.176 + HOST-14983 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687563769 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9cee9e0-121f-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/a/a9d44f10-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/a/a9d44f10-9773-11ed-8e25-218966643970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..74a0fb7cd9ea6dad8592096d4b21bbaec795d6a3 --- /dev/null +++ b/graph/incidents_graphml/a/a9d44f10-9773-11ed-8e25-218966643970.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.28 + HOST-15875 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.81.251 + 100.64.81.251 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1674075854 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9d44f10-9773-11ed-8e25-218966643970 + + + INCIDENT_LINK + 1674075854 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9d44f10-9773-11ed-8e25-218966643970 + + + diff --git a/graph/incidents_graphml/a/a9d6e720-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/a/a9d6e720-9773-11ed-8e25-218966643970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2eb36242542c5bbd6645122ae51af7b6c9be09c8 --- /dev/null +++ b/graph/incidents_graphml/a/a9d6e720-9773-11ed-8e25-218966643970.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.44 + HOST-16169 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.123 + 100.64.72.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1674075854 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9d6e720-9773-11ed-8e25-218966643970 + + + INCIDENT_LINK + 1674075854 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9d6e720-9773-11ed-8e25-218966643970 + + + diff --git a/graph/incidents_graphml/a/a9d894f0-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/a/a9d894f0-df82-11ee-8f11-296badf765d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35c298137de1b319a7bd9344f31ff36fa36def18 --- /dev/null +++ b/graph/incidents_graphml/a/a9d894f0-df82-11ee-8f11-296badf765d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710146278 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a9d894f0-df82-11ee-8f11-296badf765d8 + + + diff --git a/graph/incidents_graphml/a/a9d92010-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/a/a9d92010-14b1-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2924e1985df5eacffe8c0ef92e6297b39851715 --- /dev/null +++ b/graph/incidents_graphml/a/a9d92010-14b1-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.139 + 100.64.79.139 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.101 + 100.64.71.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687846378 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9d92010-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846378 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9d92010-14b1-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/a/a9d922f0-3ff2-11ef-ad45-01c099738c24.graphml b/graph/incidents_graphml/a/a9d922f0-3ff2-11ef-ad45-01c099738c24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b48613a983fae9565ddabbbc6581e4a7a7200c3 --- /dev/null +++ b/graph/incidents_graphml/a/a9d922f0-3ff2-11ef-ad45-01c099738c24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.163 + 100.64.88.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1720749693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9d922f0-3ff2-11ef-ad45-01c099738c24 + + + diff --git a/graph/incidents_graphml/a/a9da14d0-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/a/a9da14d0-f477-11ec-a9fa-937f4b53edcd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2538f45f2f4e495e4eb5964f89d0701c5bfcb66f --- /dev/null +++ b/graph/incidents_graphml/a/a9da14d0-f477-11ec-a9fa-937f4b53edcd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.109 + 100.64.73.109 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656155532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9da14d0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9da14d0-f477-11ec-a9fa-937f4b53edcd + + + diff --git a/graph/incidents_graphml/a/a9dfe130-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/a/a9dfe130-f477-11ec-a9fa-937f4b53edcd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d155bd74c57a8ba9b23b7d4f2da6cb45c1e936c5 --- /dev/null +++ b/graph/incidents_graphml/a/a9dfe130-f477-11ec-a9fa-937f4b53edcd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.127 + 100.64.27.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.160 + USER-0015-1654.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656155533 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9dfe130-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9dfe130-f477-11ec-a9fa-937f4b53edcd + + + diff --git a/graph/incidents_graphml/a/a9e000e0-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9e000e0-121f-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09e1c6e867a8ace6d45c17f400f1c671b9580ada --- /dev/null +++ b/graph/incidents_graphml/a/a9e000e0-121f-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.180 + 100.64.78.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.74.30 + 100.64.74.30 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687563769 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9e000e0-121f-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687563769 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a9e000e0-121f-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/a/a9e9c1e0-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/a/a9e9c1e0-14b1-11ee-abc8-e11acc1bcb26.graphml new file mode 100644 index 0000000000000000000000000000000000000000..174825834e5c8603f81aa5d5a284a337afa00554 --- /dev/null +++ b/graph/incidents_graphml/a/a9e9c1e0-14b1-11ee-abc8-e11acc1bcb26.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.140 + 100.64.79.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.115 + 100.64.72.115 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687846378 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9e9c1e0-14b1-11ee-abc8-e11acc1bcb26 + + + INCIDENT_LINK + 1687846378 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9e9c1e0-14b1-11ee-abc8-e11acc1bcb26 + + + diff --git a/graph/incidents_graphml/a/a9ea8f90-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/a/a9ea8f90-f477-11ec-a9fa-937f4b53edcd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ad350e25b4b77345e1812f56ff94a10c73469da --- /dev/null +++ b/graph/incidents_graphml/a/a9ea8f90-f477-11ec-a9fa-937f4b53edcd.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.209 + 100.64.72.209 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.85 + 100.64.71.85 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.111 + 100.64.73.111 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.112 + 100.64.73.112 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656155533 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9ea8f90-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9ea8f90-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9ea8f90-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9ea8f90-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9ea8f90-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9ea8f90-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9ea8f90-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9ea8f90-f477-11ec-a9fa-937f4b53edcd + + + diff --git a/graph/incidents_graphml/a/a9eea6e0-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9eea6e0-121f-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdc2d0497e6aaeb3b60e0fe0ecef78c226be89f8 --- /dev/null +++ b/graph/incidents_graphml/a/a9eea6e0-121f-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.55 + 100.64.71.55 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687563770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9eea6e0-121f-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/a/a9ef98a0-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/a/a9ef98a0-f477-11ec-a9fa-937f4b53edcd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf689e09c4569af95ba8c443106f7fcfb2fb6cb0 --- /dev/null +++ b/graph/incidents_graphml/a/a9ef98a0-f477-11ec-a9fa-937f4b53edcd.graphml @@ -0,0 +1,475 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.231 + USER-0015-1655.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.113 + 100.64.73.113 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.114 + USER-0015-1656.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.115 + USER-0015-1657.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.116 + USER-0015-1658.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.117 + 100.64.73.117 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.5 + USER-0015-1659.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.118 + 100.64.73.118 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.119 + USER-0015-1660.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.120 + USER-0015-1661.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.121 + USER-0015-1662.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.122 + 100.64.73.122 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.123 + 100.64.73.123 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.124 + USER-0015-1663.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155533 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a9ef98a0-f477-11ec-a9fa-937f4b53edcd + + + diff --git a/graph/incidents_graphml/a/a9fc6a70-45d0-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/a/a9fc6a70-45d0-11ee-95ea-81d84bb304b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd0e51e2f181300d523903138301b3e20d3e2a95 --- /dev/null +++ b/graph/incidents_graphml/a/a9fc6a70-45d0-11ee-95ea-81d84bb304b3.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.41 + USER-0015-1527.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.69.162 + 100.64.69.162 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.62.242 + USER-0015-1521.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1693247300 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9fc6a70-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247300 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9fc6a70-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247300 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9fc6a70-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247300 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9fc6a70-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247300 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9fc6a70-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247300 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9fc6a70-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247300 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9fc6a70-45d0-11ee-95ea-81d84bb304b3 + + + INCIDENT_LINK + 1693247300 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a9fc6a70-45d0-11ee-95ea-81d84bb304b3 + + + diff --git a/graph/incidents_graphml/a/aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20.graphml b/graph/incidents_graphml/a/aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1964b607f6c19e989df8de529c6a19bffa77f556 --- /dev/null +++ b/graph/incidents_graphml/a/aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.99 + 100.64.69.99 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.69.95 + 100.64.69.95 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1687989401 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20 + + + INCIDENT_LINK + 1687989401 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20 + + + INCIDENT_LINK + 1687989401 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20 + + + INCIDENT_LINK + 1687989401 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20 + + + diff --git a/graph/incidents_graphml/a/aa206da0-6c66-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/aa206da0-6c66-11ee-9911-f50eb88c1287.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d09ef671856a9737561793248f913a252b51b71 --- /dev/null +++ b/graph/incidents_graphml/a/aa206da0-6c66-11ee-9911-f50eb88c1287.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.161 + 100.64.62.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697489869 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + aa206da0-6c66-11ee-9911-f50eb88c1287 + + + diff --git a/graph/incidents_graphml/a/aa269330-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/a/aa269330-26cd-11ee-863d-83828757c718.graphml new file mode 100644 index 0000000000000000000000000000000000000000..548e7f9de6e1f3b7b84c6aa1e01936b60269b9a4 --- /dev/null +++ b/graph/incidents_graphml/a/aa269330-26cd-11ee-863d-83828757c718.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.77 + 100.64.4.77 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.158 + 100.64.49.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.6 + 100.64.4.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.159 + USER-0015-1382.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.171 + 100.64.20.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689837526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa269330-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa269330-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa269330-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa269330-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa269330-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa269330-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa269330-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa269330-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa269330-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa269330-26cd-11ee-863d-83828757c718 + + + diff --git a/graph/incidents_graphml/a/aa2f3ab0-6c66-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/aa2f3ab0-6c66-11ee-9911-f50eb88c1287.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8cca062c372aae4a08fb6342e99a02eeb6e63226 --- /dev/null +++ b/graph/incidents_graphml/a/aa2f3ab0-6c66-11ee-9911-f50eb88c1287.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.161 + 100.64.62.161 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697489869 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa2f3ab0-6c66-11ee-9911-f50eb88c1287 + + + diff --git a/graph/incidents_graphml/a/aa3ecb10-6c66-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/aa3ecb10-6c66-11ee-9911-f50eb88c1287.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec15a7d2c9265ae766b59bfd2383f6a0a8b4b61f --- /dev/null +++ b/graph/incidents_graphml/a/aa3ecb10-6c66-11ee-9911-f50eb88c1287.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.163 + 100.64.62.163 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697489869 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + aa3ecb10-6c66-11ee-9911-f50eb88c1287 + + + diff --git a/graph/incidents_graphml/a/aa4f1ec0-6c66-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/aa4f1ec0-6c66-11ee-9911-f50eb88c1287.graphml new file mode 100644 index 0000000000000000000000000000000000000000..792e8247d27957d9a96362174e059eb2dd9bcb1f --- /dev/null +++ b/graph/incidents_graphml/a/aa4f1ec0-6c66-11ee-9911-f50eb88c1287.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.163 + 100.64.62.163 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697489869 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa4f1ec0-6c66-11ee-9911-f50eb88c1287 + + + diff --git a/graph/incidents_graphml/a/aa58aea0-2422-11ed-a6b6-abac9032d22a.graphml b/graph/incidents_graphml/a/aa58aea0-2422-11ed-a6b6-abac9032d22a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e350857c04f12b97d0296d30f9268ff617201b27 --- /dev/null +++ b/graph/incidents_graphml/a/aa58aea0-2422-11ed-a6b6-abac9032d22a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.9.157 + 100.64.9.157 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661396682 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + aa58aea0-2422-11ed-a6b6-abac9032d22a + + +